Blacklisting Sim Cards And Devices; Call Restriction; Radio Interface Security; Calls - Nokia 9290 Security Manual

Security white paper
Hide thumbs Also See for 9290:
Table of Contents

Advertisement

Nokia Mobile Phones
out, the phone will also be in locked mode. In this case, the lock code must be entered before the PIN code when the
phone is turned on.
The lock code state cannot be removed by formatting the device (all the user data and applications installed by the
user will be deleted). Formatting the device does not remove the security settings. To get the lock code, the user must
contact a service centre. If the lock code is entered incorrectly five times in a row, the communicator is locked for five
minutes. During this period, the communicator will not even accept the correct lock code.
Note that the memory card is not locked if the card does not support locking. Theft of the memory card is possible
even if the communicator itself is locked, and the card can be read with a PC memory card reader for example.
If your MultiMediaCard supports password locking (most older cards do not), you can optionally lock the card against
unauthorised use. The card needs to be locked and unlocked manually. When in locked state, the information on the
card cannot be accessed without reverse-engineering the card itself. Some of the Nokia 9290 Communicator software
are stored on the MultiMediaCard. In order to be able to use this software, the card needs to be unlocked. The locking
of the MultiMediaCard is independent from device locking discussed above.

2.5 Blacklisting SIM Cards and Devices

If your device or SIM card is stolen or lost, you should immediately report the loss to your operator. Your operator will
close your SIM card. Most operators also maintain a list of stolen and lost devices. When such a mobile device appears
on the network, it cannot be used to make calls, no matter which SIM card is inserted. You should therefore make
note of your device's IMEI code and report it to your operator if you lose your mobile device.
Keeping the PIN prompt on your SIM on and having the automatic locking of the device on will greatly help to protect
you from unwanted costs, should your communicator or SIM card ever fall into the wrong hands.

2.6 Call Restriction

With a restriction password you can block calls to unwanted numbers. This means that the cellular provider blocks
certain numbers and the user cannot access these numbers unless the restriction password is known. A user can
obtain a restriction password from a cellular provider. Incoming calls (voice, data, and fax) can also be blocked.

3. Radio interface security

3.1 Calls

The security of the radio connection between a GSM phone and the GSM network is specified in GSM standards.
Encryption is used to protect radio transmissions. The GSM network specifies the radio interface security level, and the
encryption applies to voice, data, and telefax calls. Note that encryption is only used between the GSM phone and the
base station.
The level of security in radio transmissions depends on the network and local laws. Most countries use the strongest
GSM encryption level. Another level of encryption is used in countries to which the export of stronger encryption is
prohibited. Some networks may choose to use no encryption at all due to local laws or regulations, or for technical
reasons. It is usually possible for the proper authorities to monitor any calls in a GSM network, regardless of the
encryption used, depending on local wiretapping legislation.
Copyright
Nokia Corporation 2001-2002. All rights reserved.
Nokia 9290 Communicator
Security White Paper
4 (9)

Advertisement

Table of Contents
loading

Table of Contents