Certificate Management - Nokia N78 User Manual

Hide thumbs Also See for N78:
Table of Contents

Advertisement

Deactivating the PIN code request may not be
allowed by some SIM cards.
PIN
code,
PIN2
code, and
change the lock code, PIN code, and PIN2 code.
These codes can only include the numbers from 0 to
9.
If you forget the PIN or the PIN2 code, contact your
service provider. If you forget the lock code, contact
a Nokia Care point or your service
"Access codes", p. 19.
Avoid using access codes similar to the emergency
numbers to prevent accidental dialling of the
emergency number.
Keypad autolock period
keypad is locked when your device has been idle for
a certain period of time.
Tip: To lock or unlock the keypad manually,
press the left selection key, then *.
Phone autolock period
use, you can set a time-out after which the device
automatically locks. A locked device cannot be used
until the correct lock code is entered. To turn off the
autolock period, select None.
Tip: To lock the device manually, press the
power key. A list of commands opens. Select
Lock
phone.
Lock if SChip changed
ask for the lock code when an unknown SIM card is
inserted into your device. The device maintains a list
Lock code
— You can
provider.See
— Select whether the
— To avoid unauthorised
— You can set the device to
of SIM cards that are recognised as the owner's
cards.
Closed user group
— You can specify a group of
people to whom you can call and who can call you
(network service).
Confirm SChip services
display confirmation messages when you are using
a SIM card service (network service).

Certificate management

Press
, and select
Tools
Security
Certificate
management.
>
Digital certificates do not guarantee safety; they are
used to verify the origin of software.
In the certificate management main view, you can see
a list of authority certificates that are stored in your
device. Scroll right to see a list of personal certificates,
if available.
Digital certificates should be used if you want to
connect to an online bank or another site or remote
server for actions that involve transferring confidential
information. They should also be used if you want to
reduce the risk of viruses or other malicious software
and be sure of the authenticity of software when
downloading and installing software.
Important: Even if the use of certificates makes
the risks involved in remote connections and software
installation considerably smaller, they must be used
— You can set the device to
Settings
General
>
>
>
147

Advertisement

Table of Contents
loading

Table of Contents