Nokia 7600 User Manual page 94

Cell phone
Hide thumbs Also See for 7600:
Table of Contents

Advertisement

Module PIN request
phone to ask for the module PIN
code when using services
provided by the security module.
Key in the code and select On. To
disable this request, select Off.
Change module PIN
the module PIN code, if allowed
by the security module. Enter the
current module PIN code and
then enter the new code twice.
See also
"Access codes"
Certificates
There are three kinds of certificates:
server certificates, authority
certificates and user certificates.
To view the available certificates,
press
Menu
in standby mode and
select Services, Settings,
settings
and
User certificates
Authority
certificates.
• Server certificates
The phone uses a server
certificate to improve security in
the connection between the
phone and the gateway. The
phone receives the server
certificate from the service
provider before the connection is
established and its validity is
checked using the authority
certificates saved in the phone.
Server certificates are not saved.
to set the
to change
on page xi.
Security
or
Copyright © 2004 Nokia. All rights reserved.
M e n u f u n c t i o n s
The security indicator
displayed during a connection, if
the data transmission between
the phone and the Internet server
is encrypted.
However, the security indicator
does not indicate that the data
transmission between the
gateway and the content server
(place where the requested
resource is saved) is secure. It is
up to the service provider to
secure the data transmission
between the gateway and the
content server.
• Authority certificates
Authority certificates are used by
some online services, such as
banking services, for checking
the validity of other certificates.
Authority certificates can be
saved in the security module by
the service provider, or they can
be downloaded from the
network, if the service supports
the use of authority certificates.
• User certificates
User certificates are issued to
users by a Certifying Authority.
User certificates are needed, for
example, to create a digital
signature, and they associate the
user with a specific private key in
a security module.
is
79

Advertisement

Table of Contents
loading

Table of Contents