Nokia N93i - Security

background image

Security

Phone and SIM

PIN code request

—When active, the code is requested

each time the device is switched on. Deactivating the PIN
code request may not be allowed by some SIM cards. See
‘Glossary of PIN and lock codes’, p. 118.

PIN code

,

PIN2 code

, and

Lock code

—You can change the

lock, PIN, and PIN2 codes. These codes can only include
the numbers from 0 to 9. If you forget any of these codes,
contact your service provider. See ‘Glossary of PIN and
lock codes’, p. 118.

Avoid using access codes similar to the emergency
numbers to prevent accidental dialing of the emergency
number.

Autolock period

—You can set an autolock period, a

time-out after which the device automatically locks. To
turn off the autolock period, select

None

.

background image

Settings

118

To unlock the device, enter the lock code.

When the device is locked, calls may be possible to the
official emergency number programmed into your device.

Tip! To lock the device manually, press

. A list of

commands opens. Select

Lock phone

.

Lock if SIM changed

—You can set the device to ask for

the lock code when an unknown SIM card is inserted into
your device. The device maintains a list of SIM cards that
are recognized as the owner’s cards.

Closed user group

—You can specify a group of people to

whom you can call and who can call you (network
service).

When calls are limited to closed user groups, calls may be
possible to the official emergency number programmed
into your device.

Confirm SIM services

—You can set the device to display

confirmation messages when you are using a SIM card
service (network service).

Glossary of PIN and lock codes

If you forget any of these codes, contact your service
provider.

PIN code—This code protects your SIM card against
unauthorized use. The PIN code (4 to 8 digits) is usually
supplied with the SIM card. After three consecutive

incorrect PIN code entries, the code is blocked, and you
need the PUK code to unblock it.

UPIN code—This code may be supplied with the USIM card.
The USIM card is an enhanced version of the SIM card and
is supported by UMTS mobile phones.

PIN2 code—This code (4 to 8 digits) is supplied with some
SIM cards, and is required to access some functions in your
device.

Lock code (security code)—This code (5 digits) can be used
to lock the device to avoid unauthorized use. The factory
setting for the lock code is 12345. To avoid unauthorized
use of your device, change the lock code. Keep the new
code secret and in a safe place separate from your device.
If you forget the code, contact your service provider.

PUK and PUK2 codes—These codes (8 digits) are required to
change a blocked PIN code or PIN2 code, respectively. If
the codes are not supplied with the SIM card, contact the
operator whose SIM card is in your device.

UPUK code—This code (8 digits) is required to change a
blocked UPIN code. If the code is not supplied with the
USIM card, contact the service provider whose USIM card
is in your device.

background image

Settings

119

Certificate management

Digital certificates do not guarantee safety; they are used
to verify the origin of software.

In the certificate management main view, you can see a
list of authority certificates that are stored in your device.
Press

to see a list of personal certificates, if available.

Digital certificates should be used if you want to connect
to an online bank or another site or remote server for
actions that involve transferring confidential information.
They should also be used if you want to reduce the risk of
viruses or other malicious software and be sure of the
authenticity of software when downloading and installing
software.

Important: Even if the use of certificates makes the

risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security. The
existence of a certificate does not offer any protection by
itself; the certificate manager must contain correct,
authentic, or trusted certificates for increased security to
be available. Certificates have a restricted lifetime. If

Expired certificate

or

Certificate not valid yet

is shown

even if the certificate should be valid, check that the
current date and time in your device are correct.

View certificate details—check authenticity

You can only be sure of the correct identity of a server
when the signature and the period of validity of a server
certificate have been checked.

You are notified if the identity of the server is not
authentic or if you do not have the correct security
certificate in your device.

To check certificate details, scroll to a certificate, and
select

Options

>

Certificate details

. When you open

certificate details, the validity of the certificate is checked,
and one of the following notes may be displayed:

Certificate not trusted

—You have not set any application

to use the certificate. See ‘Change the trust settings’, p.
119.

Expired certificate

—The period of validity has ended for

the selected certificate.

Certificate not valid yet

—The period of validity has not

yet begun for the selected certificate.

Certificate corrupted

—The certificate cannot be used.

Contact the certificate issuer.

Change the trust settings

Before changing any certificate settings, you must make
sure that you really trust the owner of the certificate and
that the certificate really belongs to the listed owner.

background image

Settings

120

Scroll to an authority certificate, and select

Options

>

Trust settings

. Depending on the certificate, a list of the

applications that can use the selected certificate is
shown. For example:

Symbian installation

>

Yes

—The certificate is able to

certify the origin of a new Symbian operating system
application.

Internet

>

Yes

—The certificate is able to certify servers.

App. installation

>

Yes

—The certificate is able to certify

the origin of a new Java application.

Select

Options

>

Edit trust setting

to change the value.

Track protected object

Some copyright-protected music files may include a
transaction identifier. Select whether you allow the
identifier to be sent with the music file if you send or
forward the file. The provider of the music file can use the
identifier to track the distribution of the files.

EAP plug-ins

You can view the EAP plug-ins currently installed in your
device (network service). Some IAPs that use wireless LAN
as a data bearer and WPA security mode use the plug-ins
for authentication.