Nokia 3220 User Manual
Page 59
![background image](/manuals/489830/59/background.png)
52
Copyright © 2004 Nokia
Select Menu > Services > Settings > Security settings > Security module
settings and one of the following:
Security module details—Show the security module title, status, manufacturer,
and serial number.
Module PIN request—Set the phone to request the module PIN when using
services provided by the security module. Enter the code, and select On. To
disable the module PIN request, select Off.
Change module PIN—Change the module PIN, if allowed by the security
module. Enter the current module PIN code; then enter the new code twice.
Change signing PIN—Select the signing PIN that you want to change. Enter the
current PIN code; then enter the new code twice.
CERTIFICATES
There are three kinds of certificates:
Server certificates—Used by the phone to create a connection with improved
security to the content server. The phone receives the server certificate from the
service provider before the connection is established, and its validity is checked
using the authority certificates saved in the phone. Server certificates are not saved.
The security indicator
is displayed during a connection if the data
transmission between the phone and the content server is encrypted.
The security icon does not indicate that the data transmission between the
gateway and the content server (or place where the requested resource is
stored) is secure. The service provider secures the data transmission between the
gateway and the content server.
Authority certificates—Used by some services, such as banking services, for
checking the validity of other certificates. Authority certificates can either be
saved in the security module by the service provider, or they can be downloaded
from the network if the service supports the use of authority certificates.
User certificates—Issued to users by a certifying authority. User certificates are
required (for example, to create a digital signature). They associate the user
with a specific private key in a security module.
Important: Even if the use of certificates makes the risks involved in
remote connections and software installation considerably smaller, they
must be used correctly in order to benefit from increased security. The
existence of a certificate does not offer any protection by itself; the
certificate manager must contain correct, authentic, or trusted certificates
for increased security to be available. Certificates have a restricted
lifetime. If Expired certificate or Certificate not valid yet are shown,
even if the certificate should be valid, verify that the current date and
time in your device are correct.
Before changing any certificate settings, you must make sure that you trust the
owner of the certificate and that the certificate belongs to the listed owner.