Nokia 7650 User Manual page 38

Hide thumbs Also See for 7650:
Table of Contents

Advertisement

Options in the certificate
management main view:
Certificate
details, Delete,
Trust
settings,
Mark/
Unmark, and Exit.
Glossary:
Authority certificates are
used by some WAP
services, such as banking
services, for checking
signatures or server
certificates or other
authority certificates.
38
Copyright © 2002 Nokia. All rights reserved.
Closed user group
(network service) - You can specify a group of people to whom you can
call and who can call you. For more information, contact your network operator or service
provider. Select:
Default
to activate the default group agreed on with the network operator,
On
if you want to use another group (you need to know the group index number), or Off.
Note: When calls are limited to Closed User Groups, calls may be possible to certain
emergency numbers in some networks (e.g. 112 or other official emergency
number).
Confirm SIM services
- To set the phone to display confirmation messages when you are
using a SIM card service.
Certif. management
In the Certificate management main view, you can see a list of authority certificates that
have been stored in your phone. Move the joystick to the right to see a list of user
certificates, if available.
Glossary: Digital certificates are used to verify the origin of WAP pages and
installed software. However, they can only be trusted if the origin of the certificate
is known to be authentic.
Digital certificates are needed if you:
• want to connect to an online bank or another site or remote server for actions that
involve transferring confidential information, or
• want to minimise the risk of viruses or other malicious software and be sure of the
authenticity of software when downloading and installing software.
Important: Note, however, that even if the use of certificates makes the risks
involved in remote connections and software installation considerably smaller, they
must be used correctly in order to benefit from increased security. The existence of
a certificate does not offer any protection by itself; the certificate manager must
contain correct, authentic, or trusted certificates for increased security to be
available.

Advertisement

Table of Contents
loading

Table of Contents