Nokia N75 Cell Phone User Manual


 
Settings
105
Confirm SChip services—You can set the device to display
confirmation messages when you are using a SmartChip
service (network service).
Glossary of PIN and lock codes
If you forget any of these codes, contact your service
provider.
The personal identification number (PIN) code—protects
your SmartChip card against unauthorized use. The PIN
code (4 to 8 digits) is usually supplied with the SmartChip
card. After three consecutive incorrect PIN code entries,
the code is blocked, and you need the PUK code to unblock
it.
The UPIN code—may be supplied with the USIM card. The
The USIM card is an enhanced version of the SmartChip
card and is supported by UMTS mobile phones.
The PIN2 code—(4 to 8 digits) is supplied with some
SmartChip cards, and is required to access some functions
in your device.
The lock code (also known as security code)—(5 digits) can
be used to lock the device to avoid unauthorized use. The
factory setting for the lock code is 12345. To avoid
unauthorized use of your device, change the lock code.
Keep the new code secret and in a safe place separate from
your device. If you forget the code, contact your service
provider.
The personal unblocking key (PUK) code and PUK2 code
(8 digits) are required to change a blocked PIN code or
PIN2 code, respectively. If the codes are not supplied with
the SmartChip card, contact the operator whose
SmartChip card is in your device.
The UPUK code—(8 digits) is required to change a blocked
UPIN code. If the code is not supplied with the USIM card,
contact the operator whose USIM card is in your device.
Certif. management
Digital certificates do not guarantee safety; they are used
to verify the origin of software.
In the certificate management main view, you can see a
list of authority certificates that are stored in your device.
Press to see a list of personal certificates, if available.
Digital certificates should be used if you want to connect
to an online bank or another site or remote server for
actions that involve transferring confidential information.
They should also be used if you want to reduce the risk of
viruses or other malicious software and be sure of the
authenticity of software when downloading and installing
software.
Important: Even if the use of certificates makes the
risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security. The
R1114_en.book Page 105 Thursday, October 19, 2006 3:43 PM