Nokia 002F581 User Manual - Page 107

Java security settings, Activation keys

Page 107 highlights

Java security settings To specify security settings for a Java application, select Options > Settings. You can define which functions the Java application can access. The value that you can set for each functionality depends on the protection domain of the software package. • Access point - Select an access point that the application may use when making network connections. • Network access - Allow the application to create a data connection to the network. • Messaging - Allow the application to send messages. • Application auto-start - Allow the application to start automatically. • Connectivity - Allow the application to activate a data connection, such as a Bluetooth connection. • Multimedia - Allow the application to use the multimedia features of your device. • Read user data - Allow the application to read your calendar entries, contacts, or any other personal data. • Edit user data - Allow the application to add personal data, such as entries to Contacts. • Positioning - Allow the application to use the location data in your device. • Landmarks - Allow the application to use the landmarks in your device. You can define how you are prompted to confirm the Java application's access to the device functions. Select one of the following values: • Ask every time - Require the Java application to ask for your confirmation each time it uses the functionality. • Ask first time - Require the Java application to ask for initial confirmation to use the functionality. • Always allowed - Allow the Java application to use the functionality without your confirmation. The security settings help protect your device against harmful Java applications that may use the functions of your device without your permission. Only select Always allowed if you know the supplier and trustworthiness of the application. • Not allowed - Prevent the Java application from using the functionality. Activation keys Select Menu > Tools > Actv. keys. Some media files, such as images, music, or video clips, are protected by digital usage rights. The activation keys for such files may allow or restrict their usage. For example, with some activation keys you may listen to a music track only a limited number of times. During one playback session you may rewind, fast-forward, or pause the track, but once you stop it, you have used one of the instances allowed. Use activation keys Digital rights management (DRM) protected content comes with an associated activation key that defines your rights to use the content. 107 Security and data management

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144

Java security settings
To specify security settings for a Java application, select
Options
>
Settings
.
You can define which functions the Java application can
access. The value that you can set for each functionality
depends on the protection domain of the software
package.
Access point
— Select an access point that the
application may use when making network
connections.
Network access
— Allow the application to create a
data connection to the network.
Messaging
— Allow the application to send messages.
Application auto-start
— Allow the application to
start automatically.
Connectivity
— Allow the application to activate a data
connection, such as a Bluetooth connection.
Multimedia
— Allow the application to use the
multimedia features of your device.
Read user data
— Allow the application to read your
calendar entries, contacts, or any other personal data.
Edit user data
— Allow the application to add personal
data, such as entries to Contacts.
Positioning
— Allow the application to use the
location data in your device.
Landmarks
— Allow the application to use the
landmarks in your device.
You can define how you are prompted to confirm the Java
application's access to the device functions. Select one of
the following values:
Ask every time
— Require the Java application to ask
for your confirmation each time it uses the
functionality.
Ask first time
— Require the Java application to ask for
initial confirmation to use the functionality.
Always allowed
— Allow the Java application to use
the functionality without your confirmation. The
security settings help protect your device against
harmful Java applications that may use the functions of
your device without your permission. Only select
Always allowed
if you know the supplier and
trustworthiness of the application.
Not allowed
— Prevent the Java application from
using the functionality.
Activation keys
Select
Menu
>
Tools
>
Actv. keys
.
Some media files, such as images, music, or video clips, are
protected by digital usage rights. The activation keys for
such files may allow or restrict their usage. For example,
with some activation keys you may listen to a music track
only a limited number of times. During one playback
session you may rewind, fast-forward, or pause the track,
but once you stop it, you have used one of the instances
allowed.
Use activation keys
Digital rights management (DRM) protected content
comes with an associated activation key that defines your
rights to use the content.
107
Security and data management