Nokia 002J3H6 User Manual - Page 112

Java security settings, Activation keys

Page 112 highlights

Security and data management On. If validity cannot be verified, you are asked if you want to continue installation. • Default web address - The validity of a certificate is checked from the default address if the certificate does not include its own web address. To change the default address, select Default web address, and enter the new address. • Positioning - Allow the application to use the location data in your device. • Landmarks - Allow the application to use the landmarks in your device. You can define how you are prompted to confirm the Java application's access to the device functions. Select one of the following values: • Ask every time - Require the Java application to Java security settings To specify security settings for a Java application, select Options > Settings. ask for your confirmation each time it uses the functionality. • Ask first time - Require the Java application to ask for initial confirmation to use the functionality. You can define which functions the Java application can • Always allowed - Allow the Java application to access. The value that you can set for each functionality use the functionality without your confirmation. depends on the protection domain of the software The security settings help protect your device package. against harmful Java applications that may use the • Access point - Select an access point that the application may use when making network connections. • Network access - Allow the application to create a data connection to the network. functions of your device without your permission. Only select Always allowed if you know the supplier and trustworthiness of the application. • Not allowed - Prevent the Java application from using the functionality. • Messaging - Allow the application to send Activation keys messages. • Application auto-start - Allow the application to start automatically. • Connectivity - Allow the application to activate a Select Menu > Tools > Actv. keys. data connection, such as a Bluetooth connection. Some media files, such as images, music, or video clips, • Multimedia - Allow the application to use the are protected by digital usage rights. The activation multimedia features of your device. keys for such files may allow or restrict their usage. For • Read user data - Allow the application to read example, with some activation keys you may listen to your calendar entries, contacts, or any other a music track only a limited number of times. During personal data. 112 • Edit user data - Allow the application to add one playback session you may rewind, fast-forward, or pause the track, but once you stop it, you have used personal data, such as entries to Contacts. one of the instances allowed.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149

On
. If validity cannot be verified, you are asked if
you want to continue installation.
Default web address
— The validity of a certificate
is checked from the default address if the certificate
does not include its own web address. To change
the default address, select
Default web address
,
and enter the new address.
Java security settings
To specify security settings for a Java application, select
Options
>
Settings
.
You can define which functions the Java application can
access. The value that you can set for each functionality
depends on the protection domain of the software
package.
Access point
— Select an access point that the
application may use when making network
connections.
Network access
— Allow the application to create
a data connection to the network.
Messaging
— Allow the application to send
messages.
Application auto-start
— Allow the application to
start automatically.
Connectivity
— Allow the application to activate a
data connection, such as a Bluetooth connection.
Multimedia
— Allow the application to use the
multimedia features of your device.
Read user data
— Allow the application to read
your calendar entries, contacts, or any other
personal data.
Edit user data
— Allow the application to add
personal data, such as entries to Contacts.
Positioning
— Allow the application to use the
location data in your device.
Landmarks
— Allow the application to use the
landmarks in your device.
You can define how you are prompted to confirm the
Java application's access to the device functions. Select
one of the following values:
Ask every time
— Require the Java application to
ask for your confirmation each time it uses the
functionality.
Ask first time
— Require the Java application to ask
for initial confirmation to use the functionality.
Always allowed
— Allow the Java application to
use the functionality without your confirmation.
The security settings help protect your device
against harmful Java applications that may use the
functions of your device without your permission.
Only select
Always allowed
if you know the
supplier and trustworthiness of the application.
Not allowed
— Prevent the Java application from
using the functionality.
Activation keys
Select
Menu
>
Tools
>
Actv. keys
.
Some media files, such as images, music, or video clips,
are protected by digital usage rights. The activation
keys for such files may allow or restrict their usage. For
example, with some activation keys you may listen to
a music track only a limited number of times. During
one playback session you may rewind, fast-forward, or
pause the track, but once you stop it, you have used
one of the instances allowed.
112
Security and data management