Nokia E5-00 Nokia E5-00 User Guide in US English - Page 173

View certificate details, One of the following notes may appear

Page 173 highlights

Security and data management 173 Digital certificates are used to verify the origins of software but do not guarantee safety. There are four different types of certificates: authority certificates, personal certificates, trusted site certificates, and device certificates. During a secure connection, a server may send a server certificate to your device. Upon receipt, it is checked through an authority certificate stored in your device. You receive notification if the identity of the server is not authentic or if you do not have the correct certificate in your device. You can download a certificate from a web site, or receive a certificate as a message. Certificates should be used when you connect to an online bank or a remote server to transfer confidential information. They should also be used if you want to reduce the risk of viruses or other malicious software, and to check the authenticity of software when you download and install software to your device. Tip: When you add a new certificate, check its authenticity. View certificate details You can only be sure of the correct identity of a server when the signature and the validity period of a server certificate have been checked. To view certificate details, open a certificate folder, and select a certificate and Options > Certificate details. One of the following notes may appear: Certificate not trusted - You have not set any application to use the certificate. You may want to change the trust settings. Expired certificate - The period of validity has ended for the selected certificate. Certificate not valid yet - The period of validity has not yet begun for the selected certificate. Certificate corrupted - The certificate cannot be used. Contact the certificate issuer.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243

Digital certificates are used to verify the origins of software but do not guarantee
safety. There are four different types of certificates: authority certificates, personal
certificates, trusted site certificates, and device certificates. During a secure
connection, a server may send a server certificate to your device. Upon receipt, it is
checked through an authority certificate stored in your device. You receive
notification if the identity of the server is not authentic or if you do not have the
correct certificate in your device.
You can download a certificate from a web site, or receive a certificate as a message.
Certificates should be used when you connect to an online bank or a remote server
to transfer confidential information. They should also be used if you want to reduce
the risk of viruses or other malicious software, and to check the authenticity of
software when you download and install software to your device.
Tip:
When you add a new certificate, check its authenticity.
View certificate details
You can only be sure of the correct identity of a server when the signature and the
validity period of a server certificate have been checked.
To view certificate details, open a certificate folder, and select a certificate and
Options
>
Certificate details
.
One of the following notes may appear:
Certificate not trusted
— You have not set any application to use the certificate.
You may want to change the trust settings.
Expired certificate
— The period of validity has ended for the selected certificate.
Certificate not valid yet
— The period of validity has not yet begun for the selected
certificate.
Certificate corrupted
— The certificate cannot be used. Contact the certificate
issuer.
Security and data management
173