Nokia N70 User Guide - Page 100

Important, View certificate details-check authenticity, Change the trust settings - 1 apps

Page 100 highlights

Tools actions that involve transferring confidential information. They should also be used if you want to reduce the risk of viruses or other malicious software and be sure of the authenticity of software when downloading and installing software. Important: Even if the use of certificates makes the risks involved in remote connections and software installation considerably smaller, they must be used correctly in order to benefit from increased security. The existence of a certificate does not offer any protection by itself; the certificate manager must contain correct, authentic, or trusted certificates for increased security to be available. If Expired certificate or Certificate not valid yet is shown even if the certificate should be valid, check that the current date and time in your device are correct. View certificate details-check authenticity You can only be sure of the correct identity of a server when the signature and the period of validity of a server certificate have been checked. You are notified on the device display if the identity of the server is not authentic or if you do not have the correct security certificate in your device. To check certificate details, scroll to a certificate, and select Options > Certificate details. When you open certificate details, the validity of the certificate is checked, and one of the following notes may be displayed: • Certificate not trusted-You have not set any application to use the certificate. See 'Change the trust settings', p. 100. • Expired certificate-The period of validity has ended for the selected certificate. • Certificate not valid yet-The period of validity has not yet begun for the selected certificate. • Certificate corrupted-The certificate cannot be used. Contact the certificate issuer. Change the trust settings Before changing any certificate settings, you must make sure that you really trust the owner of the certificate and that the certificate really belongs to the listed owner. Scroll to an authority certificate, and select Options > Trust settings. Depending on the certificate, a list of the applications that can use the selected certificate is shown. For example: • Symbian installation: Yes-The certificate is able to certify the origin of a new Symbian operating system application. • Internet: Yes-The certificate is able to certify servers. • App. installation: Yes-The certificate is able to certify the origin of a new Java application. Select Options > Edit trust setting to change the value. 100 Copyright © 2005 Nokia. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Tools
100
Copyright © 2005 Nokia. All rights reserved.
actions that involve transferring confidential information.
They should also be used if you want to reduce the risk of
viruses or other malicious software and be sure of the
authenticity of software when downloading and installing
software.
Important:
Even if the use of certificates makes the
risks involved in remote connections and software
installation considerably smaller, they must be used
correctly in order to benefit from increased security. The
existence of a certificate does not offer any protection by
itself; the certificate manager must contain correct,
authentic, or trusted certificates for increased security to
be available. If
Expired certificate
or
Certificate not
valid yet
is shown even if the certificate should be valid,
check that the current date and time in your device are
correct.
View certificate details—check authenticity
You can only be sure of the correct identity of a server
when the signature and the period of validity of a server
certificate have been checked.
You are notified on the device display if the identity of the
server is not authentic or if you do not have the correct
security certificate in your device.
To check certificate details, scroll to a certificate, and
select
Options
>
Certificate details
. When you open
certificate details, the validity of the certificate is checked,
and one of the following notes may be displayed:
Certificate not trusted
—You have not set any
application to use the certificate. See ‘Change the trust
settings’, p. 100.
Expired certificate
—The period of validity has ended
for the selected certificate.
Certificate not valid yet
—The period of validity has
not yet begun for the selected certificate.
Certificate corrupted
—The certificate cannot be used.
Contact the certificate issuer.
Change the trust settings
Before changing any certificate settings, you must make
sure that you really trust the owner of the certificate and
that the certificate really belongs to the listed owner.
Scroll to an authority certificate, and select
Options
>
Trust settings
. Depending on the certificate, a list of the
applications that can use the selected certificate is shown.
For example:
Symbian installation
:
Yes
—The certificate is able to
certify the origin of a new Symbian operating system
application.
Internet
:
Yes
—The certificate is able to certify servers.
App. installation
:
Yes
—The certificate is able to certify
the origin of a new Java application.
Select
Options
>
Edit trust setting
to change the value.