Nokia N73 User Guide - Page 122

Track protected object, Security module, Certificate corrupted

Page 122 highlights

Settings You are notified if the identity of the server is not authentic or if you do not have the correct security certificate in your device. To check certificate details, scroll to a certificate, and select Options > Certificate details. When you open certificate details, the validity of the certificate is checked, and one of the following notes may be displayed: • Certificate not trusted-You have not set any application to use the certificate. See 'Change the trust settings', p. 122. • Expired certificate-The period of validity has ended for the selected certificate. • Certificate not valid yet-The period of validity has not yet begun for the selected certificate. • Certificate corrupted-The certificate cannot be used. Contact the certificate issuer. Change the trust settings Before changing any certificate settings, you must make sure that you really trust the owner of the certificate and that the certificate really belongs to the listed owner. Scroll to an authority certificate, and select Options > Trust settings. Depending on the certificate, a list of the applications that can use the selected certificate is shown. For example: • Symbian installation: Yes-The certificate is able to certify the origin of a new Symbian operating system application. • Internet: Yes-The certificate is able to certify servers. • App. installation: Yes-The certificate is able to certify the origin of a new JavaTM application. Select Options > Edit trust setting to change the value. Track protected object Some copyright-protected music files may include a transaction identifier. Select whether you allow the identifier to be sent with the music file if you send or forward the file. The provider of the music file can use the identifier to track the distribution of the files. Security module To view or edit a security module (if available) in Secur. mod., scroll to it, and press the scroll key. To view detailed information about a security module, scroll to it, and select Options > Security details. 122

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Settings
122
You are notified if the identity of the server is not
authentic or if you do not have the correct security
certificate in your device.
To check certificate details, scroll to a certificate, and
select
Options
>
Certificate details
. When you open
certificate details, the validity of the certificate is
checked, and one of the following notes may be displayed:
Certificate not trusted
—You have not set any
application to use the certificate. See ‘Change the
trust settings’, p. 122.
Expired certificate
—The period of validity has ended
for the selected certificate.
Certificate not valid yet
—The period of validity has
not yet begun for the selected certificate.
Certificate corrupted
—The certificate cannot be used.
Contact the certificate issuer.
Change the trust settings
Before changing any certificate settings, you must make
sure that you really trust the owner of the certificate and
that the certificate really belongs to the listed owner.
Scroll to an authority certificate, and select
Options
>
Trust settings
. Depending on the certificate, a list of the
applications that can use the selected certificate is
shown. For example:
Symbian installation
:
Yes
—The certificate is able to
certify the origin of a new Symbian operating system
application.
Internet
:
Yes
—The certificate is able to certify servers.
App. installation
:
Yes
—The certificate is able to certify
the origin of a new Java
TM
application.
Select
Options
>
Edit trust setting
to change the value.
Track protected object
Some copyright-protected music files may include a
transaction identifier. Select whether you allow the
identifier to be sent with the music file if you send or
forward the file. The provider of the music file can use the
identifier to track the distribution of the files.
Security module
To view or edit a security module (if available) in
Secur.
mod.
, scroll to it, and press the scroll key. To view detailed
information about a security module, scroll to it, and select
Options
>
Security details
.