User Manual
Services
83
Security module details—Show the security module title, status, manufacturer,
and serial number.
Module PIN request—Set the phone to request the module PIN when using
services provided by the security module. Enter the code, and select On. To
disable the module PIN request, select Off.
Change module PIN—Change the module PIN, if allowed by the security module.
Enter the current module PIN code; then enter the new code twice.
Change signing PIN—Select the signing PIN that you want to change. Enter the
current PIN code, then enter the new code twice.
Certificates
There are three kinds of certificates:
Server certificates—Used by the phone to create a connection with improved
security to the content server. The phone receives the server certificate from the
service provider before the connection is established, and its validity is checked
using the authority certificates saved in the phone. Server certificates are not
saved.
The security indicator is displayed during a connection if the data
transmission between the phone and the content server is encrypted.
The security icon does not indicate that the data transmission between the
gateway and the content server (or place where the requested resource is stored)
is secure. The service provider secures the data transmission between the
gateway and the content server.
Authority certificates—Used by some services, such as banking services, for
checking the validity of other certificates. Authority certificates can either be
saved in the security module by the service provider, or they can be downloaded
from the network if the service supports the use of authority certificates.
User certificates—Issued to users by a Certifying Authority. User certificates are
required (for example, to create a digital signature), and they associate the user
with a specific private key on a security module.
Important: Even if the use of certificates makes the risks involved in
remote connections and software installation considerably smaller,
they must be used correctly in order to benefit from increased security.
The existence of a certificate does not offer any protection by itself; the
certificate manager must contain correct, authentic, or trusted
certificates for increased security to be available. Certificates have a
restricted lifetime. If Certificate invalid according to phone's date or