Avoid using access codes similar to emergency numbers to prevent accidental dialing of the emergency number.
Code in use—to select the active code, PIN or UPIN, for the active USIM. This is shown only if the active USIM supports UPIN, and the UPIN is not rejected.
PIN code request or UPIN code request—to set the phone to request the code each time the phone is switched on. Some SIM cards may not allow the PIN code request to be turned Off. If you select Code in use > UPIN, UPIN code request is shown instead.
PIN code or UPIN code, PIN2 code, and Lock code—to change the codes
Keypad autolock period > User defined—to automatically lock the keypad after a defined period of inactivity
Phone autolock period—to set a time-out after which the phone is automatically locked. To use the phone again, you need to enter the correct lock code. To turn off the autolock period, select None.
Lock if SIM card changed—to set the phone to prompt for the lock code when an unknown, new SIM card is inserted into your phone. The phone keeps a list of SIM cards that are recognized as the owner cards.
Closed user group (network service)—to specify a group of people whom you can call and who can call you. For more information, contact your service provider. To activate the default group agreed on with the service provider, select Default. If you want to use another group (you need to know the group index number), select On.
When calls are limited to closed user groups, calls may be possible to the official emergency number programmed into your device.
Confirm SIM services (network service)—to set the phone to display confirmation messages when you use a SIM card service
Certificate management
A list of authority certificates that have been stored in your phone is displayed in Certificate management. To see a list of personal certificates if available, scroll right.
Digital certificates should be used if you want to connect to an online bank or another site or remote server for actions that involve transferring confidential information. They should also be used if you want to reduce the risk of viruses or other malicious software and be sure of the authenticity of software when downloading and installing software.
74