Nokia 6120 classic

Page 72
background image
72
Avoid using access codes similar to emergency numbers to prevent accidental 
dialing of the emergency number.
Code in use—to select the active code, PIN or UPIN, for the active USIM. This is 
shown only if the active USIM supports UPIN, and the UPIN is not rejected.
PIN code request or UPIN code request—to set the phone to request the code each 
time the phone is switched on. Some SIM cards may not allow the PIN code 
request to be turned Off. If you select Code in use UPINUPIN code request is 
shown instead.
PIN code or UPIN codePIN2 code, and Lock code—to change the codes
Keypad autolock period User defined—to automatically lock the keypad after a 
defined period of inactivity
Phone autolock period—to set a time-out after which the phone is automatically 
locked. To use the phone again, you need to enter the correct lock code. To turn off 
the autolock period, select None.
Lock if SIM card changed—to set the phone to prompt for the lock code when an 
unknown, new SIM card is inserted into your phone. The phone keeps a list of SIM 
cards that are recognized as the owner cards.
Closed user group (network service)—to specify a group of people whom you can 
call and who can call you. For more information, contact your service provider. To 
activate the default group agreed on with the service provider, select Default. If 
you want to use another group (you need to know the group index number), select 
On.
When calls are limited to closed user groups, calls may be possible to the official emergency 
number programmed into your device.
Confirm SIM services (network service)—to set the phone to display confirmation 
messages when you use a SIM card service
Certificate management
A list of authority certificates that have been stored in your phone is displayed in 
Certificate management. To see a list of personal certificates if available, 
scroll right.
Digital certificates should be used if you want to connect to an online bank or 
another site or remote server for actions that involve transferring confidential 
information. They should also be used if you want to reduce the risk of viruses or 
other malicious software and be sure of the authenticity of software when 
downloading and installing software.