Select Menu > Ctrl. panel > Settings and General > Security > Certificate management.

Digital certificates are used to verify the origins of software but do not guarantee safety. There are four different types of certificates: authority certificates, personal certificates, trusted site certificates, and device certificates. During a secure connection, a server may send a server certificate to your device. Upon receipt, it is checked through an authority certificate stored in your device. You receive notification if the identity of the server is not authentic or if you do not have the correct certificate in your device.

You can download a certificate from a web site, or receive a certificate as a message. Certificates should be used when you connect to an online bank or a remote server to transfer confidential information. They should also be used if you want to reduce the risk of viruses or other malicious software, and to check the authenticity of software when you download and install software to your device.

Tip: When you add a new certificate, check its authenticity.

View certificate details

You can only be sure of the correct identity of a server when the signature and the validity period of a server certificate have been checked.

To view certificate details, open a certificate folder, and select a certificate and Options > Certificate details.

One of the following notes may appear:

Certificate not trusted - You have not set any application to use the certificate. You may want to change the trust settings.

Expired certificate - The period of validity has ended for the selected certificate.

Certificate not valid yet - The period of validity has not yet begun for the selected certificate.

Certificate corrupted - The certificate cannot be used. Contact the certificate issuer.

Certificate trust settings

Select Menu > Ctrl. panel > Settings and General > Security > Certificate management.

Trusting a certificate means that you authorize it to verify web pages, e-mail servers, software packages and other data. Only trusted certificates can be used to verify services and software.

Important: Even if the use of certificates makes the risks involved in remote connections and software installation considerably smaller, they must be used correctly in order to benefit from increased security. The existence of a certificate does not offer any protection by itself; the certificate manager must contain correct, authentic, or trusted certificates for increased security to be available. Certificates have a restricted lifetime. If "Expired certificate" or "Certificate not valid yet" is shown, even if the certificate should be valid, check that the current date and time in your device are correct.

Before changing any certificate settings, you must make sure that you really trust the owner of the certificate and that the certificate really belongs to the listed owner.

To change the trust settings, select a certificate and Options > Trust settings. Scroll to an application field, and press the scroll key to select Yes or No. You cannot change the trust settings of a personal certificate.

Depending on the certificate, a list of applications that can use the certificate is displayed:

Symbian installation - New Symbian operating system application.

Internet - E-mail and graphics.

App. installation - New Java application.

Online certif. check - Online certificate status protocol.