Settings110Personal identification number (PIN) code—This codeprotects your SIM card against unauthorized use. The PINcode (4 to 8 digits) is usually supplied with the SIM card.After three consecutive incorrect PIN code entries, thecode is blocked, and you need the PUK code to unblock it.UPIN code—This code may be supplied with the USIMcard. The USIM card is an enhanced version of the SIMcard and is supported by UMTS mobile phones.PIN2 code—This code (4 to 8 digits) is supplied with someSIM cards, and is required to access some functions inyour device.Lock code (also known as security code)—This code (5digits) can be used to lock the device to avoidunauthorized use. The factory setting for the lock code is12345. To avoid unauthorized use of your device, changethe lock code. Keep the new code secret and in a safeplace separate from your device. If you forget the code,contact your service provider.Personal unblocking key (PUK) code and PUK2 code—These codes (8 digits) are required to change a blockedPIN code or PIN2 code, respectively. If the codes are notsupplied with the SIM card, contact the network serviceprovider.UPUK code—This code (8 digits) is required to change ablocked UPIN code. If the code is not supplied with theUSIM card, contact the network service provider.Certificate managementDigital certificates do not guarantee safety; they are usedto verify the origin of software.In the certificate management main view, you can see alist of authority certificates that are stored in your device.Press to see a list of personal certificates, if available.Digital certificates should be used if you want to connectto an online bank or another site or remote server foractions that involve transferring confidential information.They should also be used if you want to reduce the risk ofviruses or other malicious software and be sure of theauthenticity of software when downloading and installingsoftware.Important: Even if the use of certificates makes therisks involved in remote connections and softwareinstallation considerably smaller, they must be usedcorrectly in order to benefit from increased security. Theexistence of a certificate does not offer any protection byitself; the certificate manager must contain correct,authentic, or trusted certificates for increased security tobe available. Certificates have a restricted lifetime. IfExpired certificate or Certificate not valid yet is showneven if the certificate should be valid, check that thecurrent date and time in your device are correct.