Tools
110
Lock if SIM changed—You can set the device to ask for 
the lock code when an unknown SIM card is inserted into 
your device. The device maintains a list of SIM cards that 
are recognized as the owner’s cards.
Closed user group—You can specify a group of people to 
whom you can call and who can call you (network 
service).
When calls are limited to closed user groups, calls may be 
possible to the official emergency number programmed 
into your device.
Confirm SIM services—You can set the device to display 
confirmation messages when you are using a SIM card 
service (network service).
Glossary of PIN and lock codes
If you forget any of these codes, contact your service 
provider.
PIN code—This code protects your SIM card against 
unauthorized use. The PIN code (4 to 8 digits) is usually 
supplied with the SIM card. After three consecutive 
incorrect PIN code entries, the code is blocked, and you 
need the PUK code to unblock it.
UPIN code—This code may be supplied with the USIM 
card. The USIM card is an enhanced version of the SIM 
card and is supported by UMTS mobile phones.
PIN2 code—This code (4 to 8 digits) is supplied with some 
SIM cards, and is required to access some functions in your 
device.
Lock code (security code)—This code (5 digits) can be used 
to lock the device to avoid unauthorized use. The factory 
setting for the lock code is 12345. To avoid unauthorized 
use of your device, change the lock code. Keep the new 
code secret and in a safe place separate from your device. 
If you forget the code, contact your service provider.
PUK and PUK2 codes—These codes (8 digits) are required to 
change a blocked PIN code or PIN2 code, respectively. If 
the codes are not supplied with the SIM card, contact the 
operator whose SIM card is in your device.
UPUK code—This code (8 digits) is required to change a 
blocked UPIN code. If the code is not supplied with the 
USIM card, contact the service provider whose USIM card 
is in your device.
Certificate management
Digital certificates do not guarantee safety; they are used 
to verify the origin of software.
In the certificate management main view, you can see a 
list of authority certificates that are stored in your device. 
Press   to see a list of personal certificates, if available.
Digital certificates should be used if you want to connect 
to an online bank or another site or remote server for 
9247473_N93_UG_en_hk.book  Page 110  Tuesday, November 14, 2006  5:51 PM