Certificate manager
Important: Note that even if the use of
certificates makes the risks involved in remote
connections and software installation considerably
smaller, they must be used correctly in order to benefit
from increased security. The existence of a certificate
does not offer any protection by itself; the certificate
manager must contain correct, authentic, or trusted
certificates for increased security to be available.
Certificates have a restricted lifetime. If Expired
certificate or Certificate not valid yet is shown even if
the certificate should be valid, check that the current
date and time in your device are correct.
Before changing any certificate settings, you must
make sure that you really trust the owner of the
certificate and that the certificate really belongs to the
listed owner.
Digital certificates are used to verify the origins of
software but do not guarantee safety. There are three
different types of certificates: authority certificates,
personal certificates, and server certificates. During a
secure connection, a server may send a server
certificate to your device. Upon receipt, it is checked
through an authority certificate stored on your device.
You receive notification if the identity of the server is
not authentic or if you do not have the correct
certificate in your device.
Download a certificate from a web site, or receive a
certificate as an e-mail attachment, or as a message
sent through a Bluetooth or infrared connection.
Certificates should be used when you connect to an
online bank or a remote server to transfer confidential
information. They should also be used if you want to
reduce the risk of viruses or other malicious software,
and to check the authenticity of software when you
download and install software to your device.
Tip: When you add a new certificate, check its
authenticity.