193
Continued on next page
i-mode
・
To check a Chara-den character
→
P.367
・
To set a Chara-den character
→
P.369
・
To control a Chara-den character
→
P.368
・
To shoot a Chara-den character
→
P.371
■
Infrared data exchange function
i-mode terminal can exchange information such as phonebook entries, mail and bookmarks with
mobile phones, PC and other devices equipped with infrared data exchange function.
*
Using an i-
α
ppli in conjunction with the Infrared data exchange function allows you to link up with other
devices equipped with Infrared data exchange functions, expanding the range of uses for your FOMA
terminal. For example, a mobile phone can be used as a TV remote control or as a corporate ID.
*: Depending on the remote device, it may not be possible to exchange some types of data even
where the device has an Infrared data exchange function.
To use the Infrared data exchange function
→
P.392
■
SSL communication
SSL is an encryption technology that is used to protect your privacy in data transmissions. Data
sent to or received from an SSL page is encrypted to prevent hackers from eavesdropping, site
spoofing*, or altering the data, thus making credit card transactions and the sending of personal
information safer. There are 2 types of SSL communication. In one, SSL certification authority (CA)
(SSL certificates) stored in the i-mode terminal are used to display SSL compatible sites (SSL
pages) without requiring the user to perform any special procedures. In the other, user certificates
downloaded from the FirstPass Center are used to display SSL compatible sites (SSL pages). The
type of certificate used depends on the site.
→
P.199
・
To view sites using SSL certificates stored in the i-mode terminal
→
P.199
・
To use FirstPass user certificates
→
P.224
Videophone
Videophone
Videophone call
Chara-den video
Camera video
Keypad operation
Download
Chara-den
IP
Content
1
2
3
4
5
6
7
8
9
*
0
#
i-mode terminal
Infrared-enabled
mobile phone
PC
etc.
Infrared-enabled equipment
i-mode terminal
i-mode Center
Spoofing
*
Eavesdropping
Alteration
IP
Encryption
Decryption
Encryption
Decryption
* Spoofing: A security attack that allows an adversary to observe all information
entered into forms by the victim.
Summary of Contents for N901iS
Page 78: ......
Page 96: ......
Page 140: ......
Page 190: ......
Page 322: ......
Page 416: ......
Page 468: ......
Page 563: ...561 Appendix Memo ...
Page 564: ...562 Appendix Memo ...
Page 565: ... Quick Search Index Quick Manual ...