Security system based on input shortcuts for a computer device
a security system and computer technology, applied in the field of information security, can solve the problems of security password, unscrupulous or other individuals may only require moments, and unauthorized individuals may come to access the device,
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020]In one aspect, the present application provides a method of activating security functions on a computer device, the computer device having a device state that may be realized by way of a first user input or a second user input. The method includes steps of defining a security rule, wherein the security rule comprises realization of the device state by way of the first user input; designating a security function associated with the security rule; detecting realization of the device state; and if the device state was realized by way of the second user input instead of the first user input, then activating the associated security function.
[0021]In another aspect, the present application provides a computer device. The computer device includes a controller for controlling the operation of the device; a user input interface for inputting information to the controller; a display coupled to the controller; a software module executable by the controller and configured to produce a dev...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


