TECHNIQUES FOR ENTERING CODES ON COMPUTING DEVICES

Techniques for securing a computing device are provided. An example method detecting contact with a touchscreen of the computing device, monitoring the contact with the touchscreen to determine whether the contact matches a predetermined pattern of movement, and performing one or more predetermined...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: HUYNH, Jean-Laurent Ngoc, VAUGHN, Joseph, SU, Shih-Chieh
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Techniques for securing a computing device are provided. An example method detecting contact with a touchscreen of the computing device, monitoring the contact with the touchscreen to determine whether the contact matches a predetermined pattern of movement, and performing one or more predetermined actions responsive to the contact with the touchscreen matching the predetermined pattern. The predetermined pattern includes a plurality of predetermined movements separated by pivot points. The pivot points represent a transition point in the predetermined pattern from a first type of movement to a second type of movement. The contact with the touchscreen can be broken at one or more of at least one pivot point, between a first instance of the first type of movement and a second instance of the first type of movement, or between a first instance of the second type of movement and a second instance of the second type of movement.