Securing computing devices
Abstract:
Examples described herein relate to a system consistent with the disclosure. For instance, the system may comprise a display, a computing device, a display, an input mechanism commutatively coupled to the computing device, and an independent second processing resource to receive a password entry to unlock the computing device while the computing device is in a S5 state, determine a total number of incorrect password entry attempts to successfully unlock the computing device, save the total number of password entry attempts to a non-volatile memory of the independent second processing resource, and secure the computing device in response to a determination that the total number of incorrect password entry attempts exceeds a threshold value.
Public/Granted literature
Information query
Patent Agency Ranking
0/0