Friday, August 20, 2010
To protect a device user, Apple's application -- “by identifying particular activities that may indicate suspicious behavior” that is, by comparing the photograph (identity), voice recording, or heartbeat of the person accessing the phone with that of the authorized user(s)-- will protect the authorized user.
0 Comments:
Post a Comment
<< Home