Patent attributes
According to an example embodiment, a method may include, in response to an idle time of a computing device meeting or exceeding a power-save time threshold value, placing the computing device into a low-power state; in response to receiving an input to the computing device after the computing device has been placed into the low-power state, exiting the low-power state; determining whether the idle time meets or exceeds a lockout threshold value that is greater than the power-save time threshold value; after having exited from the low-power state, if the idle time meets or exceeds the lockout threshold value, requiring a user to perform a successful predetermined authentication to the computing device before allowing the user to access applications in the computing device; and if the idle time does not meet or exceed the lockout threshold value, allowing the user to access applications in the computing device without requiring the user to perform the successful predetermined authentication to the computing device.