Samsung SCH-I905 User Manual (user Manual) (ver.f4) (English) - Page 81

Settings, Location & security, Con lock, screen, Not secured, Use visible pattern, Timeout

Page 81 highlights

Lock Screen Configure lock screen Choose settings for unlocking your screen. For more information about using the lock and unlock features, see "Securing Your Device" on page 10. 1. From the Home screen, touch Apps ➔ Settings ➔ Location & security. 2. Touch Configure lock screen for these settings: • Off: Disable all lock settings, so the screen will never lock. • Not secured: The default lock level. Touch to remove security Pattern, PIN or Password. • Pattern: A screen unlock pattern is a touch gesture you create and use to unlock your device. Follow the prompts to create or change a screen unlock pattern. • PIN: Select a PIN to use for unlocking the screen. • Password: Create a password for unlocking the screen. 3. Touch Use visible pattern to show the unlock pattern as you draw it to unlock the screen. 4. Touch Timeout to have the screen lock immediately after the screen turns off. To set the screen timeout period, see "Timeout" on page 71. 5. Touch Use tactile feedback to have the device vibrate for your screen unlock gestures. 6. Touch Owner info to enable display of your own text on the lock screen. Touch the text field to enter text for the display. Encryption Encrypt tablet As a security measure, you can encrypt the contents of your device and require a PIN or password to decrypt the contents each time you turn it on. 1. From the Home screen, touch Apps ➔ Settings Settings ➔ Location & security. 2. Touch Encrypt tablet to start encryption. Follow the prompts to complete encryption. Settings 74

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123

Settings
74
Lock Screen
Configure lock screen
Choose settings for unlocking your screen. For more information
about using the lock and unlock features, see
“Securing Your
Device”
on page 10.
1.
From the Home screen, touch
Apps
Settings
Location & security
.
2.
Touch
Configure lock
screen
for these settings:
• Off
: Disable all lock settings, so the screen will never lock.
Not secured
: The default lock level. Touch to remove security
Pattern, PIN or Password.
• Pattern
: A screen unlock pattern is a touch gesture you create and
use to unlock your device. Follow the prompts to create or change a
screen unlock pattern.
• PIN
: Select a PIN to use for unlocking the screen.
• Password
: Create a password for unlocking the screen.
3.
Touch
Use visible pattern
to show the unlock pattern as you
draw it to unlock the screen.
4.
Touch
Timeout
to have the screen lock immediately after
the screen turns off. To set the screen timeout period, see
“Timeout”
on page 71.
5.
Touch
Use tactile feedback
to have the device vibrate for
your screen unlock gestures.
6.
Touch
Owner info
to enable display of your own text on the
lock screen. Touch the text field to enter text for the
display.
Encryption
Encrypt tablet
As a security measure, you can encrypt the contents of your
device and require a PIN or password to decrypt the contents
each time you turn it on.
1.
From the Home screen, touch
Apps
Settings
Settings
Location & security
.
2.
Touch
Encrypt tablet
to start encryption. Follow the
prompts to complete encryption.