摘要 |
Technologies are generally described for an automatic log-in function control scheme. In some examples, a method performed under control of an end device may include detecting, from the end device, input of one or more passcodes to access the end device; determining that a user of the end device is not an authorized user based at least in part on a detected behavioral pattern in connection with the input of the one or more passcodes; and disabling an automatic log-in function of at least one application that is hosted on the end device. |