摘要 |
To restrict access to a computer system the computer system is responsive to entry of identification data to generate a display (X). The user overlays on the display a security device (Y) that, in combination with the display (X), discloses an access code (Z) to the user. |