摘要 |
<p>Methods are described whereby multiple users can swap a controller (10) of consumer devices between themselves frequently, whilst each retains the ability to reinstate their own customized controller interface through a quick and simple yet secure log-on procedure. Stored data accessible to the controller (10) is used to automatically upon log-on return a user to a system state associated with that user, which is typically the system state of the controller (10) that existed the last time the user logged on thereto. The log-on procedure may include fingerprint and/or voice recognition. Additionally, time-out algorithms wherein the controller (10) automatically shuts down and/or logs-off the current user as a security measure to prevent unauthorized users from gaining access thereto, may take into account factors other than merely the amount of time that has passed during which there has been no activity.</p> |