![Janam XT2 Скачать руководство пользователя страница 22](http://html1.mh-extra.com/html/janam/xt2/xt2_user-manual_3312457022.webp)
XT2 Setup
XT2
User Manual
Janam Technologies LLC Version 3, April 2017
XT2 Setup 3—7
Additional Screen Security Settings
Users can tailor screen lock security according to their preferences (or company policy) at
Settings
>
Security
>
Screen lock
. Among the available options are:
!
Automatic screen lock
(can be set from immediately to 30 minutes)
!
Power button instant lock
(screen instantly locks when power button is pushed)
!
Owner info on lock screen
(instant identification of device)
In addition, there is a SmartLock feature that changes locking depending
on certain circumstances. This can make using your XT2 both more con-
venient
and
more secure.
!
On-body detection
(device stays unlocked as long as it is held or carried around)
!
Trusted places
(device stays unlocked within defined geographic areas)
!
Trusted devices
(device stays unlocked when close to, for example,
a Bluetooth watch, or a Bluetooth-equipped vehicle)
!
Trusted face
(uses face recognition to unlock, with other method as a backup)
!
Trusted voice
(say “Ok Google” and the device detects your voice)
Device Encryption
Android 5.x “Lollipop” allows full encryption of accounts, settings, down-
loaded apps and their data, media, and other files. When encryption is
turned on for the first time, it may take an hour or more for the encryption
process to complete. Once encrypted, any device protected with a PIN,
password or swipe pattern can only be decrypted with the correct code.
SIM/RUIM Card Lock Settings
SIM/RUIM (Removable User Identity Module, used by CDMA networks)
cards can be locked with a separate PIN. That precludes uses of the cellular
connection without the correct PIN code.
Device Administration
If you lose your XT2, you can use
Android Device Manager
to locate the
device, and also ring, lock, or erase the device.
Unknown Sources
By default, Android only allows installation of apps from known sources, like Google Play and other
major app stores. Allowing installation from unknown sources presents a possible security risk.
Credentials Storage
Installs and displays “credentials” used for secure transaction.