Return to Article Details Author's method of securing the screen of the mobile device. Download Download PDF