[1]http://www.newsfactor.com/perl/story/19028.html Token encryption. If a user wearing the system's security token walks away from his or her laptop, the system senses it and begins securing the computer by encrypting all data. If the user then returns within range, the computer begins unlocking data so work can resume. "Its safe,its very safe!" MM. References 1. http://www.newsfactor.com/perl/story/19028.html