nity of an authorized user, and disabling the electronic equipment when access or operation is attempted by someone other than an authorized user. [0022] This security system may find particular application for devices such as personal digital assistants (PDA's, cellular telephones, and other devices) in which the value of the content and insuring its security often vastly exceeds the value of the