There are a number of biometric and other means that may be used for verifying that only the authorized user is handling the device, such as using a fingerprint scanner, voice recognition, image capture, a capacitive touch sensing device, and secondary identification and detection devices, such as RFID cards, tokens, and bracelets as well as identification and transaction certificates.