A method for activating an encryption control device that is in communication
with
a computer for providing a secure computing environment for a user is provided.
The method initiates with providing a card for insertion into a card reader of
the encryption control device. The card is configured to receive and pass data.
Next, a biometric identifier is received from the user. The biometric identifier
enables validation of the user as the authorized owner of the card. Then, a challenge/response
protocol between the encryption control and the inserted card is run. The challenge/response
protocol establishes that the card and the encryption control device are compatible.
Next, an encryption engine of the encryption control device is activated to create
a secure computing environment if the user is validated as the authorized owner
of the card and the challenge/response protocol is successfully executed.