A security system and method is provided. An embodiment includes a
security access device that includes a first transmitter for transmitting
authentication to a computer and a second transmitter for transmitting
verification information to a computer. The first transmitter is
typically active and consumes power from the access device, while the
second transmitter is typically passive, and consumes less or nil power
from the access device. When the security access device is initially
brought proximal to the computer and activated, the authentication
information is sent to the computer and the user is logged in.
Periodically, the computer will query the passive transmitter for
verification information, to ensure that the security access device is
still proximal to the computer.