A computer system including a processor, an access token communicator
capable of being coupled to the processor and adapted to read an access
token, an input device coupled to the processor that is able to receive
verification data that confirms authorized access of the access token,
and software executable on the processor that includes instructions to
control access to the processor and including code to access the access
token and the verification data, code to verify the validity of the
access token using the verification data, code to set security policies
in the processor, and code to control access to resources in the
processor based on the security policies. In addition, a method for
reading an access token, verifying the validity of the access token,
setting security policies in a computer system, and unlocking a computer
system and a nonvolatile storage device attached to the computer system.