While some configurations may be configured to implement this functionality into an existing device such as a cellular telephone or keyless entry remote, other configurations may be configured to provide a separate device configured to send a user identifier to the environment.