stem, with failure to do so resulting in denied access, feigned access, or other actions, including an additional challenge and response to verify the identify of the user and the security status.Example 9Hotel Room AccessFor hotel patrons or others given access to a secured room, enhanced security can be provided in terms of room access using principles of the present invention.