. . . "For example, a user may input a PIN to identify the user and then be required to provide additional information, such as a voice sample, a fingerprint, a password, a RFID, etcetera, for use in confirming the user is the user associated with the PIN.The identification information may be utilized for determining if visitation communication is to be allowed and/or for such purposes as associating a r" .