"For example, in an access RFID application, host computer system 103 may compare the information received with those already stored in its database to determine whether access should be granted or denied to the individual." . . . .