. . "For any system, network, process, machine, location, or other function to which access is desired to be restricted to only those who are authorized, the present invention provides a unique and reliable solution." . . . .