. . . "For example, the identification information can be used to perform functions such as asset management, inventory tracking, access control, and others." . . . .