As the user enters, the transmitted user authenticating data is compared with the authenticating data of the person entering the facility (user's fingerprint, iris, voice, face, or other substantially unique physical data) to ensure that the person entering the facility is the user authorized to do so (i.e., there is a match of the transmitted data with the data received (scanned) as the person en