identity approach to
increase mobile entity protection and control; e)
consolidate multiple individual aspects
supported by separate
security solutions and methods to date; and f) create a
holistic control system capable of storing, processing, communicating,
and monitoring the plethora of (electronic, RF, video, etc.) signals and
characteristics individually existing today.