9 Control equipment, namely, computer hardware, peripherals, and software for identifying, authenticating, verifying, disclosing, reporting, and authorizing users, user capacity, and user transactions; Control equipment, namely, computer hardware, peripherals, and software for providing security access to computer and global communication systems; Equipment for identifying, authenticating, verifying, disclosing, reporting, and authorizing users, user capacity, and user transactions, namely, hardware security modules, embedded controllers, and microprocessors; Equipment for providing security access to computer and global communication systems, namely, hardware security modules, embedded controllers, and microprocessors; Computer software for providing security access to locked doors in homes and buildings; Computer software for identifying, authenticating, verifying, disclosing, reporting and authorizing users access to a secure computer system