9 Entry and exit security portals comprised of passageways equipped with devices for identification, verification, and detection functionalities; wireless controllers to remotely monitor and control the function and status of other electrical, electronic, and mechanical devices or systems, namely, appliances, vehicles, vehicle tracking devices, energy and utility systems, security systems, and lighting systems; wearable devices, namely, magnetically encoded, and RFID tag encoded rings, watches, and bands, intended for identity recognition, identity verification, and event entry purposes, both in a peer-to-peer and centralized formats; downloadable computer software for personal detection, identity verification, and entrance into buildings, rooms, offices, secured locations, and events; ultra-wide-band technology-enabled devices, namely, encoded identity cards, electronic card readers, computer hardware, and barcode readers intended for accessing, managing, and providing identity verification; downloadable computer software for peer-to-peer identity verification, both in internal and external software applications and hardware