9 Downloadable computer software for issuing and managing encrypted and digitally signed and authenticated identity; computer software in downloadable form for generating and managing secure identity representation data; mobile device software in downloadable form for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; near field communication (NFC) technology-enabled readers; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic locks; electronic relays; electronic switches; electronic strikes for remote control of door ingress and egress; entry and exit security portals comprised of passageways equipped with devices for identification, verification, and detection functionalities; wireless controllers to remotely monitor and control the function and status of other electrical, electronic, and mechanical devices or systems, namely, appliances, vehicles, vehicle tracking devices, energy and utility systems, security systems, and lighting systems; wearable devices, namely, magnetically encoded, and RFID tag encoded rings, watches, and bands, intended for identity recognition, identity verification, and event entry purposes, both in a peer-to-peer and centralized formats; downloadable computer software for personal detection, identity verification, and entrance into buildings, rooms, offices, secured locations, and events; ultra-wide-band technology-enabled devices, namely, RFID readers and tags, encoded identity cards and electronic card readers, computer hardware, and barcode readers intended for accessing, managing, and providing identity verification; downloadable computer software for peer-to-peer identity verification, both in internal and external software applications and hardware