Watch this video on YouTube
What is a common method for an access control system to authenticate an individual?