Identity can be asserted in many different ways. Tapping cards for access or inserting one into a reader to encrypt an email are just a couple examples. But still the most common way an individual ...