A security system may be administered by interrogating a first user using
a first security system that generates a user data set related to the
first user's physiological characteristics. An access code may be
determined based on the user data set. A range of activities may be
enabled in accordance with the access code. A document related to the
user action may be accessed so that a digital certificate may be embedded
in the document using the user data set.