A wireless communication device is implemented with a smart card module to
secure the transmission of sensitive or confidential information. The
user of the device must request permission to activate an application on
the smart card module from a remote source. After this first level of
security is satisfied, the application on the smart card module enables
the user to scan data via a machine-readable medium in order to make a
data request to the remote source. If a second level authorization is met
in regard to the data request, the remote source will transmit the
requested sensitive or confidential information to the user to view
and/or update.