A method of unauthorized person identification in a particular area of an entity includes maintaining a database of
identification data specific to the person and condition of entries and time period, providing a unique description for each person
enabling access to the person identification data in the database.