A closely related project to “Connecting Sam”, where a special fail-proof secondary system handles
two main cases:
- If one is required to use the ID badge to be authorized, we should log it to improve performance.
- If one is recognized by Sam we should mimic the same signal as the card reader would emit to preserve the security system’s integrity.