people identify and approve security concepts and passwords, encrypted fingerprints, virtual technology, and intelligent developers Big data storage