. . . . "FIGS. 6A and 6B are a flow diagram illustrating exemplary logic performed by a user computer for performing authentication in accordance with the present invention;" .