. . " user authentication functional process performed according to the invention; and FIG. 23 is a flow chart illustrating an exemplary compulsive use rejection functional process performed according to the invention." . . .