. . "In a computer system comprising a memory containing computer information or a first computer program stored in a controlled memory area to which access is granted only upon proper authentication of an authorized user of the computer system, the user including a person or a second computer program, the memory further including a stored control program for interacting with a user and for making a de" . . .