. . . . "FIGS. 2A and 2B is a flow chart of the authenticator program contained in memory 9 of computer 12." .