. "The authentication logic executed by the present system and discussed herein may be used in applications such as but not limited to online banking, secure online e-commerce, and VPN access control." . . .