. . . "In addition, the user must enter identifying information, such as a PIN code, to authenticate himself before access is allowed." .