. "Because this system is applicable to networks where the identification of a user is important for such applications as sending electronic mail or controlling access to the network or particular data to authorized users, it is important that individual users be recognized." . . .