. "In order to determine whether a person or device attempting to access or perform a transaction with a host computer system is a person or device entitled to access, most host computer systems require the person or device to provide information confirming identity." . . . .