A user authentication method includes creating an authentication key in the form of a user formula, presenting a user with an arrangement of variables, each assigned a value, applying the assigned values to matching variables in the user formula and calculating a first result, and authenticating the user if the first result matches a second result of a separate and independent calculation of the user formula.

 
Web www.patentalert.com

> System and method for delivering encrypted information in a communication network using location identity and key tables

~ 00304