| http://www.w3.org/ns/prov#value | - The security system and method are principally based on a correlative comparison of a unique biometric sample, such as a finger print or voice recording, gathered directly from the person of an unknown user with an authenticated unique biometric sample of the same type obtained from each authorized user.
|