. . . "uthenticated biometric sample of other authorized users stored within said secured computer system and generating a correlation factor of a first type for each comparison performed; d) analyzing each of the first type correlation factors so generated to determine whether the individual is an authorized user of the system; and e) confirming the determination of the unknown user's identity by matchi" .