The user's fingerprint is analyzed by the pattern matching module which draws
upon pre-stored fingerprint data that may be encrypted. The pattern matching module
work in conjuntion with an authorization module and resource access module to ascertain
a user's authorization level or security level and then give the user access to
only those computer resources for which he or she has been granted authorization.
The system preferably employs inter-modular encryption so that the system can be
distributed across a network if desired.