A method for verifying the identity of a new-user of a computer system, comprising
the steps of receiving at least one identity attribute from the new-user; similarity
searching the at least one new-user identity attribute against at least one database
of denied-user identity attributes; receiving a similarity search result; determining
a positive or negative match between the at least one new-user identity attribute
and the denied-user identity attributes; allowing the new-user to access the computer
system, where a negative match has been determined; and denying the new-user access
to the computer system, where a positive match has been determined.