A user authentication method includes creating an authentication key in
the form of a user formula, presenting a user with an arrangement of
variables, each assigned a value, applying the assigned values to
matching variables in the user formula and calculating a first result,
and authenticating the user if the first result matches a second result
of a separate and independent calculation of the user formula.