The system reuses the classic User ID & Password combination for
authentication and adds a third component called a USE code for
additional authorization check, as an example. This method allows access
to a system when it is requested with correct User ID and Password (i.e.,
with correct pass code) but with an unauthorized USE code, the system
identifies it as an unauthorized access and triggers the proper security
measures to minimize the damage and monitor the actions in a way not to
alarm the unauthorized user who is using the owner's credential to access
the system. The USE Code is an extension to the pass code to raise
various alarms and have a stepwise access level control based on
different inputted values.