A method for verifying the identity of users connected to a computer
network comprises providing fractional information queries to users,
wherein responses to these individual queries are not sufficient to
identify the user. This method further comprises receiving responses to
these fractional information queries and comparing these responses to
data available from within a computer network. A set of potential matches
to the user is generated according to these responses and is used in
determining whether the set of potential matches is sufficient to
identify the user.