Proving the identity of a human computer user is so yesterday — all those what-you-have, what-you-know and what-you-are questions. Biology is so trivial compared with well-designed authenticating ...