803983.fig.002
Figure 2: Diagram of the proposed authentication method.