53 Chapter3
Figure 3.22: User Authentication