9 Computer software utilizing biometrics and other authentication technologies for use in controlling access to computers and applications, encryption of files and data, secure e-mail and electronic communications, cryptographic key management, securing access to web sites and servers on the global computer network, validating financial transactions, and controlling access to restricted areas and equipment