For decades, we have relied on a simple ‘two-pronged key' to allow us into virtually any computer system on the planet: the veritable userID/password combination.
First implemented in 1961 at Massachusetts Institute of Technology (MIT), this approach was a leading-edge paradigm to security at the time, but that was over 50 years ago.
In today's world, it has been proven time and again that this same basic authentication structure is an insufficient barrier to entry to most systems, from home banking, to gaming, to mission critical infrastructure. However, by and large we haven't progressed pass that old ‘two pronged key' approach to opening even the most important systems.