In fact, the authentication techniques used to identity the king are similar to the identity-management techniques we apply in software and hardware to secure critical systems and applications.
FORBES: King Richard III: Villain, Hero, Or Tragic Victim Of Identity Theft?