Methods and systems perform authentication based at least in part of the
context of the transaction. In one embodiment, the context can be
determined and trigger different rules with regard to access to the
information or ability to immediately execute the transaction. In another
embodiment, a method can include registering a device as a trusted
device. The device can include a biometric input module. Biometric data
can be used to authenticate a user, and the user may be requested to
resubmit biometric data during the same session. In a further embodiment,
a hacker may obtain unauthorized access to a victim's account
information. The hacker may not be authenticated because he would not
have access to a currently valid credential.