For example, the agent could control the host and allow such functionality as using a USB device as a key to a system to permit access to specified functions in the host or in other functional areas outside the host that the host has authorization to access or control, auto-backup in a system (e.g., a user could carry a portable mass storage device to then plug into the system and command a backup