In place of transmitting information to a second institution or an institution having some previous relationship with a user, the information (e.g., an identification, a password) may be checked against a database, for example a database kept at an authentication service, or with a third party.