Other illustrative examples may include invocation of some identity authentication application requiring an authentication process for access or operation such as some manual action taken by an individual accessing a computerized, electronic or automated device, including pressing a ???hard??? or ???soft??? button on a computerized system or device, accessing a biometric device or employing some m