"The user ID can be confirmed 450 by accessing a key or other data (e.g., one or more of the identifiers described above) that has been previously stored in local storage using the user's ID. For example, the application execution environment can make a request to a local storage encryption interface provided by an operating system of the computing apparatus to determine if the key or other data ca" . . . .