Rather, it is the coincident sharing of those secrets concurrently with the requested access of information held within a particular system, especially if the secrets are shared by a separate route from the rest of the requests made, which serves to establish the unique validity of the claimant's request.
ECONOMIST: Fake ID cards