Multiple authentication methods for a device or system can work together in the background so that you rarely ever need to actually provide deliberate authentication.