Trusted consumers are often authorized for unrestricted access to resources on a system, but must be authenticated so that the access control system can make the access approval decision.
For example, a client showing proper identification credentials to a bank teller is asking to be authenticated that he really is the one whose identification he is showing.
The security agreement must be authenticated by the debtor, meaning that it must either bear the debtor's signature, or it must be electronically marked.
Although these claims may have some merit, they are nonetheless presented from a biased position that can not be authenticated by traditional and reliable sources.