Methods for ideal authentication