Reshaping user authentication and identity verification