摘要 |
Known methods for being capable of carrying out, with the same data carrier, various authentication processes are based on non-standardized data carriers (smart cards) on which there are stored two different access codes. Per first authentication process, a first user generates a first user code which is compared to a version, transformed by way of a transformation, of a first access code stored on the data carrier. Per second authentication process, a second user generates a second user code which is compared to a version, transformed by way of the transformation, of a second access code stored on the data carrier. By now having the transformation in this case take place, per other authentication process, by way of another transformation, there may be used, for different authentication processes, the same worldwide standardized data carrier on which there is stored only one access code. The first/second user then once again generates the first/second user code, which is compared to a version transformed by way of a first/second transformation of the only access code stored on the data carrier./!
|