摘要 |
<p>The method involves storing personalization information in a secure element (158) by reading personalization information from ID token (106), generating a nonce by ID provider computer system (136) for personalization information, storing nonce in a database, writing data read from ID token personalization information and/or derived value and nonce over network to secure element through legitimate ID provider computer system. The data stored in personalization information is verified and personalized secure elements are activated for use by a terminal program. An independent claim is included for a computer system.</p> |