摘要 |
<p>The method involves selecting n symbols of a secret code i.e. personal secret code, to be provided by a user, and collecting the provided secret code symbols. The provided secret code symbols are received. The provided secret code symbols are compared with symbols of secret code provided by a secure terminal i.e. bank payment terminal (T). Realization of function is authorized if the result of comparison is positive. Position information of the n symbols of the provided secret code is received in a sequence of m symbols of the provided secret code. Independent claims are also included for the following: (1) a secure terminal (2) a secure device coupled with a secure terminal (3) an authentication system.</p> |