摘要 |
Disclosed is a method for a data terminal (100) to access one of a number of data objects (104), stored in an electronic device (102). The electronic device features an allocation table (106), in which cryptographic protocols (108) of different security levels are assigned to the different data objects, where each of the cryptographic protocols is used to authenticate the data terminal (100). The implementation of the cryptographic protocol assigned to one of the data objects in the allocation table is a condition for access by the data terminal to this data object. The method comprises the steps of: transmission (216) of a request by data terminal (100) to the electronic device for the one particular data object; specification (218) of a cryptographic protocol for the data object with the help of the allocation table, by the electronic device; implementation (222) of the cryptographic protocol by the electronic device and data terminal (100); and transmission (220) of the data object by the electronic device, where the electronic device (102) is integrated into an identifying document (114).
|