摘要 |
<p>The device has a transparent developer (1) e.g. plastic transparent credit card, and a challenge configured in a manner such that a secret code that appears visually on a screen of a computer by correspondence between marked cases (120) and a data zone (11), is converted into another secret code. The conversion of the former code is made by successive data selection of the former code by a user, in a matrix of software buttons/touchscreens, using a pointing device. Each button/touchscreen is visually or univocally associated to data of another zone (13) by transparency of the developer. Independent claims are also included for the following: (1) a method for identifying a user of a local/remote computer system or program (2) a computer program comprising a code for implementing a method of identifying a user of a local/remote computer system or program.</p> |