摘要 |
<p>The method involves attempting to login by inputting a user identification. A set of requirements in a user profile (P1) is verified and a determination is made whether both access password and access authorization hardware lock e.g. dongle, are necessary for successful login. A coding of both the password and the dongle or coding of only the password is verified. Login is successfully completed if the requirements are satisfied. An independent claim is also included for a system for performing a method of logging a user in a user-terminal.</p> |