In a preferred embodiment, we can use either the MAC algorithm based on MD5 or the one based on SHA, which are available in the ABA JCE cryptographic library under name HmacMD5 and HmacSHA. [0251] Although the embodiments of the invention described with reference to the drawings comprise equipments such as terminals, smart cards and mobile equipments, and methods performed in or by such equipments