Such a system is clearly superior to existing token-based systems wherein authenticating information, such as biometrics or personal bodes, is stored on and can be recovered from the token, and wherein the actual identity determination is potentially in operational contact with the user during the access process.