When the customer at the remote terminal is determined to be the authorized holder of the identification card presented at the terminal, the secret data along with account number and other data are transmitted to the host or central computer over a communication line.