. . . "Either stored on the token or provided by the subscriber, the PIN (preferably encrypted by the server's public key) is used to identify the individual token to the server. [0040] In one embodiment, in the case of such a system that only handles passwords, the server is an application running on a service provider's host." . .