A user or computer system proves its identity through authentication. Authentication is possible, for example, through knowledge (password), through possession (e.g., an access card), or through biometric characteristics (e.g., iris structure, fingerprints, or similar). The basis for authentication is a corresponding private key.