A common feature of the known mechanisms is to use a secret code to check whether a secure application module is allowed to access an application, indicated by a unique identifier, on the integrated circuit card. Whenever a secure application module wishes access to this application this secret ...