OP METHODS FOR SUCCESSFUL AUTHENTICATION WITHIN THE ELECTRONIC AGE