In a method for controlling access to data stored on a smart card, an
external request for communication with the smart card is received via a
first communication interface. The external request for communication may
be a request for communication over a second communication interface, for
example, from a smart card reader. Private data from the smart card is
transmitted via the second communication interface responsive to
authentication of a user of the smart card. Related devices are also
discussed.