A method and apparatus for transferring data in response to authentication
information. Authentication information is transmitted from a client
computer to a server computer to authorize access to restricted data.
Invocation information is transmitted from the server computer to the
client computer in response to the authentication information. A first
application is invoked in the client computer using the invocation
information. The restricted data is then transmitted from the server
computer to the first application program in the client computer based on
the access authorized by the authentication information.