Infrastructure for implementing some embodiments of the method 300 is presently available, and can include: general purpose computers; computer programming tools and techniques; computer networks and networking technologies; digital storage media; and authentication, access control, and other security tools and techniques provided by public keys, encryption, firewalls, and/or other means.