The receiver makes a hash with the user's identifiers and checks it with the repository of hashes and if it is there then it allows the message to be delivered, otherwise it may be placed in another place including folders, spam repositories, deleted, etc.