This technique is compatible with existing technology such as the public key infrastructure and conventional certifying authorities so it does not require, in at least one non-limiting aspect, any widespread change to existing deployed host computers or other such arrangements.