have used in the past for data communications with this (i.e. the local network 102) or another network; and 4) Authentication/Verification information including public and/or private key encrypted data (to be explained in more detail later) which the address server 120 can use to authenticate the identity of the requesting computer system (e.g. guest computer system 110 in this example).