. . "In an alternate embodiment, information, intended only for specific targeted users or agencies, such as an insurance company, is encrypted with the person's private key and the targeted agency's public key." . .