. . "Much of the infrastructure that can be used according to the present invention is already available, such as: general purpose computers; computer programming tools and techniques; computer networks and networking technologies; digital storage media; authentication, access control, and other security tools and techniques provided by public keys, encryption, firewalls, and/or other means; bank trans" . . .