摘要 |
<p>The method involves receiving an electronic message (N1) by a checker (P), and generating a message (N2), where the electronic message has protected and unprotected contacts. The message (N2) is transmitted to a transmitter (S), which compares protected contacts of the message (N2) with unprotected contact of the electronic message. A message (N3) is generated and transmitted to the checker for verification of authenticity of the electronic message when the protected contacts of the message (N2) correlate with unprotected contact of the electronic message.</p> |