. . "However, the authentication may be done with any appropriate server and the report then transmitted to the supplier and other interested parties." . .