. . "However, when the hashing takes relatively little time, such as 10 seconds for example, the process can repeat itself so that the data verification in RAM is in effect, continuous. [0062] To verify the message digest 228 a two-step process is used." . .