. . "However, when the hashing takes relatively little time, such as 10 seconds for example, the process can repeat itself so that the data verification in RAM is in effect, continuous. [0056] The bit string created from hashing the shared object is preferably unencrypted, as indicated above, but may be encrypted." . .