"the present invention; and FIG. 7 is a flow diagram illustrating cryptographic policy enforcement according to one embodiment of the present invention." . . . .