. . . "Generally, the software cryptographic lock or cryptographic signature analyzes a piece of boot code by performing a function, such as a hash function, upon the suspect boot code." .