"Although illustrated with a key, any means can be used to provide a form of security to the SAP entry stored in the persistent mass storage 225." . . . . .