. . "Also, a trusted process checks whether a user or other process has the right to access it, before allowing such access." . .