. . . " of various embodiments can be used in applications other than computing platform security; and thus, various embodiments are not to be so limited." .