A secured facility is provided for putting valuable information
or documents so that it cannot be removed or can only be removed by
authorized individuals. Examples include the IBM Abyss processor for secure
network-based processing, password analysis components that take in
passwords and reveal only whether they were right or wrong, and drop boxes
used to place money in for night deposit.
Complexity: No major complexity issues arise in this context.