Watch this video on YouTube
What process does an operating system follow to verify the authenticity of signed code?