Patent attributes
Techniques are disclosed for transmitting a secure message over a public or untrusted network. The techniques include receiving a message and creating multiple hash values of the message. A sending device signs and encrypts the message and hash values, then encapsulates and transmits to the message and hash values a security server. The security server receives and de-encapsulates the message and hash values, decrypts the message and hash values, and verifies the signature. The security server verifies the hash values and determines whether any changes were made to the message during transmission. If verified, the security server processes the message for transmission to the recipient. The security server creates multiple hash values of the original message, signs and encrypts the message and the hash values, encapsulates the message and hash values and transmits to a recipient device for further verification and presentation to the recipient.