Figure 8: Architecture of the security module.