security module for verifying the integrity of data that has been transmitted, stored, or otherwise exposed to possible unauthorized modification, for authenticating the identity of the sender of the data, for providing undeniable proof of the sender of the data or recipient of the data, for protecting the data through secure communication methods, and for limiting access to the data to only intended and authorized recipients