A device used to provide an added layer of security for sensitive data. The trusted device performs a variety of critical cryptographic functions like key management, encryption, decryption, authentication and verification of digital signatures.