There are several ways to secure data transmission, and they all involve the use of data encryption and special keys used to read the information. The keys (also known as certificates) are usually stored in a dedicated database ¨C a certificate archive ¨C and are accessible to authorized users