Securing The Use Of Sensitive Data On Remote Devices Using A Hardware-Software Architecture