Animated slide, details are lost in printed reproduction

1.A hash over the data, including a timestamp, is signed by querying agent with shared secret. And put on the wire.
2.The hash data is verified using the same secret by the receiving agent; the fact that the signature matches proves integrity and authenticates the source of the data.
3.The receiving agent also signs the hash over the answer and returns it.
4.The querying agents verifies the answer signature.


Note: Keys are configured in the servers.
Transactions are signed: provides integrity an authentication.

Configuration details in part II