4.3 Secure Device Identification