Use Cases
- Ecosystem Control through Device Authentication
- Validation of OEM accessories and disposable attachments through Device Authentication
- IoT Cloud Authentication
- Prevention of accessory Cloning through Device Authentication
The online versions of the documents are provided as a courtesy. Verify all content and data in the device’s PDF documentation found on the device product page.