1. Mutual Authentication
2. Wrap Secret Keys Using the Device Physically Unclonable Function (PUF)
3. To Package Test
Unique Keys Embedded in Each Device
Secret Keys