"As electronic commerce and other operations that demand greater security become more commonplace, increasing the reliability and simplicity of authentication of newly added and/or re-configured computing devices is desirable." . . . .