What are the latest techniques in authenticating or authorizing a particular Android device? Specifically, is there an example of an authorization technique similar to that