|Embodiments of the present invention are directed toward authentication
systems, devices, and methods. Obfuscated executable instructions may
encode an authentication procedure and protect an authentication key. The
obfuscated executable instructions may require communication with a
remote certifying authority for operation. In this manner, security may
be controlled by the certifying authority without regard to the security
of the electronic device running the obfuscated executable instructions.