Hacking multifactor authentication Identity authentication Indigenization and authentication Chinese porcelain authentication Integrated circuit authentication