. . "The method according to claim 2, further including providing an unsecured name associated with the device. 22." . .