MARKAS388 Security requests are made to devices to find their security capabilities, after which the appropriate devices can be chosen. Following the natural asymmetry of USB, the host initiates all processes (except signaling), security being no exception. Both host and device can then proceed to authenticate using their unique keys; if the process succeeds, the host assigns a unique USB address to the device, after which the device becomes visible to the USB protocol. Furthermore, the UWB radio and associated bandwidth may be shared with other entities, and the host must make sure that the defined policies are satisfied; according to shared use (which may be coordinated to avoid interference) it will be able to offer full or partial functionality.|Coil Winding Technology