Mechanisms exist to enforce cryptographic communications keys to prevent one key from being used to access multiple devices.