Security These patterns deal with the question of how to secure devices and communication. Trusted Communication Partner Outbound-Only-Connection Permission Control Personal Zone Hub Whitelist Blacklist Remote Lock and Wipe