In startup of more mobile devices including smartphones, tablet computers, and almost any other connected device, such as smart phones, smart cars, and even smart home gadgets, it is pertinent to implement secure measures to protect them against the cyber-crime of malicious third-party agents. Through this, the use of secured