http://www.w3.org/ns/prov#value | - However, other types of devices may also be used to implement an embodiment of FIG. 1B. In a step 170, the user may configure associated computing device 130 to include a security feature that secures access or protects data on the associated computing device 130.
|