http://www.w3.org/ns/prov#value | - Therefore, the authentication method and system described above are particularly useful for authenticating boot code and game software for a video game console, although they are certainly useful for any computer system, including servers, desktop computers, telephone devices, etc.
|