| http://www.w3.org/ns/prov#value | - The three levels of authentication are based upon 1) ???what a claimant knows???, such as, for example, a user name and password; 2) ???what a claimant has,??? such as, for example, a cryptographic token or a smart card with secret information; and 3) ???what a claimant is???, such as, for example, biometrics information including fingerprints and retinal prints.
|