http://www.w3.org/ns/prov#value | - While the present invention has been particularly described with reference to FIGS. 1-4 as well as Appendix 1, and with emphasis on certain language in implementing a method to protect against the unauthorized use of software application in a computer network environment, it should be understood that they are for illustration only and should not be taken as limitation upon the invention.
|