| http://www.w3.org/ns/prov#value | - In this case, the request is a read request and access is allowed even if the service processor is locked to another HSC. In other words, the process in FIG. 5 allows for a read access to occur even if the service processor is locked for use by another HSC. [0052] The example illustrated by FIG. 5 provides for an override capacity, which is initiated by a terminal, such as an HSC. This over
|