PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Any known verification protocol can be used for this purpose, including simple comparison of a secret user password with a stored list, encrypted handshaking protocols of the type commonly used in cellular telephone systems and described in Canadian patent 1242501, public key protocols and the like. [0033]FIG. 5A is a flowchart illustrating steps employed in authorizing remote scheduling operation
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com