| http://www.w3.org/ns/prov#value | - iment described above in conjunction with the flow diagram of FIG. 3, as well as other alternatives and variants, can be found in the attached Appendix.It is to be appreciated that, although the information transmitted by the wireless authentication token 102 in the present embodiment comprises authentication information, such as a one-time password, the communication protocol shown in FIG. 3 is m
|