| http://www.w3.org/ns/prov#value | - For example, authentication of the Monopoly bonus game software can be verified by sending randomly generated seed data with the Monopoly software data block, running it through a secure hash algorithm such as SHA-1, and verifying the resulting message digest at the receiving end.
|