| http://www.w3.org/ns/prov#value | - The method of claim 3, further including verifying the information contained in said accessible memory zone of the object by connecting the object to a terminal and determining that the image resulting from the encipherment of information with said encipherment function has been obtained by using said external datum and said secret datum, said method including the steps of:obtaining an intermediat
|