http://www.w3.org/ns/prov#value | - The method set forth in any of claims 12 or 13 further comprising the steps of:encrypting the first information so that the first information is interpretable only by the third party; encrypting the third information so that the third information is interpretable only by the communications exchange; and encrypting the second information other than the third information so that that information is
|