http://www.w3.org/ns/prov#value | - The hardware-based method of claim 1, wherein the method operation of performing the identity exchange includes, transmitting a challenge, the challenge including a nonce; receiving a response, the response including a first digest; computing a second digest using a one-way hash algorithm computed over the nonce and a secret key; and validating the response, wherein the identity exchange uses a on
|