http://www.w3.org/ns/prov#value | - Once the group has been identified, the second phase comprises writing all the data, for example, from groups in the corresponding zones of the memory 5, in particular including the PIN and the secret code S inscribed into the secret memory zone Z1.
|