| http://www.w3.org/ns/prov#value | - The notification information will normally include information, including the physical location of the stolen device as determined from the LCIS 534 as well as information on the time actual or attempted use of the stolen device was detected. [0141]FIG. 18 illustrates an exemplary service subscriber information database 1714 which may be used by the security server 1700.
|