| http://www.w3.org/ns/prov#value | - FIG. 17 illustrates an alternative implementation in which the remote access device 110 is not represented by a secure physical token 120, but rather requires the user to enter a password or obtains other identifying data such as biometric data.
|