PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • There are a number of biometric and other means that may be used for verifying that only the authorized user is handling the device, such as using a fingerprint scanner, voice recognition, image capture, a capacitive touch sensing device, and secondary identification and detection devices, such as RFID cards, tokens, and bracelets as well as identification and transaction certificates.
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com