PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • If there is such a mechanism as to prevent others from identifying the kind of authentication data held on the key card, others who try to misappropriate the key IC card cannot use stolen cards unless they know which of a fingerprint, a voiceprint, a signature, a password or others is used as the authentication data, thereby reducing damage from stolen cards.
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com