| http://www.w3.org/ns/prov#value | - When the user of the mobile phone, for example, later wants to make a remote connection to the other device of the BT-enabled link, e.g., through another network such as the Internet, the same BT authentication protocol is used as with the initial BT-link setup so that communication by unauthenticated devices may be prevented.
|