The token key, together with other components discussed below, is used to construct authentication messages and to generate and re-create in a ???just in time??? fashion unique per sensitive data item encryption keys. [0058] In one embodiment, the server is an application running on a service provider's host.