As yet another example, a user may access their token on the Internet using a computer, server, notebook or laptop computer, wireless computing device, personal digital assistant, or other processing system (i.e., computer), and use that token to access restricted areas of websites or other services.