; (d) in response to a second electronic communication from the requesting entity including a request to access a second controlled resource, authenticating the second electronic communication by validating the digital signature with a public key to determine if the requesting entity is an authenticated entity; (e) in response to authenticating the second electronic communication, determining a se