. "The token applies a cryptographic process, using the challenge and other information that is kept secret inside the token." . . .