. "The method according to claim 27, wherein the token contains at least one of user registration information, identification information, or other information, andthe method further comprises the step of modifying a state of the server based on the information contained in the token. 31." . . .