2.5.2.1 Token/Authorization Context Algorithms