Examples of Token Request in a sentence
In the event Publisher desires to distribute password-protected codes representing “tokens” (a “Token Promotion”) that are redeemable by users for Online Content downloads from Xbox Live (“Content Tokens”) as part of promotional activities related to a Software Title using Xbox Live Marketplace, Publisher shall submit to Microsoft a Content Token Request form available in the Xbox 360 Publisher Guide (“Token Form”) for approval by Microsoft.
He hopes that those with an ethnic minority background will become more active, so he will not remain as unique.
In phase 2 subjects repeatedly played an incentivized competitive game that we call the ‘1-6 Token Request game’.
In each of the five repetitions of the Baseline game, subjects played the 1-6 Token Request game against a randomly selected anonymous opponent from the same school, who could be of any age between five and twelve (random re- matching).
How many tokens are you going to ask for?We restricted the strategy set compared to Arad and Rubinstein (2012)’s 11-20 Money Request game to aid the understanding of the game by our younger subjects.30,31Just as in Arad and Rubinstein (2012)’s 11-20 Money Request game, the 1-6 Token Request game has no pure-strategy Nash equilibrium.
As noted there, subjects also played the 1-6 Token Request game a single time against the computer, which chose numbers uniform randomly: this ‘Computer game’ is described in Web Appendix V.4, with results reported in Web Appendix XIII (Tables A.30 to A.35).
The procedure that allows C to get access to a protected resource is the following:1) C sends a Token Request message to the AS.2) If C is authorized AS generates and sends to C the Access Token (opaque to C) and Client Information (e.g. contains the key bound to the PoP access token).
C sends to AS a COSE-Encrypted CBOR Token Request containing the COSE_Key (MSG 3).
The MSP must have the following items before user IDs and passwords are issued to the SUBSCRIBER: The MiCJIN Administrator/Application Request (RI-092A); This original, completed MiCJIN User Agreement (RI-093); SecurID Token Request (RI-092C), if required and, System access granted by this Agreement is non-transferable by the above named SUBSCRIBER and its operator(s), staff, or employees to another operator, work site, or agency and is revoked upon the SUBSCRIBER’S termination of this Agreement.
The user submits (e.g., via a webform) her email address to web server in the Token Request message.