Security Tokens and Shortcomings in Security Protocols