. Once the relevant information is extracted, the tokens are placed back on the network to gain access.