Sometimes an attacker doesn't need to steal the physical token in order to duplicate it.
有时,攻击者不必盗取物理标记来复制它。
2
When the Claim Check service returns a token, the token is stored into the Order data object, into the same field that was used to store the logical attachment.
When the Claim Check service returns a token, the token is stored inside the Order data object, into the same field that was used to store the physical attachment.