Abstract: Disclosed is a computing system and method for protecting access to a particular resource. The computing device can identify a first cryptographic token in a first digital wallet. The first cryptographic token is configured to provide access to a particular resource. The computing device can generate a second cryptographic token bound to the first cryptographic token. The computing device can transfer the second cryptographic token to a second digital wallet based on the first cryptographic token. The computing device can access the particular resource based on the second cryptographic token being in the second digital wallet.