“5. The computer-implemented method of claim 1, further comprising, prior to receiving the encrypted container and the token, authenticating, by the at least one processor, a user of the mobile device ...