A logs in on computer B and gets a token, and then A logs in on computer C to get a token,. Now A has two token. Is there any way to invalidate the previous token? Otherwise, both computers can log in, how does the mainstream approach solve this problem?