A system uses a resource locking token to allow various processes to have
exclusive access to a system resource. The process that receives the
token then requests that a local database be updated/synchronized with a
master database. The process continues checking the synchronization
status every time it gets the token. When the process receives the token
and the synchronization is complete, the local database is accessed and
the data is used in accessing the system resource. The token is then
returned to the system.