发明名称 Method and system for validating a virtual asset
摘要 Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data.
申请公布号 US9390288(B2) 申请公布日期 2016.07.12
申请号 US201314070050 申请日期 2013.11.01
申请人 Intuit Inc. 发明人 Gryb Oleg;Whitehouse Jinglei;Shanmugam Elangovan;Jain, III Ankur;Basler Mark;Lietz M. Shannon;Philip Sabu Kuruvila;Cabrera Luis Felipe;Bishop Thomas
分类号 H04L29/06;G06F21/64;G06F21/44;G06F21/57 主分类号 H04L29/06
代理机构 Hawley Troxell Ennis & Hawley LLP 代理人 Hawley Troxell Ennis & Hawley LLP ;McKay Philip
主权项 1. A system for validating a virtual asset comprising: at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for validating a virtual asset, the process for validating a virtual asset including: generating, by a virtual asset creation system, virtual asset creation data, the virtual asset creation data including primary virtual asset data associated with the virtual asset itself, and/or the operation of the virtual asset, and/or the operating environment of the virtual asset; generating secondary authentication data, the secondary authentication data including personal data regarding the owner of an account associated with the virtual asset; transferring, by the virtual asset creation system, primary virtual asset data and the secondary authentication data from the virtual asset creation template to a virtual asset validation system, via a first communications channel; launching, by the virtual asset creation system using the virtual asset creation data, the virtual asset of the virtual asset creation data, the launch process including transferring the secondary authentication data from the virtual asset creation template to the virtual asset validation system, the launch process further including transferring, by the virtual asset creation system, via a second communications channel, at the time of the launch of the virtual asset, the secondary authentication data into the virtual asset; transferring, via a third communication channel, primary virtual asset data and the secondary authentication data from the virtual asset to the virtual asset validation system; processing and analyzing, during a boot-up process for the virtual asset when the virtual asset is first launched, the primary virtual asset data from the virtual asset creation template and the primary virtual asset data from the virtual asset to determine if the primary virtual asset data from the two sources match, or have a defined threshold level of similarity; processing and analyzing, during a boot-up process for the virtual asset when the virtual asset is first launched, the secondary authentication data from the virtual asset creation template and the secondary authentication data from the virtual asset to determine if the secondary authentication data from the two sources match, or have a defined threshold level of similarity; upon determining, during a boot-up process for the virtual asset when the virtual asset is first launched, that the primary virtual asset data from the virtual asset creation template and the primary virtual asset data from the virtual asset, and/or one or more sources associated with the virtual asset, match, or have a defined threshold level of similarity and the secondary authentication data from the virtual asset creation template and the secondary authentication data from the virtual asset match, or have a defined threshold level of similarity, transforming a status of the virtual asset to a status of validated virtual asset; and providing, following the status of the virtual asset being transformed to the status of validated asset, and still during the boot-up process during a boot-up process for the virtual asset when the virtual asset is first launched, secrets required for boot-up to the virtual asset.
地址 Mountain View CA US