摘要 |
Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data. |
主权项 |
1. A system for validating a virtual asset comprising:
at least one processor; and at least one memory coupled to the at least one processor, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process for validating a virtual asset, the process for validating a virtual asset including: generating, by a virtual asset creation system, virtual asset creation data, the virtual asset creation data including primary virtual asset data associated with the virtual asset itself, and/or the operation of the virtual asset, and/or the operating environment of the virtual asset; generating secondary authentication data, the secondary authentication data including personal data regarding the owner of an account associated with the virtual asset; transferring, by the virtual asset creation system, primary virtual asset data and the secondary authentication data from the virtual asset creation template to a virtual asset validation system, via a first communications channel; launching, by the virtual asset creation system using the virtual asset creation data, the virtual asset of the virtual asset creation data, the launch process including transferring the secondary authentication data from the virtual asset creation template to the virtual asset validation system, the launch process further including transferring, by the virtual asset creation system, via a second communications channel, at the time of the launch of the virtual asset, the secondary authentication data into the virtual asset; transferring, via a third communication channel, primary virtual asset data and the secondary authentication data from the virtual asset to the virtual asset validation system; processing and analyzing, during a boot-up process for the virtual asset when the virtual asset is first launched, the primary virtual asset data from the virtual asset creation template and the primary virtual asset data from the virtual asset to determine if the primary virtual asset data from the two sources match, or have a defined threshold level of similarity; processing and analyzing, during a boot-up process for the virtual asset when the virtual asset is first launched, the secondary authentication data from the virtual asset creation template and the secondary authentication data from the virtual asset to determine if the secondary authentication data from the two sources match, or have a defined threshold level of similarity; upon determining, during a boot-up process for the virtual asset when the virtual asset is first launched, that the primary virtual asset data from the virtual asset creation template and the primary virtual asset data from the virtual asset, and/or one or more sources associated with the virtual asset, match, or have a defined threshold level of similarity and the secondary authentication data from the virtual asset creation template and the secondary authentication data from the virtual asset match, or have a defined threshold level of similarity, transforming a status of the virtual asset to a status of validated virtual asset; and providing, following the status of the virtual asset being transformed to the status of validated asset, and still during the boot-up process during a boot-up process for the virtual asset when the virtual asset is first launched, secrets required for boot-up to the virtual asset. |