| CPC G06Q 20/3825 (2013.01) [G06Q 20/065 (2013.01); G06Q 20/3827 (2013.01); G06Q 20/4014 (2013.01)] | 20 Claims |

|
1. An information security device comprising: a memory operable to store:
real-world account information associated with a first user, wherein the real-world account information identifies a number of available real-world resources; virtual account information associated with the first user, wherein the virtual account information identifies a number of available virtual resources that can be used in a virtual environment; a token map that comprises a set of tokens associated with a second elements, wherein each token from among the set of tokens is mapped to a respective element, wherein the respective element comprises a physical location in a real-world, a physical location in a virtual environment, a physical attribute associated with a user, or a gesture; and a blockchain record comprising a plurality of transfers for a blockchain; and a processor operably coupled to the memory, configured to:
receive an authentication request from the first user; identify a pixel location within the virtual environment of an avatar associated with the first user as a first authentication factor for the avatar; identify a gesture performed by the avatar as a second authentication factor for the avatar; obtain a first authentication token, from the token map, based on a first element associated with the avatar in the virtual environment, wherein the first element includes one of the pixel location of the avatar in the virtual environment or the gesture performed by the avatar associated with the first user within the virtual environment; obtain a second authentication token, from the token map, based on a second element associated with the first user in the real world, wherein the second element includes one of physical attributes information for the first user or gestures performed by the first user within the real world; and the second element is different from the first element; generate a third authentication token for the first user using the first authentication token and the authentication second token; verify an identity of the first user based at least in part upon the third authentication token; and upon verifying the identity of the first user, receive an interaction request from the first user, wherein:
the interaction request indicates a request to allow the first user to interact with a second user within the virtual environment; the interaction request comprises an address for a contract stored in the blockchain; and the contract comprises machine-executable instructions comprising: instructions for transferring real-world resources between the first user and a second user; and instructions for transferring virtual resources between the first user and the second user; access the machine-executable instructions associated with the contract; before executing the contract, determine a projected number of virtual resources for the first user based on the number of available virtual resources for the first user and the machine-executable instructions for transferring virtual resources between the first user and the second user in the contract; before executing the contract, determine a projected number of real-world resources for the first user based on the number of available real-world resources for the first user and the machine-executable instructions for transferring real-world resources for the first user and the second user in the contract; output the projected number of virtual resources to the first user;
output the projected number of real-world resources to the first user; and send instructions to the contract, wherein sending the instructions to the contract: initiates a transfer of the real-world resources between the first user and the second user; and initiates a transfer of the virtual resources between the first user and the second user.
|