International Business Machines Corporation
PROTECTING SENSITIVE DATA
Last updated:
Abstract:
An example operation may include one or more of capturing a current version of sensitive data by a data processor node, hashing, by the data processor node, the current version of the sensitive data, storing, by the data processor node, a hash of the current version of the sensitive data on a first blockchain, encrypting, by the data processor node, the current version of the sensitive data using a secret key, and storing the encrypted current version of the sensitive data on a second blockchain.
Status:
Application
Type:
Utility
Filling date:
24 Mar 2020
Issue date:
30 Sep 2021