International Business Machines Corporation
PROTECTING SENSITIVE DATA

Last updated:

Abstract:

An example operation may include one or more of capturing a current version of sensitive data by a data processor node, hashing, by the data processor node, the current version of the sensitive data, storing, by the data processor node, a hash of the current version of the sensitive data on a first blockchain, encrypting, by the data processor node, the current version of the sensitive data using a secret key, and storing the encrypted current version of the sensitive data on a second blockchain.

Status:
Application
Type:

Utility

Filling date:

24 Mar 2020

Issue date:

30 Sep 2021