International Business Machines Corporation
Identity protection
Last updated:
Abstract:
An example operation may include one or more of connecting, by an identity protection node, to a blockchain network comprised of a plurality of user nodes, assigning, by the identity protection node, two sets of credentials to users of the plurality of the user nodes, monitoring, by the identity protection node, transactions initiated by the plurality of the user nodes, in response to a detection of an unauthorized transaction initiated by a user node of the plurality of the user nodes, invoking, by the identity protection node, the second set of the credentials of a user associated with the unauthorized transaction, and executing, by the identity protection node, a smart contract to apply the second set of the credentials against the first set of the credentials.
Utility
7 Jan 2019
7 Dec 2021