Visa Inc.
System, method, and computer program product for detecting malicious changelog modifications with blockchain
Last updated:
Abstract:
Described are a system, method, and computer program product for detecting malicious changelog modifications with blockchain. The method includes receiving, from a computing device of a user, a request for a database transaction. The method also includes determining transaction-operative data associated with the database transaction and a user identifier. The method further includes generating an encrypted transaction record including the transaction-operative data and the user identifier. The method further includes broadcasting the encrypted transaction record to a changelog blockchain and, in response to receiving a confirmation of publication as a changelog record, initiating the database transaction. The method further includes receiving a verification request and the changelog record from a target blockchain. The method further includes determining a public key associated with the user, attempting to decrypt the changelog record using the public key and, based on the result, detecting tampering or verifying the target blockchain.
Utility
26 Feb 2020
9 Aug 2022