CPC H04L 63/1425 (2013.01) [G06F 16/9024 (2019.01); G06N 3/08 (2013.01)] | 17 Claims |
1. A computer-implemented method comprising:
representing a first identity profile from a first network as a first identity graph;
representing a second identity profile from a second network as a second identity graph, wherein the first identity profile and the second identity profile are decentralized identity profiles, wherein the first identity graph and the second identity graph are decentralized identity graphs;
representing a first neighborhood of nodes of the first identity graph as a first neighborhood vector and a second neighborhood of nodes of the second identity graph as a second neighborhood vector;
performing a contrastive loss analysis of the first identity graph to the second identity graph to describe similarities in the first and second neighborhood vectors;
determining a similarity score between the first identity profile and the second identity profile based on the similarities of the first and second identity graphs, wherein the similarity score is across multiple identity profiles represented in the decentralized identity graphs; and
implementing a security action based on the similarity score.
|