CPC H04L 9/3263 (2013.01) [G06F 16/2365 (2019.01); G06F 16/2379 (2019.01); H04L 9/0637 (2013.01); H04L 9/50 (2022.05)] | 20 Claims |
1. A computer-implemented method comprising:
identifying, with at least one processor, at least one database transaction that was initiated in response to a request by a user;
receiving, with at least one processor, a first changelog record associated with the at least one database transaction from a target blockchain of at least one changelog blockchain;
determining, with at least one processor, a public key associated with the user;
attempting, with at least one processor, a decryption of the first changelog record using the public key;
detecting, with at least one processor, tampering of the target blockchain for the at least one database transaction based on determining that the decryption of the first changelog record has failed; and
restoring, with at least one processor, at least part of the target blockchain with at least part of a verified changelog blockchain based on the tampering of the target blockchain.
|