| CPC G06F 16/1734 (2019.01) [G06F 16/182 (2019.01); G06F 16/185 (2019.01); G06F 16/1865 (2019.01); G06Q 20/0658 (2013.01); H04L 9/0637 (2013.01)] | 20 Claims |

|
1. A computer-implemented method comprising:
generating a plurality of access limits for a user account within an authenticated data structure of a distributed digital ledger transaction network, each access key limit of the plurality of access limits being defined by a user of the user account and comprising one or more of an access key limit and a threshold number of access keys that are different than respective access key limits and threshold numbers of access keys of other access limits in the plurality of access limits;
identifying a first request for a first transaction associated with the user account and comprising a first access key, a cryptographic signature being applied to the first request using a private key associated with the user account;
determining that the first access key is subject a first access limit of the plurality of access limits, the first access limit comprising one or more of a first access key limit and a first threshold number of access keys; and
executing the first transaction in response to verifying the signature applied to the request using a public key associated with the user account and determining that the first transaction satisfies the one or more of the first access key limit and the first threshold number of access keys.
|