| CPC G06Q 20/4016 (2013.01) [G06Q 20/02 (2013.01); H04L 9/50 (2022.05)] | 20 Claims |

|
1. A method comprising, by one or more servers associated with a blockchain cybersecurity platform:
receiving, by a cybersecurity authentication service of the blockchain cybersecurity platform, transaction data associated with a protected first function of a first blockchain transaction protocol associated with a first user and a first blockchain network;
accessing, by the cybersecurity authentication service of the blockchain cybersecurity platform, a transaction protocol runbook associated with the first user and the first blockchain transaction protocol, wherein the transaction protocol runbook comprises one or more preconfigured conditions associated with the protected first function;
determining, by the cybersecurity authentication service, that each preconfigured condition is satisfied for the protected first function based at least in part on the received transaction data;
generating, via a blockchain transaction simulation module, one or more transaction simulations for the protected first function based at least in part on the transaction data, wherein each transaction simulation indicates one or more predicted outcome states associated with the first blockchain network based on the protected first function being executed based on the received transaction data;
determining, by the cybersecurity authentication service, that the protected first function should be authenticated based at least in part on one or more of the generated transaction simulations and the determination that each preconfigured condition is satisfied; and
transmitting, by the cybersecurity authentication service, to the first blockchain network, responsive to the determination that the protected first function should be authenticated, a transaction bundle configured to update a second blockchain transaction protocol associated with the blockchain cybersecurity platform and the first blockchain transaction protocol to indicate that the protected first function is authenticated.
|