Abstract
A method, computer system, and a computer program product for identifying a hacked database is provided. The present invention may include generating a marked account using a plurality of data. The present invention may then include initiating a first transaction using the generated marked account. The present invention may also include determining that a second transaction has occurred using the generated marked account. The present invention may further include receiving notification of the second transaction based on determining that the second transaction occurred.
| Original language | English |
|---|---|
| Patent number | US2019065784 |
| IPC | H04L 29/ 06 A I |
| Priority date | 25/10/18 |
| State | Published - 28 Feb 2019 |
Fingerprint
Dive into the research topics of 'IDENTIFYING STOLEN DATABASES'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver