Verifiable redactable audit log
First Claim
Patent Images
1. A computer-implemented method comprising:
- accessing first log data;
determining first random or pseudo-random data;
determining first combined data based at least on the first log data and the first random or pseudo-random data;
calculating a first log entry hash based at least on the first combined data;
calculating a first log summary hash associated with the first log data, the first log summary hash based at least on the first log entry hash and a second hash, wherein the second hash is associated with log data that was previously signed with a first ephemeral key;
generating a first log entry, the first log entry comprising the first log entry hash and the first log summary hash;
calculating a second log entry hash based at least on second log data;
calculating a second log summary hash associated with the second log data, the second log summary hash based at least on the second log entry hash;
generating a second log entry based at least on the second log data;
generating a digital signature with a second ephemeral key verifying at least part of the first log entry and the second log entry; and
storing the first log entry and the second log entry.
8 Assignments
0 Petitions
Accused Products
Abstract
A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.
132 Citations
21 Claims
-
1. A computer-implemented method comprising:
-
accessing first log data; determining first random or pseudo-random data; determining first combined data based at least on the first log data and the first random or pseudo-random data; calculating a first log entry hash based at least on the first combined data; calculating a first log summary hash associated with the first log data, the first log summary hash based at least on the first log entry hash and a second hash, wherein the second hash is associated with log data that was previously signed with a first ephemeral key; generating a first log entry, the first log entry comprising the first log entry hash and the first log summary hash; calculating a second log entry hash based at least on second log data; calculating a second log summary hash associated with the second log data, the second log summary hash based at least on the second log entry hash; generating a second log entry based at least on the second log data; generating a digital signature with a second ephemeral key verifying at least part of the first log entry and the second log entry; and storing the first log entry and the second log entry. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer storage medium storing computer executable instructions that when executed by a computer hardware processor perform operations comprising:
-
accessing first log data; determining first random or pseudo-random data; determining first combined data based at least on the first log data and the first random or pseudo-random data; calculating a first log entry hash based at least on the first combined data; calculating a first log summary hash associated with the first log data, the first log summary hash based at least on the first log entry hash and a second hash, wherein the second hash is associated with log data that was previously signed with a first ephemeral key; generating a first log entry, the first log entry comprising the first log entry hash and the first log summary hash; calculating a second log entry hash based at least on second log data; calculating a second log summary hash associated with the second log data, the second log summary hash based at least on the second log entry hash; generating a second log entry based at least on the second log data; generating a digital signature with a second ephemeral key verifying at least part of the first log entry and the second log entry; and storing the first log entry and the second log entry. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A computer system comprising:
-
one or more hardware computer processors programmed, via executable code instructions, to; access first log data; determine first random or pseudo-random data; determine first combined data based at least on the first log data and the first random or pseudo-random data; calculate a first log entry hash based at least on the first combined data; calculate a first log summary hash associated with the first log data, the first log summary hash based at least on the first log entry hash and a second hash, wherein the second hash is associated with log data that was previously signed with a first ephemeral key; generate a first log entry, the first log entry comprise the first log entry hash and the first log summary hash; calculate a second log entry hash based at least on second log data; calculate a second log summary hash associated with the second log data, the second log summary hash based at least on the second log entry hash; generate a second log entry based at least on the second log data; generate a digital signature with a second ephemeral key verify at least part of the first log entry and the second log entry; and store the first log entry and the second log entry. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
Specification