×

Generation of hash values within a blockchain

  • US 10,075,298 B2
  • Filed: 08/11/2017
  • Issued: 09/11/2018
  • Est. Priority Date: 06/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:

  • obtaining, with one or more processors, a plurality of records to be protected;

    forming, with one or more processors, a tamper-evident log configured to prevent an attacker from undetectably modifying any of the plurality of records stored in the tamper-evident log, wherein;

    the tamper-evident log comprises a plurality of entries sequentially added to the tamper-evident log at different times in a sequence of the entries specified by the tamper-evident log;

    each entry comprises;

    an identifier that distinguishes among the entries,a respective record among the plurality of records,an identifier of a previous consecutive record relative to the respective record in the sequence of the entries specified by the tamper-evident log,a cryptographic hash value based on both a record and a cryptographic hash value of the previous consecutive entry relative to the respective record in the sequence of the entries specified by the tamper-evident log;

    the cryptographic hash value of a given entry in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries;

    the cryptographic hash value of the given entry is formed by selecting which types of parameters are input into a cryptographic hash function used to calculate at least some of the cryptographic hash values such that parameters that specify a position in the sequence are excluded;

    storing, with one or more processors, the tamper-evident log in memory; and

    splitting the tamper-evident log at or adjacent the given entry into a newer tamper-evident log and an older tamper-evident log, wherein cryptographic hash values in both the newer tamper-evident log and the older tamper-evident log are valid with respect to protected records after splitting, wherein;

    the selected types of parameters exclude time, date, and order in the sequence of the entries specified by the tamper-evident log;

    the selected types of parameters include records logged by the tamper-evident log of which the plurality of records are respective instances;

    the cryptographic hash function is configured by supplying a lambda function;

    splitting comprises changing pointers between entries in the newer tamper-evident log without changing cryptographic hash values in the newer tamper-evident log;

    the cryptographic hash value of at least a plurality of entries in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries; and

    different cryptographic hash function implementations are used for different cryptographic hash values of different entries.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×