Generation of hash values within a blockchain
First Claim
Patent Images
1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:
- obtaining, with one or more processors, a plurality of records to be protected;
forming, with one or more processors, a tamper-evident log configured to prevent an attacker from undetectably modifying any of the plurality of records stored in the tamper-evident log, wherein;
the tamper-evident log comprises a plurality of entries sequentially added to the tamper-evident log at different times in a sequence of the entries specified by the tamper-evident log;
each entry comprises;
an identifier that distinguishes among the entries,a respective record among the plurality of records,an identifier of a previous consecutive record relative to the respective record in the sequence of the entries specified by the tamper-evident log,a cryptographic hash value based on both a record and a cryptographic hash value of the previous consecutive entry relative to the respective record in the sequence of the entries specified by the tamper-evident log;
the cryptographic hash value of a given entry in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries;
the cryptographic hash value of the given entry is formed by selecting which types of parameters are input into a cryptographic hash function used to calculate at least some of the cryptographic hash values such that parameters that specify a position in the sequence are excluded;
storing, with one or more processors, the tamper-evident log in memory; and
splitting the tamper-evident log at or adjacent the given entry into a newer tamper-evident log and an older tamper-evident log, wherein cryptographic hash values in both the newer tamper-evident log and the older tamper-evident log are valid with respect to protected records after splitting, wherein;
the selected types of parameters exclude time, date, and order in the sequence of the entries specified by the tamper-evident log;
the selected types of parameters include records logged by the tamper-evident log of which the plurality of records are respective instances;
the cryptographic hash function is configured by supplying a lambda function;
splitting comprises changing pointers between entries in the newer tamper-evident log without changing cryptographic hash values in the newer tamper-evident log;
the cryptographic hash value of at least a plurality of entries in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries; and
different cryptographic hash function implementations are used for different cryptographic hash values of different entries.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a process including: obtaining a plurality of records to be protected; forming a tamper-evident log configured to prevent an attacker from undetectably modifying any of the plurality of records stored in the tamper-evident log, wherein the cryptographic hash value of a given entry in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries; and storing the tamper-evident log in memory.
55 Citations
28 Claims
-
1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:
-
obtaining, with one or more processors, a plurality of records to be protected; forming, with one or more processors, a tamper-evident log configured to prevent an attacker from undetectably modifying any of the plurality of records stored in the tamper-evident log, wherein; the tamper-evident log comprises a plurality of entries sequentially added to the tamper-evident log at different times in a sequence of the entries specified by the tamper-evident log; each entry comprises; an identifier that distinguishes among the entries, a respective record among the plurality of records, an identifier of a previous consecutive record relative to the respective record in the sequence of the entries specified by the tamper-evident log, a cryptographic hash value based on both a record and a cryptographic hash value of the previous consecutive entry relative to the respective record in the sequence of the entries specified by the tamper-evident log; the cryptographic hash value of a given entry in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries; the cryptographic hash value of the given entry is formed by selecting which types of parameters are input into a cryptographic hash function used to calculate at least some of the cryptographic hash values such that parameters that specify a position in the sequence are excluded; storing, with one or more processors, the tamper-evident log in memory; and splitting the tamper-evident log at or adjacent the given entry into a newer tamper-evident log and an older tamper-evident log, wherein cryptographic hash values in both the newer tamper-evident log and the older tamper-evident log are valid with respect to protected records after splitting, wherein; the selected types of parameters exclude time, date, and order in the sequence of the entries specified by the tamper-evident log; the selected types of parameters include records logged by the tamper-evident log of which the plurality of records are respective instances; the cryptographic hash function is configured by supplying a lambda function; splitting comprises changing pointers between entries in the newer tamper-evident log without changing cryptographic hash values in the newer tamper-evident log; the cryptographic hash value of at least a plurality of entries in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries; and different cryptographic hash function implementations are used for different cryptographic hash values of different entries. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
obtaining, with one or more processors, a plurality of records to be protected; forming, with one or more processors, a tamper-evident log configured to prevent an attacker from undetectably modifying any of the plurality of records stored in the tamper-evident log, wherein; the tamper-evident log comprises a plurality of entries sequentially added to the tamper-evident log at different times in a sequence of the entries specified by the tamper-evident log; each entry comprises; an identifier that distinguishes among the entries, a respective record among the plurality of records, an identifier of a previous consecutive record relative to the respective record in the sequence of the entries specified by the tamper-evident log, a cryptographic hash value based on both a record and a cryptographic hash value of the previous consecutive entry relative to the respective record in the sequence of the entries specified by the tamper-evident log; the cryptographic hash value of a given entry in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries; the cryptographic hash value of the given entry is formed by selecting which types of parameters are input into a cryptographic hash function used to calculate at least some of the cryptographic hash values such that parameters that specify a position in the sequence are excluded; storing, with one or more processors, the tamper-evident log in memory; and splitting the tamper-evident log at or adjacent the given entry into a newer tamper-evident log and an older tamper-evident log, wherein cryptographic hash values in both the newer tamper-evident log and the older tamper-evident log are valid with respect to protected records after splitting, wherein; the selected types of parameters exclude time, date, and order in the sequence of the entries specified by the tamper-evident log; the selected types of parameters include records logged by the tamper-evident log of which the plurality of records are respective instances; the cryptographic hash function is configured by supplying a lambda function; splitting comprises changing pointers between entries in the newer tamper-evident log without changing cryptographic hash values in the newer tamper-evident log; and the cryptographic hash value of at least a plurality of entries in the tamper-evident log is sequence agnostic to the sequence of entries in virtue of being based on values that do not specify a position in the sequence of entries and different cryptographic hash function implementations are used for different cryptographic hash values of different entries. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification