×

Using a tree structure to segment and distribute records across one or more decentralized, acylic graphs of cryptographic hash pointers

  • US 10,193,696 B2
  • Filed: 03/10/2018
  • Issued: 01/29/2019
  • Est. Priority Date: 06/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations configured to expedite retrieval of records written to persistent storage, the operations comprising:

  • receiving, with one or more processors, a first request to store a record from a computing entity;

    encoding, with one or more processors, the record in a first plurality of segments;

    arranging, with one or more processors, the first plurality of segments in respective content nodes of a first content graph, wherein;

    each segment is stored in a different content node of the first content graph;

    directed content edges of the first content graph connect respective pairs of the content nodes of the first content graph;

    the directed content edges define a plurality of directed paths through the first content graph by which each of the segments is reachable from a first root content node of the first content graph; and

    at least some content nodes of the first content graph have two or more content edges of the first content graph pointing to two or more respective other content nodes of the first content graph;

    storing, with one or more processors, the content nodes of the first content graph in a verification graph, wherein;

    the verification graph comprises a plurality of verification nodes;

    the content nodes and content edges are stored as content of the verification nodes;

    respective pairs of the verification nodes are connected by respective directed verification edges; and

    the verification graph is configured to indicate tampering with any of a plurality of records stored in the verification graph; and

    returning, with one or more processors, a first identifier of the first root content node to the computing entity, wherein the first identifier identifies a verification node of the verification graph storing the first root content node, wherein;

    the first content graph defines k-ary tree in which each content node of the k-ary tree has k or fewer child content nodes, wherein k is 2 or larger;

    arranging the first plurality of segments in the first content graph comprises iteratively, in a plurality of iterations, executing operations comprising;

    obtaining a set of the first plurality of segments to be arranged;

    determining a size of the set;

    selecting 1/k of the size of the set from the set to form a selected subset;

    arranging the selected subset in a current level of a hierarchy of the first content graph;

    removing the subset from the set of the first plurality of segments to be arranged; and

    designating a next level higher than the current level of the hierarchy as the current level;

    the operations comprise;

    receiving a second request to store a revised version of the record from the computing entity, the second request being associated with the first identifier of the first root content node;

    encoding the revised version of the record in a second plurality of revised segments, wherein a first subset of the revised segments are identical to corresponding ones of the first plurality of segments and a second subset of the revised segments are different from corresponding ones of the first plurality of segments;

    arranging the second subset of segments in a second content graph that partially overlaps the first content graph, wherein;

    the overlap includes at least some content nodes storing respective segments of the first subset previously stored in the verification graph;

    the second content graph includes a second root content node;

    the second content graph does not include the first root content node;

    both content nodes storing the second subset of segments and the at least some content nodes storing respective segments of the first subset are reachable in the second content graph from the second root node; and

    content nodes storing the second subset of segments are not reachable from the first root content node of the first content graph;

    storing the second subset in the verification graph without re-writing the at least some content nodes storing respective segments of the first subset to the verification graph; and

    returning a second identifier of the second root content node to the computing entity;

    the directed verification edges correspond to cryptographic hash pointers based on content of respective verification nodes to which respective cryptographic hash pointers point;

    content of verification nodes includes respective cryptographic hash values of respective cryptographic hash pointers of respective edges of respective verification nodes; and

    encoding the record in a first plurality of segments comprises partitioning a bitstream of, or based on, a file into the plurality of segments.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×