METHOD, APPARATUS, AND SYSTEM FOR SERVICE DATA PROCESSING AND VERIFICATION
First Claim
1. A computer-implemented method for detecting data tampering, comprising:
- identifying particular data associated with performance of a service by a service system;
generating fingerprint data as a result of executing a fingerprint function on the particular data, wherein the fingerprint function is configured to always produce the fingerprint data when executed on the particular data, and wherein the fingerprint function is configured to always produce different fingerprint data when executed on data different from the particular data;
storing the fingerprint data in a blockchain maintained by a blockchain network;
storing the particular data in a storage device in the service system;
after storing the fingerprint data to the blockchain and storing the particular data in the storage device;
generating verification fingerprint data as a result of executing the fingerprint function on the particular data stored in the storage device;
determining that the verification fingerprint data matches the fingerprint data stored in the blockchain; and
in response to determining that the verification fingerprint data matches, determining that the particular data stored in the storage device has not been modified since it was stored.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for detecting data tampering are described. One example method includes identifying particular data associated with a service system; generating fingerprint data as a result of executing a fingerprint function on the particular data; storing the fingerprint data in a blockchain maintained by a blockchain network; storing the particular data in a storage device in the service system; after storing the fingerprint data to the blockchain and storing the particular data in the storage device: identifying a request to verify that the particular data stored in the storage device has not been modified since it was stored; generating verification fingerprint data as a result of executing the fingerprint function on the particular data stored in the storage device; determining that the verification fingerprint data matches the fingerprint data stored; and in response, determining that the particular data stored in the storage device has not been modified since it was stored.
1 Citation
20 Claims
-
1. A computer-implemented method for detecting data tampering, comprising:
-
identifying particular data associated with performance of a service by a service system; generating fingerprint data as a result of executing a fingerprint function on the particular data, wherein the fingerprint function is configured to always produce the fingerprint data when executed on the particular data, and wherein the fingerprint function is configured to always produce different fingerprint data when executed on data different from the particular data; storing the fingerprint data in a blockchain maintained by a blockchain network; storing the particular data in a storage device in the service system; after storing the fingerprint data to the blockchain and storing the particular data in the storage device; generating verification fingerprint data as a result of executing the fingerprint function on the particular data stored in the storage device; determining that the verification fingerprint data matches the fingerprint data stored in the blockchain; and in response to determining that the verification fingerprint data matches, determining that the particular data stored in the storage device has not been modified since it was stored. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
identifying particular data associated with performance of a service by a service system; generating fingerprint data as a result of executing a fingerprint function on the particular data, wherein the fingerprint function is configured to always produce the fingerprint data when executed on the data to be stored, and wherein the fingerprint function is configured to always produce different fingerprint data when executed on data different from the data to be stored; storing the fingerprint data in a blockchain maintained by a blockchain network; storing the particular data in a storage device in the service system; after storing the fingerprint data to the blockchain and storing the particular data in the storage device; generating verification fingerprint data as a result of executing the fingerprint function on the particular data stored in the storage device; determining that the verification fingerprint data matches the fingerprint data stored in the blockchain; and in response to determining that the verification fingerprint data matches, determining that the particular data stored in the storage device has not been modified since it was stored. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; identifying particular data associated with performance of a service by a service system; generating fingerprint data as a result of executing a fingerprint function on the particular data, wherein the fingerprint function is configured to always produce the fingerprint data when executed on the data to be stored, and wherein the fingerprint function is configured to always produce different fingerprint data when executed on data different from the data to be stored; storing the fingerprint data in a blockchain maintained by a blockchain network; storing the particular data in a storage device in the service system; after storing the fingerprint data to the blockchain and storing the particular data in the storage device; generating verification fingerprint data as a result of executing the fingerprint function on the particular data stored in the storage device; determining that the verification fingerprint data matches the fingerprint data stored in the blockchain; and in response to determining that the verification fingerprint data matches, determining that the particular data stored in the storage device has not been modified since it was stored. - View Dependent Claims (20)
-
Specification