Immutable cryptographically secured ledger-backed databases
First Claim
Patent Images
1. A computer-implemented method, comprising:
- under control of one or more computer systems configured with executable instructions,committing a first reference to a blockchain ledger, the first reference at least including an asset reference, such that the first reference as committed to the blockchain ledger cannot be modified;
providing, to a requestor, access to the first reference as a record in a database table, wherein the blockchain ledger is exposed as the database table via an interface, the database table formatted according to a database representation wherein one or more fields of the database table are defined by a schema committed to the blockchain ledger;
receiving, via the interface, a request to update information associated with the first reference and to update the database representation associated with the asset reference;
determining that the first reference includes a key associated with the information, verifying one or more permissions associated with the request;
verifying the one or more permissions, generating a second reference that includes the asset reference, a second key reflecting updated information as requested, and the updated database representation;
committing the second reference to the blockchain ledger, such that the second reference as committed to the blockchain ledger cannot be modified; and
providing, to the requestor, access to the record such that the record reflects at least the updated information in the second reference.
1 Assignment
0 Petitions
Accused Products
Abstract
A database table, such as may be implemented by a non-relational database, is provided to present information and states associated with that information as memorialized in a cryptographically secured ledger. The semantics of the database table elements, as well as the relationships between various objects therein, may be defined and/or enforced by a schema, a database engine, and/or an application layer. For example, the disclosed methods and systems may be used to implement an asset tracking tool that does not require trust of the implementing system for verification of the system'"'"'s contents.
220 Citations
20 Claims
-
1. A computer-implemented method, comprising:
under control of one or more computer systems configured with executable instructions, committing a first reference to a blockchain ledger, the first reference at least including an asset reference, such that the first reference as committed to the blockchain ledger cannot be modified; providing, to a requestor, access to the first reference as a record in a database table, wherein the blockchain ledger is exposed as the database table via an interface, the database table formatted according to a database representation wherein one or more fields of the database table are defined by a schema committed to the blockchain ledger; receiving, via the interface, a request to update information associated with the first reference and to update the database representation associated with the asset reference; determining that the first reference includes a key associated with the information, verifying one or more permissions associated with the request; verifying the one or more permissions, generating a second reference that includes the asset reference, a second key reflecting updated information as requested, and the updated database representation; committing the second reference to the blockchain ledger, such that the second reference as committed to the blockchain ledger cannot be modified; and providing, to the requestor, access to the record such that the record reflects at least the updated information in the second reference. - View Dependent Claims (2, 3, 4)
-
5. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by one or more processors of a computer system, cause the computer system to at least:
-
generate a cryptographically secured ledger for accepting a transaction associated with an asset; generate a database table, according to a database table schema, that reflects a state of the asset in connection with the transaction committed to the cryptographically secured ledger, wherein the database table schema is based at least in part on information tracked in the cryptographically secured ledger; and process a transaction associated with the asset by at least; confirming a permission associated with the transaction by at least verifying a signature associated with the transaction; committing, to the cryptographically secured ledger, the transaction; and updating, based on a state of the cryptographically secured ledger, the database table to reflect a new state of the asset resulting from the transaction. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
at least one computing device that implements one or more services, wherein the one or more services; generate a cryptographically secured ledger for accepting a transaction associated with an asset; generate a database table, according to a database table schema, that reflects a state of the asset in connection with the transaction committed to the cryptographically secured ledger, wherein the database table schema is based at least in part on information tracked in the cryptographically secured ledger; and process the transaction associated with the asset by at least; confirming a permission associated with the transaction by at least verifying a signature associated with the transaction; committing, to the cryptographically secured ledger, the transaction; and updating, based on a state of the cryptographically secured ledger, the database table to reflect a new state of the asset resulting from the transaction. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
Specification