CPC H04L 9/3247 (2013.01) [G06F 7/725 (2013.01); G06F 16/27 (2019.01); G06Q 20/0655 (2013.01); G06Q 20/3674 (2013.01); G06Q 20/3825 (2013.01); G06Q 20/3829 (2013.01); H04L 9/0861 (2013.01); H04L 9/30 (2013.01); G06Q 2220/00 (2013.01); H04L 9/50 (2022.05)] | 12 Claims |
10. A computer-implemented method comprising:
generating, by a node, a modified private key based on data that was previously unknown at a time a previous transaction was generated and a private key;
generating a cryptographic signature for a blockchain transaction referencing digital assets locked by a locking script using the modified private key;
adding the cryptographic signature and the data to the blockchain transaction; and communicating the blockchain transaction to another node;
wherein the locking script specifies a public key for a determined data source and includes instructions to cause a validating node executing the locking script to evaluate a source of data provided in an unlocking script by: a) generating a modified public key based on the public key for the determined data source and based on data defined in the unlocking script; and b) evaluating a cryptographic signature in the unlocking script based on the modified public key;
wherein the locking script further defines one or more data constraints and wherein the locking script further includes instructions to cause the validating node to invalidate a blockchain transaction that includes the unlocking script when the one or more data constraints are not satisfied by the data; and
wherein the one or more data constraints define one or more values and a comparison function that performs a comparison based on the data and the one or more values.
|