US 11,907,406 B2
Computer-implemented method and system of tamper-evident recording of a plurality of service data items
Holger Assenmacher, Eulenbis (DE)
Assigned to CRYPTOWERK CORP., Redwood City, CA (US)
Appl. No. 16/322,409
Filed by Cryptowerk Corp., Redwood City, CA (US)
PCT Filed Jul. 31, 2017, PCT No. PCT/US2017/044729
§ 371(c)(1), (2) Date Jan. 31, 2019,
PCT Pub. No. WO2018/026727, PCT Pub. Date Feb. 8, 2018.
Claims priority of provisional application 62/369,199, filed on Aug. 1, 2016.
Prior Publication US 2019/0171849 A1, Jun. 6, 2019
Int. Cl. G06F 21/00 (2013.01); G06F 21/64 (2013.01); G06Q 30/018 (2023.01); G06F 16/901 (2019.01); G06F 21/60 (2013.01); G06Q 20/06 (2012.01); H04L 9/06 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04L 69/04 (2022.01); H04L 9/00 (2022.01)
CPC G06F 21/64 (2013.01) [G06F 16/9014 (2019.01); G06F 21/602 (2013.01); G06Q 20/065 (2013.01); G06Q 30/0185 (2013.01); H04L 9/0637 (2013.01); H04L 9/0643 (2013.01); H04L 9/3236 (2013.01); H04L 9/3247 (2013.01); H04L 63/12 (2013.01); H04L 69/04 (2013.01); G06Q 2220/00 (2013.01); H04L 9/50 (2022.05); H04L 2209/56 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method of tamper-evident recording of a plurality of service data items, each service data item being associated with a data item verification fingerprint, wherein a processing routine is conducted, in which
an aggregated verification fingerprint is computed from at least a plurality of data item verification fingerprints using at least one one-way compression function, so that the aggregated verification fingerprint has a bit length, which is less than a bit length of a concatenation of the data item verification fingerprints; and wherein
the aggregated verification fingerprint is stored in a plurality of blockchains for decoupling the storage of the aggregated verification fingerprint from the service data items;
the step of computing the aggregated verification fingerprint comprises computing a hash tree from the plurality of data item verification fingerprints;
for at least a first data item verification fingerprint of the plurality of data item verification fingerprints, a first authentication path comprising one or more hashes and a second authentication path comprising one or more hashes is determined in the hash tree, which first authentication path is associated with a branch path from the first data item verification fingerprint to the root hash in a first blockchain in which the aggregated verification fingerprint is stored, and which second authentication path is associated with a branch path from the first data item verification fingerprint in a second blockchain in which the aggregated verification fingerprint is stored;
the one or more hashes of said first authentication path are stored in a verification database;
the aggregated verification fingerprint is stored in at least a first block of the plurality of blockchains, wherein an identifier of the first block is stored in the verification database; and
the first data item verification fingerprint is stored in the verification database with the one or more hashes of said first authentication path and is correlated with the one or more hashes of said first authentication path.