US 12,244,723 B2
System and method to cryptographically validate rich query results
Jerónimo Irazábal, Buenos Aires (AR); Moshe Bar, Houston, TX (US); Dennis Zimmer, Kuessnacht am Rigi (CH); and Stefano Scafiti, Aci Catena (IT)
Assigned to Codenotary Inc., Bellaire, TX (US)
Filed by Codenotary Inc., Bellaire, TX (US)
Filed on May 16, 2022, as Appl. No. 17/745,603.
Claims priority of provisional application 63/189,198, filed on May 16, 2021.
Prior Publication US 2022/0368533 A1, Nov. 17, 2022
Int. Cl. H04L 9/32 (2006.01); G06F 16/2455 (2019.01)
CPC H04L 9/3236 (2013.01) [G06F 16/2455 (2019.01)] 18 Claims
OG exemplary drawing
 
1. A method of managing data in a computer-hosted database system providing cryptographic verifiability and comprising an immutable key-value data store, the method comprising: hosting a computer-hosted database system comprising an immutable key-value data store,
wherein the computer-hosted database system comprises one or more data records and cryptographic proof data associated with the one or more data records,
wherein the data in a data record is stored as one or more key-value entries in the immutable key-value data store, and the logical structure of a data record is defined by a rich data model and comprises two or more data fields, including a first field and a second field, wherein the rich data model comprises a relational data model or a document data model,
wherein in the relational data model, the data record comprises a table comprising one or more rows, the two or more data fields comprise columns supported by the rich data model, the first field is a first column, and the second field is a second column, and
in the document data model, the data record comprises a document comprising two or more attributes supported by the rich data model, the first field comprises a first attribute, and the second field comprises a second attribute,
wherein the computer-hosted database system comprises a first data record comprising transaction data, including first transaction data stored in the first field and second transaction data stored in the second field, and cryptographic proof data associated with the first data record (first data record proof data);
receiving a data retrieval instruction requesting retrieval of data stored in the first field but not data stored in the second field, wherein the data retrieval instruction requests retrieval at the column or attribute level supported by the rich data model; and
returning, in response to the data retrieval instruction, the first transaction data stored in the first field and first cryptographic proof data sufficient to prove data originality of the first transaction data stored in the first field without knowledge of the second transaction data stored in the second field, wherein returning first cryptographic proof data comprises returning first cryptographic proof data at the column or attribute level supported by the rich data model.