US 12,314,709 B2
Method and system for maintenance of immutable evidence for software development life cycle data
Sandhya Sridharan, Los Altos, CA (US); Thangamani Kasi, Bangalore (IN); Karthick Selvaraj, Bangalore (IN); and Kumaran Kamalakannan, Bangalore (IN)
Assigned to JPMORGAN CHASE BANK, N.A., New York, NY (US)
Filed by JPMorgan Chase Bank, N.A., New York, NY (US)
Filed on Dec. 29, 2022, as Appl. No. 18/090,962.
Claims priority of application No. 202211065620 (IN), filed on Nov. 16, 2022.
Prior Publication US 2024/0160437 A1, May 16, 2024
Int. Cl. H04L 9/40 (2022.01); G06F 8/71 (2018.01); H04L 9/00 (2022.01)
CPC G06F 8/71 (2013.01) [H04L 9/50 (2022.05)] 16 Claims
OG exemplary drawing
 
1. A method for maintaining immutability of evidence that relates to software development life cycle (SDLC) data, the method being implemented by at least one processor, the method comprising:
receiving, by the at least one processor, a first evidence item that relates to a first software development;
encrypting, by the at least one processor, the first evidence item;
storing, by the at least one processor in a memory, the encrypted first evidence item;
computing, by the at least one processor, a first hash value based on the first evidence item; and
combining, by the at least one processor, the first hash value with a first hash tree that relates to the first software development,
wherein the first hash tree includes a plurality of hash values that has a one-to-one correspondence with a plurality of evidence items that are represented in the first hash tree, and
wherein the first hash tree comprises a Merkle tree that has a binary tree structure with a number of levels that corresponds to a lowest exponent value for which a respective power of two is greater than a number of the plurality of evidence items that are represented in the Merkle tree, and
wherein when tampering occurs with respect to at least one evidence item from among the plurality of evidence items, the method further comprises determining the at least one evidence item for which the tampering has occurred based on the plurality of hash values.