US 12,452,074 B2
Systems and methods for validating authenticity of databases
Mark Edward Scott, Jr., Waco, TX (US)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Mar. 31, 2023, as Appl. No. 18/193,798.
Prior Publication US 2024/0333517 A1, Oct. 3, 2024
Int. Cl. H04L 9/32 (2006.01); G06F 16/21 (2019.01); G06F 16/28 (2019.01)
CPC H04L 9/3239 (2013.01) [G06F 16/211 (2019.01); G06F 16/284 (2019.01); H04L 9/3247 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An Information Handling System (IHS) comprising:
a processor; and
a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the processor to:
calculate a first hash of schema objects for a relational database;
compare the calculated first hash of the schema objects with an expected second hash of the schema objects for the relational database;
determine whether to validate the relational database based, at least in part, on the comparison;
determine a cryptographic signature of the first hash using a private encryption key;
combine data retained by the relational database, the first hash and the cryptographic signature into a package; and
provide the package and an indication of the determination whether to validate the relational database to a network-based recipient via a communication network, wherein the package enables the recipient to validate the relational database using the first hash and the cryptographic signature, and wherein the validation of the relational database certifies that the relational database has not been modified thereby ensuring authenticity of the relational database.