CRYPTOGRAPHIC VERIFICATION OF DATABASE TRANSACTIONS
Abstract:
A database management system receives a request to perform a transaction. The database management system commits the transaction, and in response to committing the transaction, generates a cryptographic hash based on an attribute of the transaction. The cryptographic hash is stored in a leaf-region of a hash tree. In response to a request to verify the transaction, signatures are retrieved from the tree based on a traversal of the tree to locate the node corresponding to the transaction. The retrieved signatures are used to verify the transaction.
Public/Granted literature
Information query
Patent Agency Ranking
0/0