Amazon.com, Inc.
Cryptographic verification of database transactions
Last updated:
Abstract:
A database management system receives a request to perform a transaction. The database management system commits the transaction, and in response to committing the transaction, generates a cryptographic hash based on an attribute of the transaction. The cryptographic hash is stored in a leaf-region of a hash tree. In response to a request to verify the transaction, signatures are retrieved from the tree based on a traversal of the tree to locate the node corresponding to the transaction. The retrieved signatures are used to verify the transaction.
Status:
Grant
Type:
Utility
Filling date:
26 Nov 2018
Issue date:
7 Dec 2021