Amazon.com, Inc.
Cryptographic verification of database transactions

Last updated:

Abstract:

A database management system receives a request to perform a transaction. The database management system commits the transaction, and in response to committing the transaction, generates a cryptographic hash based on an attribute of the transaction. The cryptographic hash is stored in a leaf-region of a hash tree. In response to a request to verify the transaction, signatures are retrieved from the tree based on a traversal of the tree to locate the node corresponding to the transaction. The retrieved signatures are used to verify the transaction.

Status:
Grant
Type:

Utility

Filling date:

26 Nov 2018

Issue date:

7 Dec 2021