Chia Network Inc. (20240340183). METHOD FOR SECURING PRIVATE STRUCTURED DATABASES WITHIN A PUBLIC BLOCKCHAIN simplified abstract

From WikiPatents
Revision as of 16:34, 11 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD FOR SECURING PRIVATE STRUCTURED DATABASES WITHIN A PUBLIC BLOCKCHAIN

Organization Name

Chia Network Inc.

Inventor(s)

Kenneth K. Griggs of San Francisco CA (US)

Bram Cohen of San Francisco CA (US)

METHOD FOR SECURING PRIVATE STRUCTURED DATABASES WITHIN A PUBLIC BLOCKCHAIN - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240340183 titled 'METHOD FOR SECURING PRIVATE STRUCTURED DATABASES WITHIN A PUBLIC BLOCKCHAIN

The method described in the abstract involves generating a hash tree to represent structured data, submitting transactions to a distributed network to create blockchain objects, and triggering announcements based on proofs of inclusion within the hash tree.

  • The method includes generating a hash tree representing a structured data object with a data unit.
  • The hash tree contains a root hash and a data unit hash representing the data unit.
  • A first transaction is submitted to the distributed network to create a blockchain object with the root hash.
  • The blockchain object generates an announcement indicating the membership of the data unit hash in the hash tree.
  • A second transaction is submitted to trigger the blockchain object to generate the announcement based on a proof of inclusion of the data unit hash within the hash tree.

Potential Applications: - Data verification and authentication systems - Supply chain management - Secure document storage and retrieval

Problems Solved: - Ensuring data integrity and authenticity - Providing a tamper-proof record of transactions - Facilitating secure and transparent information sharing

Benefits: - Enhanced data security - Improved trust and transparency in transactions - Streamlined verification processes

Commercial Applications: Title: Secure Data Verification and Authentication Technology This technology can be applied in industries such as finance, healthcare, and legal services to ensure the integrity and authenticity of sensitive data. It can also be used in supply chain management to track and verify the origin of products.

Questions about the Technology: 1. How does this technology improve data security in comparison to traditional methods? 2. What are the potential challenges in implementing this technology on a large scale?


Original Abstract Submitted

a method includes: generating a hash tree representing a structured data object including a data unit, the hash tree including a root hash and a data unit hash representing the data unit; submitting a first transaction to a distributed network, the first transaction configured to generate a blockchain object including the root hash, the blockchain object configured to generate an announcement representing membership of the data unit hash in the hash tree; and submitting a second transaction to the distributed network, the second transaction configured to trigger the blockchain object to generate the announcement based on a proof of inclusion of the data unit hash within the hash tree.