NChain Licensing AG (20240248966). METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER TO-PEER DISTRIBUTED LEDGER simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER TO-PEER DISTRIBUTED LEDGER

Organization Name

nChain Licensing AG

Inventor(s)

Craig Steven Wright of London (GB)

Stephane Savanah of London (GB)

METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER TO-PEER DISTRIBUTED LEDGER - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240248966 titled 'METHOD AND SYSTEM FOR VERIFYING INTEGRITY OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER TO-PEER DISTRIBUTED LEDGER

The abstract describes a computer-implemented method and system for verifying the integrity of computer software for installation using a distributed hash table and a peer-to-peer distributed ledger, such as the Bitcoin blockchain. The method involves determining metadata associated with a transaction record on the distributed ledger, identifying an entry on the hash table from the metadata, calculating hash values for the software and the entry, comparing these values, and verifying the software's integrity based on the comparison.

  • The method utilizes a distributed hash table and a peer-to-peer distributed ledger to verify software integrity.
  • Metadata from a transaction record on the ledger is used to identify an entry on the hash table.
  • Hash values are calculated for the software and the entry, then compared to verify integrity.

Potential Applications: - Software distribution platforms - Cybersecurity systems - Supply chain management

Problems Solved: - Ensuring the integrity of software during installation - Preventing tampering or unauthorized modifications

Benefits: - Enhanced security for software installations - Increased trust in distributed systems - Efficient verification process

Commercial Applications: Title: "Secure Software Verification System" This technology can be used in software distribution platforms to ensure the integrity of downloaded software, in cybersecurity systems to prevent unauthorized modifications, and in supply chain management to track software authenticity.

Prior Art: Researchers can explore prior work on blockchain-based verification systems and distributed ledger technologies for software integrity.

Frequently Updated Research: Stay updated on advancements in blockchain technology, distributed systems, and cybersecurity protocols relevant to software verification.

Questions about Software Integrity Verification: 1. How does the use of a distributed hash table enhance the verification process? 2. What are the potential limitations of using a peer-to-peer distributed ledger for software integrity verification?


Original Abstract Submitted

a computer-implemented method () and system () for verifying the integrity of a computer software for installation using a distributed hash table () and a peer-to-peer distributed ledger (). this may be the bitcoin blockchain or an alternative implementation. the method includes determining () a metadata associated with a transaction record stored on the peer-to-peer distributed ledger (). an indication of an entry stored on the distributed hash table () may be determined () from the metadata. the method further includes determining () a third hash value based on the computer software and determining () a fourth hash value from the entry on the distributed hash table (). the method further includes comparing () the third hash value and the fourth hash value and verifying () the integrity of the computer software based on the comparing of the third hash value and the fourth hash value.