Abstract: A method for verifying the state of an object through tamper-resistant event sourcing includes: receiving, by a receiver of a processing server, state data for a computing object and an identification value associated with the computing object; applying, by a processor of the processing server, a one-way cryptographic function to the received state data to generate a comparison hash value; identifying, by the processor of the processing server, a published hash value stored in a blockchain with the identification value; and verifying, by the processor of the processing server, a state of the computing object according to the state data based on a match of the generated comparison hash value with the identified published hash value.
We claim:
1. A method for tamper-resistant event sourcing of an object, comprising:
receiving, by a receiver of a processing server, state data for a computing
object and an identification value associated with the computing object;
applying, by a processor of the processing server, a one-way cryptographic 5
function to the received state data to generate a hash value; and
publishing, by a transmitter of the processing server, the generated hash value
and the identification value on a blockchain.
2. The method of claim 1, further comprising: 10
converting, by the processor of the processing server, the state data into an
object notation representation prior to applying the one-way cryptographic function.
3. The method of claim 2, wherein the object notation representation is a
JavaScript Object Notation representation. 15
4. The method of claim 2, further comprising:
transforming, by the processor of the processing server, the converted state
data into a canonical representation prior to applying the one-way cryptographic
function. 20
5. The method of claim 4, wherein the converted state data is transformed
in compliance with the JavaScript Object Notation (JSON) Canonicalization Scheme
(JCS).
6. A method for verifying the state of an object through tamper-resistant 25
event sourcing, comprising:
receiving, by a receiver of a processing server, state data for a computing
object and an identification value associated with the computing object;
applying, by a processor of the processing server, a one-way cryptographic
function to the received state data to generate a comparison hash value; 30
identifying, by the processor of the processing server, a published hash value
stored in a blockchain with the identification value; and verifying, by the processor of the processing server, a state of the computing
object according to the state data based on a match of the generated comparison hash
value with the identified published hash value.
7. The method of claim 6, further comprising: 5
repeating, by the processing server, the receiving, applying, identifying, and
verifying steps for a plurality of states for the computing object, where each state of
the plurality of states includes a different set of state data.
8. The method of claim 7, wherein 10
verification of the state of the computing object fails for one of the plurality of
states, and
the method further comprises:
transmitting, by a transmitter of the processing server, a notification
message identifying the one of the plurality of states that resulted in failed 15
verification.
9. A system for tamper-resistant event sourcing of an object, comprising:
a processing server, the processing server including
a receiver receiving state data for a computing object and an 20
identification value associated with the computing object,
a processor applying a one-way cryptographic function to the received
state data to generate a hash value, and
a transmitter publishing the generated hash value and the identification
value on a blockchain. 25
10. The system of claim 9, wherein the processor of the processing server
converts the state data into an object notation representation prior to applying the oneway cryptographic function.
| # | Name | Date |
|---|---|---|
| 1 | 202447035379-STATEMENT OF UNDERTAKING (FORM 3) [03-05-2024(online)].pdf | 2024-05-03 |
| 2 | 202447035379-REQUEST FOR EXAMINATION (FORM-18) [03-05-2024(online)].pdf | 2024-05-03 |
| 3 | 202447035379-PROOF OF RIGHT [03-05-2024(online)].pdf | 2024-05-03 |
| 4 | 202447035379-POWER OF AUTHORITY [03-05-2024(online)].pdf | 2024-05-03 |
| 5 | 202447035379-NOTIFICATION OF INT. APPLN. NO. & FILING DATE (PCT-RO-105-PCT Pamphlet) [03-05-2024(online)].pdf | 2024-05-03 |
| 6 | 202447035379-FORM 18 [03-05-2024(online)].pdf | 2024-05-03 |
| 7 | 202447035379-FORM 1 [03-05-2024(online)].pdf | 2024-05-03 |
| 8 | 202447035379-FIGURE OF ABSTRACT [03-05-2024(online)].pdf | 2024-05-03 |
| 9 | 202447035379-DRAWINGS [03-05-2024(online)].pdf | 2024-05-03 |
| 10 | 202447035379-DECLARATION OF INVENTORSHIP (FORM 5) [03-05-2024(online)].pdf | 2024-05-03 |
| 11 | 202447035379-COMPLETE SPECIFICATION [03-05-2024(online)].pdf | 2024-05-03 |
| 12 | 202447035379-POA [21-06-2024(online)].pdf | 2024-06-21 |
| 13 | 202447035379-FORM 13 [21-06-2024(online)].pdf | 2024-06-21 |
| 14 | 202447035379-AMENDED DOCUMENTS [21-06-2024(online)].pdf | 2024-06-21 |
| 15 | 202447035379-FORM 3 [28-09-2024(online)].pdf | 2024-09-28 |
| 16 | 202447035379-FER.pdf | 2025-07-11 |
| 17 | 202447035379-FORM 3 [15-09-2025(online)].pdf | 2025-09-15 |
| 1 | 202447035379_SearchStrategyNew_E_searchE_03-03-2025.pdf |