Sign In to Follow Application
View All Documents & Correspondence

Method And System For Tamper Resistant Event Sourcing Using A Distributed Ledger

Abstract: A method for verifying the state of an object through tamper-resistant event sourcing includes: receiving, by a receiver of a processing server, state data for a computing object and an identification value associated with the computing object; applying, by a processor of the processing server, a one-way cryptographic function to the received state data to generate a comparison hash value; identifying, by the processor of the processing server, a published hash value stored in a blockchain with the identification value; and verifying, by the processor of the processing server, a state of the computing object according to the state data based on a match of the generated comparison hash value with the identified published hash value.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 May 2024
Publication Number
20/2024
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

MASTERCARD INTERNATIONAL INCORPORATED
2000 Purchase Street Purchase, NY 10577

Inventors

1. LE CALLONNEC, Sébastien
94 Charlesland Park Greystones, Co. Wicklow

Specification

We claim:
1. A method for tamper-resistant event sourcing of an object, comprising:
receiving, by a receiver of a processing server, state data for a computing
object and an identification value associated with the computing object;
applying, by a processor of the processing server, a one-way cryptographic 5
function to the received state data to generate a hash value; and
publishing, by a transmitter of the processing server, the generated hash value
and the identification value on a blockchain.
2. The method of claim 1, further comprising: 10
converting, by the processor of the processing server, the state data into an
object notation representation prior to applying the one-way cryptographic function.
3. The method of claim 2, wherein the object notation representation is a
JavaScript Object Notation representation. 15
4. The method of claim 2, further comprising:
transforming, by the processor of the processing server, the converted state
data into a canonical representation prior to applying the one-way cryptographic
function. 20
5. The method of claim 4, wherein the converted state data is transformed
in compliance with the JavaScript Object Notation (JSON) Canonicalization Scheme
(JCS).
6. A method for verifying the state of an object through tamper-resistant 25
event sourcing, comprising:
receiving, by a receiver of a processing server, state data for a computing
object and an identification value associated with the computing object;
applying, by a processor of the processing server, a one-way cryptographic
function to the received state data to generate a comparison hash value; 30
identifying, by the processor of the processing server, a published hash value
stored in a blockchain with the identification value; and verifying, by the processor of the processing server, a state of the computing
object according to the state data based on a match of the generated comparison hash
value with the identified published hash value.
7. The method of claim 6, further comprising: 5
repeating, by the processing server, the receiving, applying, identifying, and
verifying steps for a plurality of states for the computing object, where each state of
the plurality of states includes a different set of state data.
8. The method of claim 7, wherein 10
verification of the state of the computing object fails for one of the plurality of
states, and
the method further comprises:
transmitting, by a transmitter of the processing server, a notification
message identifying the one of the plurality of states that resulted in failed 15
verification.
9. A system for tamper-resistant event sourcing of an object, comprising:
a processing server, the processing server including
a receiver receiving state data for a computing object and an 20
identification value associated with the computing object,
a processor applying a one-way cryptographic function to the received
state data to generate a hash value, and
a transmitter publishing the generated hash value and the identification
value on a blockchain. 25
10. The system of claim 9, wherein the processor of the processing server
converts the state data into an object notation representation prior to applying the oneway cryptographic function.

Documents

Application Documents

# Name Date
1 202447035379-STATEMENT OF UNDERTAKING (FORM 3) [03-05-2024(online)].pdf 2024-05-03
2 202447035379-REQUEST FOR EXAMINATION (FORM-18) [03-05-2024(online)].pdf 2024-05-03
3 202447035379-PROOF OF RIGHT [03-05-2024(online)].pdf 2024-05-03
4 202447035379-POWER OF AUTHORITY [03-05-2024(online)].pdf 2024-05-03
5 202447035379-NOTIFICATION OF INT. APPLN. NO. & FILING DATE (PCT-RO-105-PCT Pamphlet) [03-05-2024(online)].pdf 2024-05-03
6 202447035379-FORM 18 [03-05-2024(online)].pdf 2024-05-03
7 202447035379-FORM 1 [03-05-2024(online)].pdf 2024-05-03
8 202447035379-FIGURE OF ABSTRACT [03-05-2024(online)].pdf 2024-05-03
9 202447035379-DRAWINGS [03-05-2024(online)].pdf 2024-05-03
10 202447035379-DECLARATION OF INVENTORSHIP (FORM 5) [03-05-2024(online)].pdf 2024-05-03
11 202447035379-COMPLETE SPECIFICATION [03-05-2024(online)].pdf 2024-05-03
12 202447035379-POA [21-06-2024(online)].pdf 2024-06-21
13 202447035379-FORM 13 [21-06-2024(online)].pdf 2024-06-21
14 202447035379-AMENDED DOCUMENTS [21-06-2024(online)].pdf 2024-06-21
15 202447035379-FORM 3 [28-09-2024(online)].pdf 2024-09-28
16 202447035379-FER.pdf 2025-07-11
17 202447035379-FORM 3 [15-09-2025(online)].pdf 2025-09-15

Search Strategy

1 202447035379_SearchStrategyNew_E_searchE_03-03-2025.pdf