EP4107689A1 - Vérification de services de plateforme - Google Patents

Vérification de services de plateforme

Info

Publication number
EP4107689A1
EP4107689A1 EP21709101.6A EP21709101A EP4107689A1 EP 4107689 A1 EP4107689 A1 EP 4107689A1 EP 21709101 A EP21709101 A EP 21709101A EP 4107689 A1 EP4107689 A1 EP 4107689A1
Authority
EP
European Patent Office
Prior art keywords
transaction
event
blockchain
client
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP21709101.6A
Other languages
German (de)
English (en)
Inventor
Andrew James MEE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nchain Licensing AG
Original Assignee
Nchain Licensing AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB2002285.1A external-priority patent/GB202002285D0/en
Priority claimed from GBGB2013929.1A external-priority patent/GB202013929D0/en
Priority claimed from GBGB2020279.2A external-priority patent/GB202020279D0/en
Application filed by Nchain Licensing AG filed Critical Nchain Licensing AG
Priority claimed from PCT/IB2021/051333 external-priority patent/WO2021165848A1/fr
Publication of EP4107689A1 publication Critical patent/EP4107689A1/fr
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • This disclosure relates generally to methods and systems for implementing a platform of one or more services associated with a distributed ledger, i.e. a blockchain, for one or more clients.
  • a distributed ledger i.e. a blockchain
  • the present disclosure relates, but is not limited to, the provision of access to a plurality functions and applications associated with a blockchain for one or more clients, such as the implementation of event streams or machine-readable contracts.
  • blockchain to include all forms of electronic, computer- based, distributed ledgers. These include consensus-based blockchain and transaction-chain technologies, permissioned and un-permissioned ledgers, shared ledgers, public and private blockchains, and variations thereof.
  • the most widely known application of blockchain technology is the Bitcoin ledger, although other blockchain implementations have been proposed and developed. While Bitcoin may be referred to herein for the purpose of convenience and illustration, it should be noted that the disclosure is not limited to use with the Bitcoin blockchain, and alternative blockchain implementations and protocols associated with any kind of digital asset or a representation of a digital asset fall within the scope of the present disclosure.
  • client entity
  • node node
  • user node
  • recipient a payment or payment service
  • payee may refer herein to a computing or processor-based resource.
  • the term “Bitcoin” is used herein to include any version or variation that derives from or is based on the Bitcoin protocol.
  • digital asset may refer to any transferrable asset, such as cryptocurrency, tokens representing at least a part of a property, a smart contract, a license, i.e. software licence, or DRM contracts for media content, etc. It will be understood that the term “digital asset” is used throughout this document to represent a commodity that may be associated with a value, which may be transferred to or provided as a payment in a transaction from one entity to another.
  • a blockchain is a peer-to-peer, electronic ledger, which is implemented as a computer-based, decentralised, distributed system made up of blocks, which in turn are made up of transactions.
  • Each transaction is a data structure that encodes the transfer of control of a digital asset between participants in the blockchain system and includes at least one input and at least one output.
  • Each block contains a hash of the previous block so that blocks become chained together to create a permanent, unalterable record of all transactions which have been written to the blockchain since its inception.
  • Transactions contain small programs known as scripts, embedded into their inputs and outputs, which specify how and by whom the outputs of the transactions can be accessed. On the Bitcoin platform, these scripts are written using a stack-based scripting language.
  • a transaction in order for a transaction to be written to the blockchain, it must be i) validated by the first node that receives the transaction - if the transaction is validated, the node relays it to the other nodes in the network; ii) added to a new block built by a miner; and iii) mined, i.e. added to the public ledger of past transactions.
  • a miner s hashing power (PoW), an amount of cryptocurrency held by a miner (PoS), an amount of cryptocurrency staked on a delegate miner (DPoS), a miner’s ability to store pre-determined solutions to a cryptographic puzzle (PoC), a wait time randomly assigned to a miner (PoET), etc.
  • miners are provided with an incentive or reward for mining a block.
  • the Bitcoin blockchain for example, rewards miners with newly issued cryptocurrency (Bitcoin) and fees associated with transactions in the block (transaction fees).
  • the amount of cryptocurrency issued diminishes with time, with the incentive eventually consisting of transaction fees only. It will be appreciated, therefore, that the handling of transaction fees is a part of the underlying mechanism for committing data to public blockchains such as the Bitcoin blockchain.
  • each transaction in a given block encodes the transfer of control of a digital asset between participants in the blockchain system.
  • the digital asset need not necessarily correspond to a cryptocurrency.
  • the digital asset may pertain to a digital representation of a document, image, physical object, etc.
  • the payment of cryptocurrency and / or transaction fees to miners may simply act as an incentive to maintain the validity of the blockchain by performing the necessary work.
  • the cryptocurrency associated with the blockchain acts as a security for miners, with the blockchain itself being a ledger for transactions that predominantly relate to digital assets other than cryptocurrency.
  • the transfer of cryptocurrency between participants is handled by an entity that is different from and / or independent of the entity using the blockchain to maintain a ledger of transactions.
  • a user can transfer control of the associated resource to another address associated with an input in another transaction.
  • This transfer is usually, but not essentially, done using a digital wallet.
  • This digital wallet may be a device; physical medium; program; application (app) on a computing device such as a desktop, laptop or a mobile terminal; or a remotely-hosted service, associated with a domain on a network, such as the Internet.
  • the digital wallet stores public and private keys and can be used to track ownership of resources; tokens and assets etc., that are associated with a user; receive or spend digital assets; transfer tokens which may relate to digital assets, such as cryptocurrencies, licences, property, or other types of resource.
  • clients need to include processing to implement such functionality, but they also need to ensure that appropriate security measures are implemented for such processes before they can make use of a blockchain network to send, receive, and view data, and/or digital assets, which relate to a smart contract or a token representing a real world asset transaction.
  • blockchain distributed ledger
  • advantages of increased security, transparency, and reliability of records to provide a common platform or interface for a plurality of blockchain related services or applications, that enable any client computing device to ensure any data, event, or digital asset associated with the client, can be instantaneously and securely mined, or written into the blockchain easily, thereby providing a lasting, tamper-proof, and auditable record of it, which can be created, written, updated, read, or viewed as required.
  • the present disclosure addresses the above technical concerns by proposing one or more techniques, whereby data, or information associated with a client, may be simply, securely, and instantaneously written into, or obtained from the blockchain, by methods, devices, and systems which provide an application programming interface (API) for one or more services associated with a blockchain, without such clients needing to implement any processing or functionality for using the blockchain, while still being able to avail all advantages associated with the blockchain.
  • API application programming interface
  • the present disclosure proposes methods, devices, and systems for implementing a platform, that provides a plurality of services associated with a blockchain; using a platform processor associated with an application programming interface (API), that is capable of receiving a client request in a Hypertext Transfer Protocol (HTTP) transmission protocol format for a service.
  • API application programming interface
  • a destination address, or endpoint for the requested blockchain service is determined, and at least one blockchain transaction is generated based on the destination address in order to obtain an output script.
  • a result based on the output script is then sent to the given client in the HTTP transmission protocol format.
  • the present disclosure proposes methods, devices, and systems for implementing a data-writing service, for transactions associated with a blockchain for a client, based on an HTTP request from the client, and relating to an event stream ES, implemented using the blockchain, where the event stream may be used to representor track a Finite State Machine (FSM).
  • FSM Finite State Machine
  • this FSM may be a smart contract.
  • the current state of the event Stream ES n on the blockchain is determined, a new or next event E n+i for the event stream ES, is identified in the received request, and processed by creating a blockchain transaction, including an input associated with a transaction output from a previous transaction TX, for the event stream ES; and an unspent output UTXO, associated with event data representing the new event E n+i .
  • the current state of the event stream on the blockchain is updated to be ES n+i , based on the new event E n+i .
  • a result associated with current state ES n+i the result being provided in the HTTP transmission protocol format.
  • the present disclosure proposes methods, devices, and systems, for providing, creating, updating, and/or terminating an event stream that is implemented using the blockchain, and creating a tamper-proof log or record of events associated with the event chain.
  • a result associated with the transaction is provided in the HTTP transmission protocol format.
  • one or more transactions in the event stream while being accepted or being a valid transaction for a given event stream, are not submitted to the blockchain immediately.
  • the transactions in an event stream will be submitted to a block after a given number or transactions or time has elapsed, i.e. after 25 or so transactions in an event stream have taken place, for example.
  • the transactions may be held in a mempool until the number or time has elapsed.
  • it is possible that a transaction in an event stream is submitted to the blockchain instantaneously.
  • the present disclosure proposes methods, devices, and systems, for synchronising multiple event streams associated with the blockchain using an atomic blockchain transaction.
  • the present disclosure proposes methods, devices and systems for verification of blockchain transactions associated with a platform providing a plurality of services associated with a blockchain to one or more clients.
  • Figure 1 is a schematic diagram, depicting an overview of a platform for a plurality of services associated with a blockchain, according to a first aspect.
  • Figure 2a is a flowchart, depicting a method for providing a platform of a plurality of services that are associated with a blockchain, according to the first aspect, as implemented by one or more processors associated with the platform.
  • Figure 2b is a flowchart, depicting a method for accessing a platform of a plurality of services that are associated with a blockchain, according to the first aspect, as implemented by one or more processors associated with a client.
  • Figure 3 is a schematic diagram, depicting the components of the platform of a plurality of services that are associated with a blockchain, according to the first aspect.
  • Figure 4 is a flowchart, depicting a method for implementing a data-writing service for transactions associated with a blockchain, according to a second aspect, as implemented by one or more processors associated with a platform service.
  • Figure 5 is a flowchart, depicting a method for creating an event stream associated with a blockchain, according to a third aspect, as implemented by one or more processors associated with a platform service.
  • Figure 6 is a flowchart, depicting a method for updating an event stream associated with a blockchain, according to the third aspect, as implemented by one or more processors associated with a platform service.
  • Figure 7 is a flowchart, depicting a method for terminating an event stream associated with a blockchain, according to the third aspect, as implemented by one or more processors associated with a platform service.
  • Figure 8 is a flowchart, depicting a method for accessing a data-writing service for transactions associated with a blockchain, according to a second or third aspect, as implemented by one or more processors associated with a client.
  • Figure 9 is a flowchart, depicting a method according to one embodiment for synchronising a plurality of event streams, according to a fourth aspect, as implemented by one or more processors associated with a platform service.
  • Figure 10 is a flowchart, depicting a method for accessing a data-writing service for synchronising event streams associated with a blockchain, according to the fourth aspect, as implemented by one or more processors associated with a client.
  • Figure 11 is a flowchart depicting a method of independent verification of data associated with a platform of services for a blockchain according to a first embodiment of a fifth aspect .
  • Figure 12 is a flowchart depicting a method of independent verification of data associated with a platform of services for a blockchain according to a second embodiment of the fifth aspect.
  • Figure 13 is a flowchart depicting a method of independent verification of data associated with a platform of services for a blockchain according to a third embodiment of the fifth aspect .
  • Figure 14 is a schematic diagram, illustrating a computing environment in which various aspects and embodiments of the present disclosure can be implemented.
  • the present disclosure provides a computer implemented method for providing a platform of a plurality of services that are associated with a blockchain, the platform being provided for a plurality of clients, the method implemented by a platform processor associated with an application programming interface (API).
  • API application programming interface
  • the platform processor API allows for web-based interaction interface, i.e. it may in some embodiments be implemented as a web service for the one or more clients, such that communication may take place over the Internet using standard Internet communication protocols for web-based services.
  • standard Internet communication protocols for web-based services.
  • HTTP messages or requests in an application level, or layer between a client and a server such as HTTP, HTTPS etc. may be transmitted and received based on transport layer protocols, such as TCP/IP etc.
  • transport layer protocols such as TCP/IP etc.
  • the reference to HTTP transmission protocols, or HTTP API, herein also encapsulates all standard Internet communication protocols, such as TCP/IP, UDP, HTTPS, etc.
  • the platform processor is implemented as an HTTP API endpoint.
  • the platform processor is implemented as a Representational State Transfer (REST) endpoint.
  • the API may be implemented as a REST endpoint, thereby also allowing the client to communicate using standard Internet or web- based protocols, such as HTTP or HTTPS.
  • the method of the first aspect comprises the steps of receiving a request from a given client among the plurality of clients, the request pertaining to a given service among the plurality of services, and from the given client being based on a Hypertext Transfer Protocol (HTTP) transmission protocol format. Then, based on a determination that the client identity and/or request(s) is/are valid, the method includes obtaining a destination address associated with the given service.
  • the destination address may be an IP address or a network address endpoint.
  • this may be an endpoint universal resource identifier (URI) and may include the universal resource location (URL) of a web server, from where the requested service may be accessed by the payment processor or one or more other entities (including the client) for the requested service.
  • URI endpoint universal resource identifier
  • URL universal resource location
  • this destination address may be the same endpoint as the platform API endpoint. This may be the case if the platform offers such a requested service as that of a main or core service. In other embodiments, where there are multiple different types of services offered by the platform, each implemented by different processors or webservers, then the destination address may be different to the platform API, which may act as a host server for other processor and webservers that are associated with the platform.
  • a platform processor comprises or is associated with a plurality of processors, each configured for implementing a given service among the plurality of services on the blockchain, and each being associated with a specific destination address or endpoint that is unique to the respective processor.
  • the method of the first aspect further includes the step of processing the request for the given service, based on at least one blockchain transaction corresponding to the obtained destination address to obtain an output script.
  • the output script is associated with data relating to the requested service, or the result of the service requested is included in a UTXO and includes such data or digital asset for the transaction.
  • this result associated with the output script is then sent to the given (requesting) client in the HTTP or similar transmission protocol format.
  • the method of the first aspect of the present disclosure by implementing a platform that is provided as an API for one or more clients, allows one or more processor associated with a client to sign-up, or use a web service provided by the platform processor to write or access data into a blockchain.
  • the one or more processors associated with the platform can implement one or more of the services being offered, using a standards-based interface design, such as, but not limited to, the REST (Representational State Transfer) - which is an architectural style for developing web services and web-based interactions.
  • a resource in the context of REST API, can be defined as an object with a type, associated data, relationships to other resources, and a set of methods that operate on it.
  • the platform or services implemented by the platform processor of the first aspect is advantageously provided as an API implementation, to access the (state of a) blockchain or distributed ledger, such as the Bitcoin SV (BSV) blockchain, and to trigger operations or functions that can alter that state, via an application interface, and expose it as a REST API.
  • a blockchain or distributed ledger such as the Bitcoin SV (BSV) blockchain
  • one or more servers or processors associated with the platform may be considered as a REST endpoint for one or more clients that choose to use such service.
  • the client can thus communicate with the platform service via HTTP or similar Internet commands.
  • no BSV, Bitcoin, blockchain knowledge, ECDSA, or other cryptographic key-management libraries, or transaction construction software, such as digital wallet software etc. needs to be implemented by the client for any of the services offered.
  • the client using one or more processing resources or user terminals can simply register to use the platform via some known authentication techniques, such as password protection authorisation or standard public key infrastructure (PKI) for verifying client identify.
  • PKI public key infrastructure
  • the client should then simply be able to communicate with the platform service via basic HTTP or similar.
  • some examples of the services associated with the blockchain that can be provided via the platform are: data services, for writing/submitting data into the blockchain to alter a state of the blockchain; data services, for reading/obtaining data reflecting the current state of the blockchain; services associated with simplified payment verification, for transactions associated with the blockchain; services associated with the management of one or more event streams and/or machine-readable contracts associated with the blockchain; services associated with the management of a digital wallet framework, for a plurality of clients.
  • the method of the first aspect further comprises the step of providing an application programming interface (API) converter, for performing the steps of: receiving the request from the client in the HTTP transmission protocol format, converting a received request to a Remote Procedure Call (RPC) format, and sending the RPC request to a given processor among the plurality of processors, that is configured to implement the service identified in the received request.
  • API application programming interface
  • this embodiment includes receiving a response associated from the given processor in an RPC format, and converting the respective response to be sent to the client using the HTTP, or a similar transmission protocol.
  • the client to communicate requests that are associated with the blockchain via simple HTTP, using a web-based platform API, and seamlessly providing interoperability with any of the nodes or servers that implement the above described services, but that do not communicate using Internet protocol communication standards for web services.
  • the API convertor implemented in this embodiment is not limited to HTTPS to RPC and vice versa conversion, or for that matter other web-based protocols to alternative communication protocols that are supported by the platform processors implementing one or more of the above services, networks for a given cryptocurrency, or digital assets that can otherwise be envisaged.
  • the method of the first aspect also includes receiving responses associated with the corresponding blockchain transaction from a respective processor in an RPC format, and accordingly, converting the respective responses using HTTP for sending on to the client.
  • advantageously implementing the proposed interface by the platform processor enables seamless communication, for submitting transactions to the blockchain when the clients (payees) and miners use different wireless data communication protocols and mechanisms.
  • the received request from the client is an HTTP GET or HTTP POST or HTTP PUT or HTTP PATCH request that includes or is associated with a client identifier, specific to a given client, as well as a service identifier for the given service requested among the plurality of services that are offered by the platform, as mentioned above.
  • the result sent to the client is an HTTP POST request based on the client identifier.
  • Messages may be sent to the alias of a client, for instance, using instructions provided in a machine-readable resource, such as a JavaScript Object Notation JSON document, saved in a well-known URI or location for the bsvalias or other payment service.
  • a machine-readable resource such as a JavaScript Object Notation JSON document
  • one or more of the plurality of clients may have an alias such as the above to identify the respective client.
  • the method of the first aspect comprises validating the client based on the client identifier and a record corresponding to the client identifier, the record associated with the platform processor. For example, such record may have been created and stored in or associated with the platform processor at the time of client sign-up or registration. Then, based on a successful validation of the client, the method includes determining if the received request from the client is valid, based on the service identifier and an attribute or setting included in the respective record.
  • said attribute or setting may indicate whether or not a given client is allowed access to all or part of the requested service. For instance, one or more levels of permission associated with the client identifier may be provided in the attribute or setting. For example, a given client may be allowed to request services to read data that is on a blockchain for a specific event, but may not be allowed to modify, delete or terminate such event, whereas another client may have permission for all action pertaining to one or more services.
  • the step of verifying the identity of a given client may be based on a digital signature associated with the client.
  • Cryptographic key pairs including a private key and a public key (or public address) associated with each client, may be used for verifying that a request made for a service did indeed originate from the given client , i.e. where data signed by a private key can only be recovered or validated using the corresponding public key.
  • Standard public key infrastructure (PKI) techniques may be used and implemented if verification is based on a digital signature.
  • a computer implemented method for accessing the platform of a plurality of services comprising the steps of obtaining or identifying an application programming interface (API) endpoint associated with one or more processors, associated with the platform, and sending a request pertaining to a given service among the plurality of services, the request including or associated with a client identifier for the given client, and a service identifier for the given service requested.
  • API application programming interface
  • the request is sent using a Hypertext Transfer Protocol (HTTP) or similar transmission protocol format.
  • HTTP Hypertext Transfer Protocol
  • the method also includes receiving a result pertaining to an output script of a blockchain transaction associated with the request, said result being provided to the client in the HTTP transmission protocol format.
  • the present disclosure provides a computer-implemented method for implementing a data-writing service, for transactions associated with a blockchain, the method being implemented by a platform processor associated with an application programming interface (API), to enable clients to access the service to write data into a blockchain.
  • the method of the second aspect comprises the steps of receiving a request from a client, the request relating to an event stream ES implemented using the blockchain, the request from the client being based on a Hypertext Transfer Protocol (HTTP) transmission protocol format.
  • HTTP Hypertext Transfer Protocol
  • the event stream may track or represent as a Finite State Machine (FSM), such as a Deterministic Finite Automaton (DFA), which is a well-known computing term, representing a system having a finite number of states, and which may be in only one state at a given time, with a transition function or a trigger event for transitioning from one stage to the next.
  • FSM Finite State Machine
  • DFA Deterministic Finite Automaton
  • the event stream may represent or track the inputs, states and/or events associated with a machine-readable contract or smart contract on the blockchain, where, advantageously, an immutable record of the past and current state of the contract is recorded.
  • the request received from the client includes a trigger event, to enable a state transition to take place in a smart contract associated with the event stream.
  • the determination of the current state may an indication of the present state based on a most recent result associated with the event stream, said result stored on the blockchain or in one or more separate off-chain storage resources for event stream. This may be based on an identifier of an earlier or pervious blockchain transaction associated with the event stream.
  • the current state may also be retrieved or read from the blockchain. This may be performed by a data reader as explained above, which may be a service among the plurality of services provided by the platform processor.
  • processing a new event E n+i for the event stream ES includes the step of creating a blockchain transaction TX n+i , the blockchain transaction TX n+i including an input associated with a transaction output (TXO n ) from a previous transaction TX n , , and an unspent output (UTXO n+i ), associated with event data representing the new event E n .
  • TXO n transaction output
  • UTXO n+i unspent output
  • the method then includes submitting the transaction TX n+i to the blockchain.
  • the updated state is based on data present in UTXO n+i , the unspent output of the latest transaction in the event stream.
  • the method then includes sending a result, based on the updated currented state of the event stream ES n+i , the result being provided based on the HTTP transmission protocol format.
  • the second aspect of the present disclosure discusses the implementation of a data-writing service implemented by a platform processor, or in other words, the implementation enables the functionality of writing data associated with a real world process, such as controlling the states of a smart contract.
  • the platform processor of the second aspect is associated to that discussed in the first aspect, wherein the second aspect discusses one of a plurality of blockchain services, i.e. for writing data into the blockchain to change its current state.
  • the data-writing service advantageously allows one or more clients to enable a transaction of state of a blockchain-implemented smart contract, by simply extracting the triggers or events from the effect.
  • an immutable record of the various stages of the smart contract may be provided by the data writing service of the second aspect.
  • the third aspect of the present disclosure is related to the data-writing service of the second aspect, as discussed above for service provided in relation to event streams.
  • a technique for establish a tamper-proof record or log, or a certificate confirming the sequential occurrence of events associated with an event stream proposes methods, devices, and systems for providing a creating, updating and/or terminating event stream, that is implemented using the blockchain and automatically creates a tamper-proof log or record of events associated with the event chain.
  • the present disclosure provides a computer - implemented method for implementing a data-writing service, for transactions associated with a blockchain, the method being implemented by a platform processor associated with an application programming interface (API), to enable clients to access the service to write data into a blockchain.
  • the method of the third aspect comprises the steps of receiving a request from a client, the request relating to an event stream ES on the blockchain, the request from the client being based on a Hypertext Transfer Protocol (HTTP) transmission protocol format.
  • HTTP Hypertext Transfer Protocol
  • An event E n for the event stream ES is then identified in the received request from a client.
  • Blockchain transaction dust or simply “dust” in the context of blockchain transaction for the present disclosure is understood to be a spendable transaction for a digital asset or cryptocurrency that has an output of low or minuscule value, i.e. the value may be much less than fees for mining the output in the blockchain. This dust output may be a minimum value of cryptocurrency or digital asset output that can be spent.
  • the digital asset or crypto current funds associated with such dust transactions may be provided or managed by the platform processor.
  • the dust output referred to in the present disclosure for the blockchain transaction is associated with a digital asset having a value that is below a value limit fora transaction”, i.e. perhaps the value of the dust output is lower than for instance the mining fee that may be required to spend such transaction.
  • a current blockchain transaction is created including a first input spending a dust output, associated with a previous transaction for the same event stream; a first unspent transaction output being a dust output for the current transaction, and a final unspent transaction output being associated with event data, representing the current event E n .
  • the event data is included in a data carrier element. This may be an un-spendable OP-RETURN output of the transaction.
  • the event data for the event E n in the final unspent transaction output for the current blockchain transaction includes a hash of the event data.
  • a salt which is a unique value that may be randomly generated by the platform processor for each transaction associated with an event stream, may also be included.
  • the hash of said event data is applied by the platform processor, thereby advantageously allowing the platform service or processors to hold such event data privately.
  • the hash of said event data is applied by the client device prior to being included in the request that is received by the platform processor. This advantageously enables the client to hold the event or data associated with the event in the request privately, not even sharing it with the platform.
  • the event data for the event En in the final unspent transaction output includes raw event data, which is public on the blockchain, once written or submitted to it.
  • a blockchain transaction is created including a first input, spending a dust output associated with a previous transaction for the event stream; a first unspent transaction output associated with a digital asset that is above a defined dust output limit, i.e. above the defined or minimum value of digital asset or cryptocurrency.
  • a dust output signifies the termination of the event stream in this case, as this represents that there is nothing more in the event stream to track , i.e. no more events in the sequence.
  • the provision that the first output being above the dust limit is to signal the end of the chain.
  • the final blockchain transaction does not have any event data output, i.e. there is no data carrier element present, which advantageously signals that this is not a data event to alter the event stream, but to terminate it.
  • the transaction is submitted to the blockchain and a result associated with the transaction is provided based on the HTTP transmission protocol format.
  • the event associated with the request i.e. either Eo, E n or E N
  • the request may include a data set of two or more sub-events for each Eo, E n or E N.
  • the result is based on the event data output of the transaction or the event associated with the respective transaction. In some embodiments, any result or event data that is returned may be held in an un-spendable OP_RETURN output of the transaction.
  • OP_RETURN is an opcode of the Script language for creating an unspendable output of a transaction that can store data and/or metadata within the transaction, and thereby record the metadata immutably in the blockchain.
  • Metadata could comprise a log or time entry or a document which is desired to be stored in the blockchain.
  • the event data or result may in some embodiments be considered to be a payload comprised in the unspendable output of the respective transaction.
  • Such an output may be made unspendable by means of an opcode that terminates the locking script of that output, e.g. OP_RETURN mentioned above.
  • the payload or event data may be included in other ways.
  • the use of dust outputs in the transaction is advantageous and key for maintaining an immutable sequential record of all transactions as they occur for an event stream ES. This is because, although by posting transactions to the blockchain all blockchain transactions would be time-stamped and remain in order in the blockchain, this does not guarantee preservation of their sequential order. This is because transactions might be mined into blocks at different times. Therefore, only the ordering of the blocks in the chain follows chronologically in a blockchain, and not individual transactions. Whereas, to track, record, and audit the exact sequential order of events for an event stream that may be a smart contract, advantageously, the use of dust outputs that must be spent by the first input of the next transaction in the sequence ensures that the order of the transaction is chronologically tracked and a tamper proof record is created.
  • a hierarchical deterministic key chain K to be used for a request associated with the event stream ES, is determined. Such key chain is unique to the given event stream.
  • a locking script associated with the dust outputs are secured with a derived key K n for the current event, and the first inputs each spend the dust outputs from the previous transactions, using the previous key pair K n -i This ensures that the outputs can only be spent with a corresponding key pair, specific to the respective previous transactions.
  • the result associated with the event stream ES includes a certificate confirming at least one of the following: a transaction identifier within which the event E n was submitted to the blockchain a Merkle inclusion proof of the transaction to a header in the blockchain a copy of the block header in which said transaction was included
  • each of the transactions created, as discussed above for the third aspect may further comprise other inputs associated with a digital asset. This may be provided based on an operational float, manged by the platform processor. In some embodiments, this may be associated with a digital asset or cryptocurrency resource or fund maintained or controlled by the payment processor to cover transacting mining fees and one or more other operations for the blockchain etc.
  • the transactions may also have one or more change outputs associated with the digital asset. As mentioned above, the final transaction has all change outputs.
  • the event stream ES may be identified based on a transaction identifier associated with the submitted blockchain transaction. In some embodiments, a state associated with the event stream ES may also be identified based on a transaction identifier associated with the most recently submitted blockchain transaction.
  • the method includes storing a copy of a record, or a log that is based on the result(s) for each event of the event stream ES, in an off-chain storage resource.
  • This storage resource may be associated with the platform processor, or in a different device, database, or service from which it may be requested or retrieved when requested by a client.
  • storage of the log associated with the results of the event stream are stored separately, to avoid a requirement to download an entire blockchain and sift through the data for any queries associated with the event stream.
  • the blockchain itself implementing the event stream could be checked in circumstances during audits or data verification. The back-up or separate copy could then be used for quick queries.
  • the present disclosure provides a computer - implemented method for synchronising a plurality of event streams associated with a blockchain, the method being implemented by a platform processor associated with an application programming interface (API).
  • the method of the fourth aspect is related to the method of appending or modifying a single event stream, as set out above in the third aspect.
  • the fourth aspect is related to a technique for synchronising a plurality of separate and independently progressing event streams based on a single or common event using a single blockchain transaction, referred to as an atomic transaction or a rendezvous transaction across the plurality of event streams.
  • This API for the platform service for implementing the fourth aspect may be the same API referred above for the third aspect, or may be a separate and specific API associated for the platform processor for synchronising event streams.
  • the method of the fourth aspect comprises the steps of receiving a request from a client, the request relating to a plurality of M event streams on the blockchain.
  • the request from the client is based on a Hypertext Transfer Protocol (HTTP) transmission protocol format.
  • HTTP Hypertext Transfer Protocol
  • the client may be a processor, a computing resource, a software application or program, or another entity that can access an event stream or is authorised to access a resource tracked by the event stream.
  • M event stream identifiers will be included in the JSON object representing the request.
  • the identifiers are received form the client as part of the request.
  • the API may obtain the plurality of M event stream identifiers from an account or record associated with the client.
  • the request from the client may also specify a target index for one or more of the identified event stream ES n , the target index being the index of the respective event stream ES n at to be used for the synchronisation request, i.e. the target index represents the next available position in a given event stream at which the current event E n is to be appended.
  • the target index is equivalent to a sequence number of the respective event stream ES n , and identifies the point in the event stream ES n to be used for the synchronisation request.
  • the target indices are received from the client as part of the request.
  • the API may obtain the respective indices automatically or directly from the event stream ES n or from an external log associated with the event stream ESn.
  • verification checks are carried out for each event stream ES n based on its respective key chain K or a public key.
  • the present embodiment may be used to implement a logical clock to synchronise both accounts, so that it may be possible to verify the state of each of the accounts involved in the transfer.
  • the next available transaction index for X is provided or recorded. This next available transaction index for X should not change until the transfer to Y is completed for it to be true or valid, i.e.
  • the next event in the event stream associated with account X should be the addition of the funds to account Y, and this next available index should match with a specified target index for X in the request from the client, if one is provided, in order to be successful . If the target index is provided, then this can then be verified based on the next available index value to be used for transactions in the event stream for X after the subtraction event . Whereas, for account Y, i.e. the one being added to, the transaction index for Y after the subtraction event has been recorded in the event stream for Y, is free to increase without limitation.
  • the method includes identifying a previous blockchain transaction TX n -i associated with the respective event stream ES n .
  • event data associated with the current event E n for synchronising the plurality of M event streams is the same for each of the plurality of M event streams. For example, this may be the case where funds or digital assets using the same exchange rate, or the same currency is to be added or removed from all event streams.
  • the event data associated with current event E n may be different for one or more of the plurality of M event streams. For example, one or more of the M event streams may be applying a different exchange rate to the rest or may be using a different type of token or digital asset or cryptocurrency for the current event E n . In some cases, there may not even be any event data that is associated with the current event E n used for the synchronisation.
  • the event E n may just be associated with metadata.
  • the metadata may be associated with a time or date or any other parameter that can be used to verify that for the plurality of M event streams, a given event was added or performed at a given time, with either the same or different data or no data at all.
  • the synchronising event E n may be a logical timer to ensure that either the same event or indeed different events are appended via atomic blockchain transaction, giving the plurality of M event streams synchronisation at a given point in time.
  • the use and advantages of a dust input and output are already mentioned in the third aspect.
  • tracking the dust inputs/outputs i.e. the chain-of-dust, transactions is used to prevent reordering of entries in the log after-the-fact of insertion/deletion.
  • the event E n is a data carrier payload for the atomic transaction including an un-spendable OP-RETURN output of the transaction.
  • Each of the inputs/outputs can also be secured with a respective key for the event stream, as mentioned above.
  • the atomic transaction of the fourth aspect allows many dust chains, each relating to a different event stream, to pass through a single blockchain transaction.
  • the fourth aspect provides a mechanism whereby a common event E n or data payload associated with the common event E n can be appended to each of the plurality of event streams in a single blockchain transaction.
  • This is advantageous for applications where it is useful to apply a given event or update across multiple resources or entities, and then be able to verify that this that the data was consistent across each of these multiple resources.
  • the participating events streams are associated or owned by a given client or account.
  • one or more of multiple events streams are owned by different entities.
  • the client may be associated with a smart contract used to initiate synchronisation where the rules of that contract dictate that all input must be the same.
  • a verifying entity may infer that all other streams contain the same event or data as the stream that is being checked, even if all streams are not owned or cannot be accessed by the client.
  • An example would be to ensure that a debit and/or credit entry associated with an asset for multiple banking accounts reflects the same information, at the same point in time, and can be verified using the same transaction for all accounts concerned.
  • Another example would be if a global change is to be applied to all clients or accounts associated with smart contract, where multiple parties agree to use a new exchange rate , where each account is maintained by a separate event stream respective to a given party.
  • compliance with a time window that may be optionally specified in the request can be checked.
  • An error message may be generated if the time when the request is processed falls outside of the time window.
  • This advantageously provides confirmation that the plurality of M event streams have been updated and synchronised. It also provides the new or current index value for each of these streams so that future requests can be made for each individual stream event, after the atomic blockchain transaction.
  • the returned index value is advantageous if the synchronisation request fails, the unexpected index may be used to indicate the need to re-synchronise with the other data in the respective event stream. In some embodiments, such re-synchronisation may be required before a failed request can be retried by the client.
  • the response array may be stored separately or externally, so that it can be accessed by other authorised entities.
  • all indices of the atomic blockchain transaction is recorded in the respective event stream ES n associated with the n th input.
  • the response array may also be sent as part of this result.
  • the result is returned further to an approval of an event stream or submission of the atomic blockchain transaction TX n to the blockchain.
  • a computer implemented method for accessing a service for writing data associated with an event stream is provided, implemented by one or more processors of a given client among the plurality of clients.
  • the method comprises the steps of obtaining or identifying an application programming interface (API) endpoint associated with one or more processors of the platform, sending a request pertaining to a data-writing service, and then sending a request for one or more events E n pertaining to an event stream.
  • API application programming interface
  • the request includes a request for synchronising of a plurality of M event streams in a blockchain, where M 3 2, with an event E n .
  • a request is sent using a Hypertext Transfer Protocol (HTTP) transmission protocol format.
  • HTTP Hypertext Transfer Protocol
  • the method also includes receiving a result pertaining to the requested event E n , said result being received based on the HTTP transmission protocol format.
  • the method includes applying a hash function to the event data associated with the event E n being requested, such that the request includes the hashed event data for the event E n, instead of the raw data.
  • the method includes providing the identifiers for each of the plurality of M event streams in the request.
  • a target index value, where available, for one or more of the plurality of M event streams to be used for appending the event E n in each respective events stream is also included.
  • a fifth aspect of the present disclosure relates to a method for verifying that a transaction is included in a blockchain.
  • the transaction in this aspect is associated with a client , the client associated with the platform of services of the first aspect.
  • the fifth aspect of the present disclosure provides a method that comprises the steps of identifying a transaction T to be verified and obtaining a certificate C associated with the transaction T.
  • the certificate includes a block identifier for a given block and an inclusion proof linking the transaction T to the given block in the blockchain.
  • the method then includes determining a longest chain of valid blocks in the blockchain and verifying that the given block is included in the determined longest chain.
  • the method includes sourcing the longest blockchain using a headers client .
  • a headers client is one that is configured to store block headers associated with the transaction T. It will be understood that other known methods of determining a longest chain may also be used and the fifth aspect is not limited to using a headers client.
  • the method includes generating an error message.
  • the fifth aspect enables independent verification or a cross-check or an audit when an entity such as, but not limited to the client or a verifier, wishes to verify that a transaction is actually submitted to the blockchain and it is valid.
  • the verification may be based on data relating to the transaction obtained from sources associated with the platform or from multiple independent sources, thereby ensuring that the data used for the verification is true and unbiased, without relying on any one or a few entities for verification data .
  • the certificate C is obtained from a local storage associated with a client.
  • the certificate C is obtained from a storage associated with a verifier entity that may be associated with or separate/independent from the client and/or the platform.
  • the source is external to the platform , then there is no reliance on the platform for the information to be used for verification, thereby improving the accuracy of the verification.
  • the certificate C for the transaction T is obtained from a storage or module that is associated with the platform. This option can be useful if the client does not have access to the certificate ,i.e. has not or has no means of obtaining a result following commitment of the transaction or has no means of receiving additional data such as the certificate required for the verification. In this case, verification can still be performed by or for the client based on verification data received from the platform.
  • the method of the present disclosure provides a method of verification for transactions that are associated with data services of the platform, as described in the first as well as second aspects above. This is also referred to as data writer verification.
  • the second implementation of the fifth aspect includes the steps of obtaining data D associated with a client, i.e. the payload or request data associated with the client, and then based on data D , determining a value of data that is committed to the blockchain d.
  • d may be equal to D or in other cases d may be associated with a salt or a hash function or salted has value of D, where salt is associated with a secret set or arbitrary value and the hash may be one or more known hash functions, such as SHA 256.
  • the method then includes extracting or identifying the transaction T associated with the committed value d.
  • the second implementation provides the same useful advantages of the first implementation, and in addition provides a manner of specifically performing verifications for transactions that have been committed to the blockchain using the data writer of the platform.
  • the method of the present disclosure provides a method of verification for transactions that are associated with event streams associated with the platform, as described in the second to fourth aspects above. This is also referred to as event stream ES verification.
  • the method of the third further comprises the steps of verifying closure of an event stream ES N by verifying the inclusion of a final transaction T N associated with ES N using the base verification of the first implementation.
  • the method then includes determining that the first input to first transaction T N is dust and that the first output of To is not dust; and that an input corresponding to the final N th transaction T N in the event stream ES N spends an output associated with a previous transaction T N -I. If the first input to first transaction T N is not dust and /or if the first output of T N is dust , an error message is generated.
  • the third implementation of the fifth aspect provides the same useful advantages of the first and second implementation, and in addition provides a manner of specifically performing verifications for transactions associated with event streams that have been committed to the blockchain using the platform.
  • the event stream provides a log of a sequence of events that can be verified using the above methods.
  • first , second and third implementation of the fifth aspect can be implemented by one or more processors associated with the client.
  • first , second and third implementation can be implemented by one or more processors associated with verifier entity.
  • the verifier entity may be independent from the client and/or the platform.
  • the fifth embodiment can be performed by modules or entities that are not related to the platform or the client, thereby ensuring a trust-less implementation , without relying on any one source of data to be used to verify a committed transaction.
  • the first , second and third implementation associated with the fifth aspect can be implemented by one or more processors associated with a platform itself. As mentioned above, this is also possible where external data sources for verification data are unavailable to the client or verifier entity, or offline or otherwise compromised.
  • the present disclosure according to the fifth aspect also relates to a computer implemented method for implementing a channel service for one or more clients, the method implemented by a channel processor and comprising the steps of receiving a request from a given client among the one or more clients, the request pertaining to creation of a channel and providing the given client access to one or more functions that enable direct communication between the given client and another entity via the channel.
  • the one or more functions include channel functions or procedures pertaining to the channel for transmission of data; and/or message functions or procedures pertaining to the data being transmitted using the channel.
  • the method also includes issuing one or more access tokens for the channel, said one or more access tokens being configured for secure communication with another entity via the channel.
  • the method includes storing and/or providing one or more notifications associated with the channel for the given client.
  • the present disclosure according to the fifth aspect may further relate to a computer implemented for processing transactions associated with a blockchain, the method implemented by one or more processors associated with a client.
  • the method includes the steps of obtaining from a channel service access to one or more functions that enable direct communication between the given client and another entity, said one or more functions including channel functions or procedures pertaining to a channel for transmission of data and/or message functions or procedures pertaining to the data being transmitted using a channels.
  • the method includes obtaining from the channel service one or more access tokens, said access tokens enabling secure communication with the other entity.
  • the method includes, using one or more channel functions received from the channel processor, creating a given channel for communication with another entity and sending the one or more access tokens associated with the given channel to the other entity.
  • the method includes receiving a notification associated with the given channel, the notification pertaining to data in the given channel associated with the given transaction, said data provided for verification that the given transaction is included in the blockchain.
  • channels enables direct or peer-to-peer communication for clients, by methods, devices, and systems which provide an interface or functions for a channel or a messaging service, without such clients needing to implement any processing or functionality for the blockchain, while still being able to avail all advantages associated with it.
  • Data to be used for verification in the fifth aspect or information associated with a client may be simply, securely, and instantaneously either written into or obtained from the blockchain, while disassociating the client from the blockchain.
  • the channel service may be provided by a separate channel processor, or may be provided by the above-mentioned platform or platform processor, or may be integrated with the client, or may be implemented separate to/independent from the client and/or the platform.
  • Channels enables direct or peer-to peer communication paths or sessions between entities for the transfer of messages or data required for verification , such as the delivery of certificates or the provision of client data etc. In most embodiments there are only two entities for each channel.
  • An example of the channel service and/or channel processor is described in detail in UK patent application no. 2007597.4 filed in the name of nChain Holdings Limited, the subject matter of which is herein incorporated by reference.
  • Access tokens, and specifically API tokens may in some embodiments act as unique identifiers for an entity or application requesting access to the channel .
  • access token may be considered to be unique authentication credentials assigned to a client, and can even be as granular as for individual channels or individual messages in each channel.
  • the access tokens may be such that the client can provide these tokens to the other entity for each of its channels for authentication.
  • the channel as set out above may be set up by the client or verifier entity to be use for the request or provision or transaction of verification data such as the transaction T, transaction identifier TxlD, client data D, certification C, inclusion proofs etc.
  • aspects of the present disclosure also include a computing device comprising a processor and memory, the memory including executable instructions that, as a result of execution by the processor, causes the device to perform the computer-implemented method, as discussed above, where the computing device pertains to the platform processor.
  • aspects of the present disclosure also include a computing device comprising a processor and memory, the memory including executable instructions that, as a result of execution by the processor, causes the device to perform the computer-implemented method, as discussed above, where the computing device pertains to client.
  • aspects of the present disclosure also include a computer system comprising at least one platform processor communicatively coupled to at least one client via a wireless communication network, the at least one platform processor associated with an application programming interface (API) endpoint for processing HTTP requests from the at least one client, the at least one platform processor implemented in accordance with the computing device mentioned above; and the at least one client being implemented in accordance with the client computing device mentioned above.
  • API application programming interface
  • aspects of the present disclosure also include a computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by a processor of a computer, cause the computer to perform the method of any of the aspects and embodiments set out above.
  • the platform processor for providing a plurality of services described above for the first aspect may be Platform as a Service (PaaS) and Software as a service (SaaS) offering that advantageously enables rapid delivery of useful real-world business and technical applications, such as management of software controlled technical systems or smart contracts, using a blockchain network such as the BSV blockchain.
  • PaaS Platform as a Service
  • SaaS Software as a service
  • An overview of the platform services can be seen in Figure 1 that shows a high-level schematic of the system.
  • the platform services has a platform processor 100 that provides an API 108, via which the services may be accessed by one or more clients.
  • Platform Services 100 as shown in this Figure are made up of three families of services and is aimed at allowing users and organisations to easily and securely make use of the advantages offered by the unique properties of a blockchain, without actually implementing any blockchain based software, knowledge or libraries at the client end. These services are:
  • Data Services 102 that aim to simplify the usage of the chain as a commodity data ledger.
  • Compute Services 104 that aim to provide a generalised compute framework backed by a digital asset such as Bitcoin SV.
  • Commerce Services 106 that provide enterprise-class capabilities for transacting using a digital asset such as Bitcoin SV
  • requests may be received via or using the HTTPS protocol from a client at the API, as the API is implemented as a web service.
  • the requested services are then implemented by the one or more service modules or processing resources 102 -106 using underlying software 110, such underlying software 110 being associated with the blockchain, i.e. to implement resources, libraries and/or key-management wallet implementations for creating, processing and submitting transactions associated with the blockchain.
  • underlying software 110 such as to implement resources, libraries and/or key-management wallet implementations for creating, processing and submitting transactions associated with the blockchain.
  • transactions can be submitted to the blockchain network 112 (instead of the client implementing any such functionality or transaction libraries).
  • the client may or can implement a digital wallet or the like associated with cryptocurrency or some other digital asset, but this is not essential as the platform service 100 may also be able to provide and manage the digital asset for the client.
  • Figure 2a relates to the first aspect of the present disclosure and depicts a computer implemented method for providing a platform of a plurality of services that are associated with a blockchain, such as the platform 100 shown in Figure 1.
  • the method of Figure 2a is implemented by a platform processor associated with an application programming interface (API).
  • API application programming interface
  • Step 202a depicts receiving a request from a given client among the plurality of clients.
  • the client may be one or more computing devices, resources or processors associated with a client, said client having signed up or registered to access the plurality of services that are provided by the platform processor.
  • the platform processor may be one or more processors, each offering a different type of function or service to be implemented using a blockchain, such as the Bitcoin SV blockchain (such as a processor for the data, compute and commerce services seen in Figure 1). It is also possible for there to be just one processor for a single service.
  • the request from the given client can be based on a standard Internet protocol such as the Hypertext Transfer Protocol (HTTP) transmission protocol format.
  • HTTP Hypertext Transfer Protocol
  • the request may include an identifier for the client as well as an identifier for the service requested.
  • step 204a the identity of the client is checked to see if the client is a valid client registered to use the platform processor and the functionality offered by it. In some embodiments, this may be based on known authentication methods such as password protected login authentication or the like. In this case, a record may be created for the given client based on a client identifier or alias included in the request, and a password. Validation may be based on a password received at the API matching the password in the record. In other embodiments, standard PKI techniques based on cryptographic private/public key pairs may also be used to validate a digital signature that is present in the request received form the client in step 202a. In this case, the identity of the client can be verified by checking if request signed by the private key can be successfully recovered or validated using the public key.
  • step 206a the request is not processed any further.
  • step 208a the validity of the request for the service in step 202a is then checked. This step is to ensure that the given client is indeed authorised to avail the service requested.
  • the permission or attributes for this may be present in the record for the client, to indicate one or more types of access levels or service that can be provided or not to a respective client.
  • step 210a the request is not processed any further.
  • a destination address which may be an endpoint URI for a server or processor that is responsible for implementing the requested service in step 202a.
  • a host server or platform API may covert the received request to a Remote Procedure Call (RPC) format to be sent to the destination address associated with the processor that is configured to implement the service identified.
  • RPC Remote Procedure Call
  • step 214a the service requested is processed by the respective platform processor responsible for it.
  • a blockchain transaction is either obtained or read or generated by the platform processor based on destination address/endpoint of the responsible processor, and an output script for this transaction is obtained.
  • Figure 2a refers to generating a blockchain transaction in this step, it will be understood that the first aspect of the present disclosure is not so limited. If the request in step 202a is to read or get data from the blockchain, then a transaction may not be generated, it can simply be read or obtained from the blockchain. There may be a plurality of blockchain transactions or multiple output scripts for one or more of the blockchain transactions generated.
  • the output scripts may include data outputs as the result (for instance there may be a data carrier UTXO ), or the result may be obtained based on the transaction identifiers or remaining outputs of the transaction. There may also be a non-spendable OP-RETURN output that is associated with the transaction from which the result can be obtained.
  • the result associated with the output script is provided to the given client in a HTTP or similar transmission protocol format.
  • the platform processor receives the response associated with the blockchain transaction(s) from the responsible processor in an RPC format.
  • An API converter then converts this to a message that can be sent based on the HTTP format, before sending it to the client.
  • the client used an alias addressing service, such as bsvalias
  • the result is sent in a HTTP message addressed to the alias for the client in a format that is dictated by the bsvalias machine readable resource.
  • Figure 2b relates to the first aspect of the present disclosure and depicts a computer implemented method for accessing a platform of a plurality of services that are associated with a blockchain, such as the platform 100 shown in Figure 1.
  • the method of Figure 2b is implemented by one or more processors associated with a client.
  • step 202b the application programming interface (API) endpoint associated with the platform is identified.
  • API application programming interface
  • this may be the API associated with a host platform processor, and there may be one or more further processors responsible for implementing the service - each with their own service endpoint or a destination address.
  • the client prepares a request for a service, such as the data writing service 102 in Figure 1.
  • the client in some embodiment includes a client alias or identifier and/or a service identifier in the request, so that it can be routed to the correct service endpoint. This is useful for checks by the platform processor regarding the validity of the requesting client and the client’s permission to use the requested service.
  • the request prepared in step 204b is sent using a Hypertext Transfer Protocol (HTTP) or similar transmission protocol format, as the platform processor is implemented as a HTTP or REST API.
  • HTTP Hypertext Transfer Protocol
  • step 208b the result that pertains to an output script of a blockchain transaction associated with the request is provided from the platform processor. This result is provided to the client in the HTTP transmission protocol format.
  • a request for blockchain based services is sent and received by the client in the HTTP transmission protocol format, and therefore the client can make use of all advantages and services unique to a blockchain, without having to implement any transaction capability or blockchain libraries.
  • the service is offered via a platform API, which may be a HTTP or REST API endpoint.
  • REST API design standards can process HTTP requests and communication using the following HTTP commands over the Internet - and this is all the functionality that is required by the client, i.e. to be able to send and receive messages over the Internet.
  • the platform processor(s) implement the commands remotely, or separately for the client.
  • Figure 3 provides a more granular schematic view of the plurality of services associated with a blockchain, and which can be implemented by the platform 300 that is associated with an API via which any one or more of the offered services can be accessed.
  • the data services 302 may include a data writer 302a and a data reader service 302b.
  • the implementation of event streams using the data writer service 302a will be explained in detail in Figures 4 to 8, to enable clients to write data into the blockchain in a simple, secure and optimised manner.
  • the data reader service 302b enables the clients to send queries, which returns data that is stored in the blockchain.
  • the compute services 306 of the platform 300 includes an application 306a and framework 306b associated with smart contracts, which in some embodiments may be represented as a state machine in the blockchain 310.
  • the compute services 306 interacts with the data services 302 as data will need to be input and results provided to a client for any such computation.
  • Commerce services 304 are responsible for provision of enterprise-class capabilities via enterprise wallets 304a for transacting over the blockchain 310, based on best-in-class security practices and technologies.
  • enterprise wallets may implement functionality to enable blockchain transaction processing when more than one person or user or account may need to sign off on a transaction meeting a defined criterion i.e. associated with cryptocurrency of a large value above a certain predefined limit.
  • An enterprise wallet may also include functionality to implement a threshold number and/or type of signatures to move large amounts of digital assets such as cryptocurrency or tokens representing another resource. The movement of these assets can then be represented on the blockchain following processing based on the criteria applied by such enterprise wallet implementation.
  • the SPV services 308 are applications that require information from the blockchain but do not include direct links to it, as they do not run a miner node. Such SPV service 308 allows a lightweight client to verify that a transaction is included in a blockchain, without downloading the entire blockchain 310.
  • Second aspect a Platform providing a data writing service associated with a blockchain
  • Figure 4 relates to a second aspect of the present disclosure and depicts a computer implemented method for providing a data writing service for transactions that are associated with a blockchain, such as the data writer 302a seen in Figure 3 of the first aspect.
  • the method of Figure 3 is implemented by a platform processor associated with an application programming interface (API) for the service.
  • API application programming interface
  • Step 402 depicts receiving a request from a client, the request relating to an event stream ES implemented using a blockchain.
  • the request from the client being in a Hypertext Transfer Protocol (HTTP) transmission protocol format, as with the first aspect.
  • the event stream relates to a state machine, and represents a machine-readable contract or smart contract that is implemented as a finite state machine in the blockchain.
  • a Finite state Machine (FSM) is a well-known mathematical model of computation. It is an abstract machine that can be in exactly one of a finite number of states at any given time. The FSM can change from one state to another in response to some external inputs - the change from one state to another is called a transition.
  • An FSM may be defined by a list of its states, its initial state, and the conditions for each transition.
  • the UTXO set can be thought of as a state machine, with a given output's spent state being a function of previous inputs to the transaction (the machine).
  • the request can be considered as a request to alter a current state of a smart contract, implemented as an event stream ES in the blockchain.
  • the current state of the event stream ES would be E n.
  • Step 406 depicts identifying or obtaining data associated with a next or new event E n+i for the event stream ES based on the received request in step 402.
  • the new event may be data or a function to trigger an alteration of a state so that the event stream transitions to the next state.
  • Step 408 depicts the step of creating a blockchain transaction TX n+i for a next event E n+i by one or more processors associated with the platform processor implementing the data writer.
  • the blockchain transaction TX n+i includes at least: an input associated with a transaction output (TXO n ) from a previous transaction TX n . This input spends the TXO n output from the previous transaction an unspent output (UTXO n+i ) associated with event data representing the new event E n+i . In some embodiments this is a data output, i.e. representing a data carrier element of the transaction.
  • Step 410 depicts submitting the transaction TX n+i created in step 408 to the blockchain.
  • the transaction may be submitted to the blockchain, such as the Bitcoin SV network for inclusion in a subsequent block by a miner node or BSV node software associated with the platform processor.
  • This corresponds to the latest transaction TX n+i submitted to the blockchain for ES.
  • the new state is identified and updated based on the event data output in the final transaction output UTXO n+i .
  • Step 414 depicts sending a result based on the updated current state ES n+i in step 412, the result being provided based on the HTTP transmission protocol format to the client.
  • Figures 5, 6 and 7 discuss an application associated with implementing event streams, such as those discussed in relation to figure 4 of the second aspect.
  • the third aspect relates to a technique for establishing an immutable sequential log or record of the event stream ES up to its current state on the blockchain.
  • the log in addition to being stored on the blockchain, can also be provided or stored off-chain.
  • the techniques described below for the third aspect set out a method for establishing an immutable chronological log of all transactions associated with an event stream on the blockchain.
  • the event stream may represent sequential inputs that are applied to a smart contract that is implemented using an FSM, DFA etc.
  • Figure 5 relates to the second aspect of the present disclosure and depicts a computer implemented method for providing a data writing service for transactions that are associated with a blockchain, such as the data writer 302a seen in Figure 3 of the first aspect.
  • the method of Figure 5 is implemented by a platform processor associated with an application programming interface (API). The method relates to creating a new event stream.
  • API application programming interface
  • Step 502 depicts receiving a request from a client, the request being to create a new event stream ES using the blockchain.
  • the request from the client is in a Hypertext T ransfer Protocol (HTTP) transmission protocol format, as with the first and second aspects.
  • Step 504 depicts the step of determining a hierarchical deterministic (HD) key chain K to be used with a new event stream ES to be created. In some embodiments, this may be implemented by a HD wallet implementation associated with the platform processor to generate a hierarchical tree-like structure of keys which start from the seed or parent or master key based on the known BIP 21 Protocol.
  • HD hierarchical deterministic
  • the HD key creation and transfer protocol greatly simplifies key generation and permits creation of child accounts which can operate independently, gives each parent account the ability to monitor or control its children even if the child account is compromised.
  • the HD protocol uses a single root seed to create a hierarchy of child, grandchild, and other descended keys with separate deterministically- generated integer values.
  • Each child key also gets a deterministically-generated seed from its parent, called a chain code. This way, any compromising of one chain code doesn’t necessarily compromise the integer sequence for the whole hierarchy.
  • this key generation is carried out by the platform processor, therefore removing the resource and functionality of this generated from the client. No HD wallet therefore needs to be implemented by the client.
  • key chain K includes a series of private/public key pairs derived from a selected parent key pair, such that:
  • Step 506 depicts identifying or obtaining data associated with a first event Eo, this being for the new event stream ES to be created in the blockchain based on event data in the received request in step 502.
  • Step 510 depicts that the output of the blockchain transaction TXo created in step 508 includes at least a first unspent transaction output (UTXOo_ dust ) being a dust output, said dust output associated with a locking script secured with a first derived key pair Ko in the series of keys derived from the HD key chain K in step 504.
  • a dust output is associated with a (digital asset) value that is below a defined limit for a transaction or having a defined minimum value, i.e. lower than a mining fee that would be required to spend such transaction.
  • a Create template for a blockchain transaction to create an event stream as per the present embodiment is one where the first input must be greater than dust. This is to advantageously indicate that there is no previous entry in the event stream, and this is the first entry.
  • the Create template also specifies that first output of the template is dust, and that there is no data carrier or data output (so no OP_RETURN), as there is no event data associated with the Create state - other than the creation of a new event stream ES.
  • an OP_RETURN is included for the create frame, but this does not hold any event data. It may hold metadata describing the parameters of the newly created stream. Examples of metadata examples may include details such as publicise or notarise properties, write to blockchain time, time when events will first be accepted, time when events will no longer be accepted, geo-region where backing or related data will be stored, maximum size of acceptable data, sequence number and more.
  • Step 512 depicts submitting the transaction TXo to the blockchain.
  • the transaction may be submitted to the blockchain, such as the Bitcoin SV network for inclusion in a subsequent block by a miner node or BSV node software associated with the platform processor.
  • the transaction identifier TXo may be used to uniquely identity the newly created event stream ES.
  • Step 514 depicts sending a result associated with the created event stream ES in TXo to the client, the result being provided in the HTTP transmission protocol format.
  • the result relating to the event stream may be copied or saved separately from the blockchain.
  • the creation of the event stream may be decoupled from the submission to the blockchain for on-chain settlement.
  • an event stream id that is unique to a respective event stream may also be used, and may be provided in the result to the client instead.
  • Figure 6 relates to the third aspect of the present disclosure and depicts a computer implemented method for providing a data writing service for transactions that are associated with a blockchain, such as the data writer 302a seen in Figure 3 of the first aspect.
  • the method of Figure 6 is implemented by a platform processor associated with an application programming interface (API).
  • API application programming interface
  • This figure is related to a request to append a new event to an existing event stream ES on the blockchain.
  • Step 602 depicts receiving a request from a client, the request being to amend an existing stream ES identified in the request and implemented in the blockchain.
  • the request from the client is in a Hypertext Transfer Protocol (HTTP) transmission protocol format, as with the first and second aspects.
  • HTTP Hypertext Transfer Protocol
  • authentication and authorization checks are performed, which may be a test for the presence of an API access token, or a session check or a password /digital signature test, or some other appropriate method to validating the client or the service request made.
  • step 604 the current length n of the event stream ES is determined.
  • Step 606 depicts identifying or obtaining data associated with an event E n , this being the event to be currently added or appended to the event stream ES on the blockchain based on event data in the received request in step 602.
  • step 608 a previous blockchain transaction TX n -i associated with the event stream ES is identified. Once identified, a key pair K n -i associated with the identified previous transaction TX n -i is then determined. As mentioned above, this is based on the same seed key pair K set out in step 602.
  • step 610 a key pair K n for the current event E n is derived from the seed key pair K.
  • Step 612 depicts creating a current blockchain transaction TX n for the new event stream ES where 0 ⁇ n ⁇ N by one or more processors associated with the platform processor implementing the data writer.
  • the blockchain transaction TX n created for the current event E n to be appended to the event stream ES includes: a first input spending a dust output associated with the previous transaction TX n -i, said spend authorised with the obtained key pair K n -i for the previous transaction obtained in step 608; a first unspent transaction output (UTXO n-dust ) being a dust output for the current transaction TX n , said dust output associated with a locking script secured with the derived key pair K n from step 610; and a final unspent transaction output (UTXO n-data ) associated with event data representing the current event E n .
  • a dust output is associated with a (digital asset) value that is below a defined limit for a transaction or having a defined minimum value.
  • digital assets There may also be other inputs associated with digital assets based on an operational float. This float may be controlled by the platform processor. It is also possible to have other outputs in the transaction that are digital asset change outputs.
  • an Update template for a blockchain transaction to update an event stream as per the present embodiment is one where the first input must be dust and the first output must be dust. This is to advantageously indicate the presence of a previous entry in the event stream. This also indicates that the event in question E n (the present or current event data) comes after the previous transaction or state. Thus, the transaction advantageously follows the dust chain and comes before the next state.
  • the Update template includes a data carrier, i.e. a data output that carries the event data or a result associated with the current event or state. This may be an un-spendable OP_RETURN output.
  • the use of dust outputs in the transaction is advantageous for maintaining an immutable sequential record of all transactions as they occur for an event stream ES in the blockchain. This is because, although by posting transactions to the blockchain all blockchain transactions would be time-stamped and remain in order in the blockchain, this does not guarantee preservation of their sequential order. This is because transactions might be mined into blocks at different times.
  • the use of a dust output of a previous transaction being spent as the first input of a current transaction, where the spend is based on respective unique keys pertaining to the locking/unlocking scripts of each transaction ensures a clear, sequential tamper proof record of the event stream in chronological order.
  • Step 614 depicts submitting the transaction TX n to the blockchain.
  • the transaction may be submitted to the blockchain, such as the Bitcoin SV network for inclusion in a subsequent block by a miner node or BSV node software associated with the platform processor.
  • the transaction identifier may be used to uniquely identity the event stream ES.
  • Step 616 depicts sending a result associated with the created event stream ES in TX n to the client, the result being provided in the HTTP transmission protocol format.
  • the result may be copied or saved separately to the blockchain. In some embodiments, this may be based on the event data in the final unspent transaction output (UTXO n-d ata).
  • the event data for the event E n in (UTXO n-d ata) includes a hash of said event data, thereby ensuring that this is kept private by the platform processor.
  • the hash may be applied by the platform processor or be applied by the client, i.e. applied in some embodiments prior to generating the event data pertaining to the request that is received at the platform processor in step 602 for the event E n . In the case of it being applied by the client, the event data in the request is private even before it reaches the platform processor.
  • the event data may be provided as raw data, publicly available from the blockchain.
  • Figure 7 relates to the third aspect of the present disclosure and depicts a computer implemented method for providing a data writing service for transactions that are associated with a blockchain, such as the data writer 302a seen in Figure 3 of the first aspect.
  • the method of Figure 7 is implemented by a platform processor associated with an application programming interface (API).
  • API application programming interface
  • the request in Figure 7 is to terminate an existing event stream on the blockchain.
  • Step 702 depicts receiving a request from a client, the request relating to the termination of an existing event stream ES implemented using the blockchain.
  • the request from the client being in a Hypertext Transfer Protocol (HTTP) transmission protocol format, as with the first and second aspects.
  • HTTP Hypertext Transfer Protocol
  • authentication and authorization checks are performed, which may be a test for the presence of an API access token, or a session check or a password /digital signature test, or some other appropriate method to validating the client or the request made.
  • step 704 the current length N of the event stream ES is determined.
  • Step 706 depicts identifying or obtaining data associated with a final event EN, this being for the event to be currently added or appended to the event stream ES on the blockchain based on event data in the request received in step 702.
  • step 708 a previous blockchain transaction TXN-I associated with the event stream ES is identified. Once identified, a key pair KN-I associated with the identified previous transaction TXN-I is then determined. As mentioned above, this is based on the same seed key pair K set out in step 702. In step 710 a key pair K N for the current event E N is derived from the seed key pair K.
  • the blockchain transaction TX N created for the current event E N to terminate the event stream ES includes: a first input spending a dust output associated with the previous transaction TX N -I , said spend authorised with the obtained key pair K N -I for the previous transaction obtained in step 708; a first unspent transaction output (UTXO N ) associated with a digital asset that is above a defined dust output limit.
  • a Close template for a blockchain transaction to terminate an event stream as per the present embodiment is one where the first input must dust be dust, like the first input of the Update template in Figure 6.
  • the first output must not be dust, and this advantageously acts as an end-of-ledger marker and furthermore distinguishes the Close template from the Update template.
  • the OP_RETURN may include metadata in the Close template.
  • Step 714 depicts submitting the transaction TX N to the blockchain .
  • the transaction may be submitted to the blockchain, such as the Bitcoin SV network for inclusion in a subsequent block by a miner node or BSV node software associated with the platform processor.
  • Step 716 depicts sending a result associated with the created event stream ES in TC N ⁇ O the client, the result being provided in the HTTP transmission protocol format.
  • Figure 8 relates to the third aspect of the present disclosure and depicts a computer implemented method for accessing a platform or a data writing service for writing data into an event stream associated with a blockchain, such as the platform 100 shown in Figure 1 or platform 300 in Figure 3.
  • the method of Figure 8 is implemented by one or more processors associated with a client.
  • step 802 the application programming interface (API) endpoint associated with the platform is identified.
  • API application programming interface
  • this may be the API associated with a host platform processor, and there may be one or more further processors responsible for implementing the service, that each have a service endpoint or a destination address.
  • the client prepares a request for a service, such as the data writing service 302 in Figure 3.
  • the request is associated with one or more events E n pertaining to an event stream ES in the blockchain.
  • the client in some embodiment includes a client alias or identifier and/or a service identifier in the request, so that the request can be routed to the correct service endpoint, and so that the platform processor can check the validity of the requesting client and the client’s permission to use the requested service.
  • step 806 the request prepared in step 804 is sent using a Hypertext Transfer Protocol (HTTP) or similar transmission protocol format, as the platform processor is implemented as a HTTP or REST API.
  • HTTP Hypertext Transfer Protocol
  • the platform processor is implemented as a HTTP or REST API.
  • step 808 a result is received that pertains to an output script of a blockchain transaction associated with the event E n in the request.
  • This result is provided to the client in the HTTP transmission protocol format.
  • the result may be saved in a log separately to the blockchain, either in or associated with the platform processor.
  • an event stream and its sequential log associated with the blockchain offers guarantees relating to immutability of events and immutability of event sequencing. Once written, any attempt to tamper with the event stream in any of the following ways is either prevented or made evident:
  • the methods according to the third aspect makes the following attributes relating to the event stream provable:
  • An example for an event stream for which capture of an event log would be useful is an application to track and record the event of a game, such as Noughts O and Crosses X using the blockchain.
  • each event in a given event stream need not correspond to individual events occurring within a gaming session.
  • An event stream may be defined for any log of events where an accurate, sequential, tamper-proof log of said events is desirable.
  • Examples of events in a given event stream may include, e.g. inputs and / or outputs of a given smart-contract being executed locally or remotely (preferably off-chain); messages sent between two or more participants of a given online messaging conversation; physical measurements performed by sensors or loT devices for measuring e.g. weather, locations of e.g. vehicles, goods, people, etc.;_drug / medicine tracking- including e.g. source of manufacture, transportation, dispenser location, prescribed dosage, recipient information, etc.; financial transactions, such as e.g.
  • Figure 9 illustrates a technique for updating a plurality of event streams.
  • An event stream is discussed in relation to the second and third aspects above, especially Figure 6, which refers to a method for appending data to or modifying a single event stream.
  • the fourth aspect of the present disclosure enables a plurality of separate events stream, each capable of progressing separately as set out in Figures 5 to 7, to be synchronised.
  • the event streams once synchronised in accordance with the fourth aspect in addition to being stored on the blockchain, can also be provided or stored off-chain.
  • each of the plurality of event streams is based on inputs and outputs associated with blockchain transactions, including the single or atomic transaction that synchronises the streams by appending a synchronising event to all provides an immutable chronological log of all transactions, wherein the point of synchronisation can be traced back to the single atomic transaction.
  • the event data associated with an event for synchronising the plurality of event streams may be same for each of the plurality of event streams, or may be different for at least one of more the plurality of event stream, or there may be no event data in some cases.
  • the references made to the current or synchronising event in Figure 9 are understood to cover all these possibilities. For ease of explanation only, and with no limitation implied, some embodiments of the fourth aspect are explained in terms of a single event or in cases, the same event data.
  • Figure 9 relates to the fourth aspect of the present disclosure and depicts a computer implemented method for providing a data writing service for synchronising a plurality of event streams.
  • This method may be implemented by a platform processor offering a function or service like the data writer 302a seen in Figure 3 of the first aspect.
  • the method of Figure 9 is implemented by a platform processor associated with an application programming interface (API).
  • API application programming interface
  • this API is an endpoint that is different to the API indicated in Figure 6 which teaches a method to update a single event stream.
  • Figure 9 is related to a request from a client to append a new event to a plurality of M event streams on the blockchain in order to synchronise all of the M streams.
  • the request from the client is in a Hypertext Transfer Protocol (HTTP) transmission protocol format, as with the earlier aspects.
  • HTTP Hypertext Transfer Protocol
  • K Ko to i
  • Other authentication and verification checks for a client’s authority to append to a given event stream may also be performed based on asymmetric key pairs or digital signatures which may be a test for the presence of an API access token, or a session check or a password /digital signature test, or some other appropriate method to validating the event stream ES n or the service request made.
  • the request from the client may also specify the target index for one or more identified event stream ES n , the target index being the next available index or in other words representing the actual or current length + 1 of the event stream to be used for the synchronisation request.
  • Step 904 depicts identifying or obtaining data associated with a current event E n from the request in step 902 .
  • This is the data used to synchronise the plurality of M event streams and is the event E n to be added or appended to each of the M event streams ES n identified in the request .
  • the event data associated with the event E n added to each stream as part of the synchronisation process may differ from one or more of the other streams among the plurality .
  • the metadata may be associated with a synchronising logical clock, usage of different currency or exchange rates specific to a given event stream, addition of a random value, i.e. a salt to each stream, properties of a hash and/or salt function etc.
  • Step 906 depicts an embodiment where one or more verification steps taking place before the synchronisation of multiple streams can take place.
  • the signature may be based on a public key provided for a given event stream on creation (see Figure 5).
  • index ⁇ esid0.iast_index>
  • a seed key pair K or key chain may be associated with and be specific to each event stream ES n .
  • a key pair KM associated with the identified previous transaction TX n -i is then determined. Based on this, a key pair K n for the current event E n to be added to the event stream ES n is derived from the seed key pair K.
  • This transaction is a single transaction that updates multiple streams, in order to synchronise the M event streams with a given event E n .
  • the atomic blockchain transaction may be referred to as a rendezvous transaction.
  • Such transactions are an enhancement to event streams in Figure 6 that enable a single append operation, as they can append the same event to multiple streams atomically, i.e. either all event streams party to the rendezvous or atomic transaction are extended or synchronised with the given E n , or none are.
  • the event E n may be associated with the same event data for all , or the event E n different event data for one or more of the plurality of M event streams.
  • Atomic or rendezvous transactions are transactions across event streams and unlike the transaction in step 612 of Figure 6, these transactions involve constructing multiple dust chains, each respective to a given event stream ES n among the plurality M as the first inputs.
  • an event stream ES n is associated with a key chain K, then similar to in step 602, the respective n th dust input spend is authorised using the obtained key pair KM for the previous transaction obtained in step 908.
  • the n th dust output for the atomic blockchain transaction TX n is associated with a locking script secured with the derived key pair K n from step 908.
  • tracking the dust inputs/outputs i.e. the chain-of-dust, transactions is used to prevent reordering of entries in the log, prevent after- the-fact of insertion/deletion, forks, i.e. alternative timelines, etc. leveraging the blockchain network’s security, immutability, and double-spend prevention.
  • This chain of dust formed by the n th input/output pair on a series of data carrier transactions collectively secure a respective single event stream ES n .
  • the rendezvous or atomic transactions contains a dust chain, platform funds and change (for transaction fees), and a data carrier for each event stream.
  • the atomic transactions allow for many dust chains , each relating to a different event stream to pass through the single blockchain transaction.
  • the data payload or event data E n used for synchronisation in the above described embodiment will be the output in an atomic transaction.
  • the input and output indexes have a one-to-one mapping , with the single data element having the final output index.
  • An auditor or verifying entity or program may require the input index used for a respective event stream ES n for checking that particular event stream.
  • indices may be supplied via the platform processor as part of the metadata that may be available to the client or the verifying entity, or the indices may be obtained on-chain through observation of the transaction inputs i.e. by scanning the inputs to match with the output of the previous event of a respective event stream.
  • the two accounts are to be synchronised when A transfers 2 units of currency at offset X to B . While this transfer represents the synchronising event E n for each stream , the event data associated with each is likely to be different.
  • the event data may represent a decrease of 2 units at offset X.
  • the event data may represent an increase of 1 unit at offset Y , which is the equivalent of an addition of the 2 units at offset X that is transferred from A.
  • the transfer may be split into two separate atomic transactions, one for a 2X subtraction event from A that is recorded in both event streams, and another for the addition event of the 1 Y unit into B, also recorded in both streams.
  • the verification may be processed sequentially to check the events of a given event stream ES n stream, until an atomic blockchain or rendezvous transaction is encountered. From this point, the verifying entity may review other accounts also owned by the same client and perform a zero-sum calculation . Any error may then be flagged at this stage, and if there are none, the verifying entity simply proceeds to verify the next event in the stream that it is checking.
  • FIG 11. An example of an atomic transaction associated with two event streams T 1 and T2 is seen in Figure 11.
  • the dust input/output pair of each T1 and T2 are the first two entries in the atomic transaction TX12 at index 0 and index 1, respectively.
  • TX12 tracks the dust chains associated with both event streams, T 1 and T2.
  • the response array may be provided for the purposes of independent verification for each event stream, or so that the client is aware of which index values to use for a respective event stream ES n for request for a next event. If the index is unknown for one or more event stream, for instance, if the event stream is empty, a NULL value may be included for an event stream.
  • each respective event stream ES n may proceed independently , as separate streams, such as discussed in the third aspect, following the atomic transaction.
  • the API in step 902 collects each of the M event streams to be settled on chain and groups them into a single blockchain rendezvous transaction.
  • Figure 10 relates to the fourth aspect of the present disclosure and depicts a computer implemented method for accessing a platform or a data writing service for synchronising event streams associated with a blockchain, such as the platform 100 shown in Figure 1 or platform 300 in Figure 3.
  • the method of Figure 10 is implemented by one or more processors associated with a client.
  • the application programming interface (API) endpoint associated with the platform for synchronising event streams is identified.
  • This API may be made available to the client by one or more known means of delivering APIs. As mentioned in relation to Figure 8, this may be the API associated with a host platform processor for providing a data writing service, or may be a separate API specific for synchronising multiple event streams.
  • API application programming interface
  • step 1006 the request prepared in step 1004 is sent using a Hypertext Transfer Protocol (HTTP) or similar transmission protocol format, as the platform processor is implemented as a HTTP or REST API.
  • HTTP Hypertext Transfer Protocol
  • This request is sent as a JSON object , as mentioned above in relation to Figure 9.
  • Data services 302 associated with platform services offered by the platform 300 in Figure 3, such as the one or more processors associated with the data writer 302a ensure data integrity assured by timestamping, tamper- proof evidence and non-repudiation mechanisms to provide immutability by the use of mechanisms such as event streams as discussed in the second, third and fourth aspects of the present disclosure.
  • the embodiments associated with the data writer provide solutions for data storage and retrieval compliant with modern data protection regulation, introduce non-repudiation properties, and deliver certification of all properties with a simple procedure to allow for independent verification of data.
  • Data services 302, and especially the data writer 302a construct on-chain transaction with customer or client data embedded inside. Transactions are immutable and public, and once a transaction is included in the blockchain it cannot be removed, as explained. Further, these transactions are broadcast across the blockchain network.
  • the advantages of immutable and public properties of the transactions may present some roadblocks when dealing with sensitive data that falls under data privacy and protection laws or that is confidential.
  • a first concept of notarisation associated with the platform 300 and preferably or especially one or more processors associated with the data writer 302a commits a salted fingerprint or record of customer or client data to the blockchain.
  • Salt is understood to be a unique value that may be randomly generated for each transaction associated with the data writer.
  • Salted data of the first concept has the advantage of revealing nothing and preventing brute force preimage attacks, such as brain wallet attacks.
  • a second concept of publication associated with the platform and especially one or more processors associated with the data writer 302a commits full data payloads to the blockchain.
  • This second concept advantageously provides permanence and distribution of client data.
  • proofs of inclusion into the blockchain are generated by the platform.
  • a combination of the enclosing transaction and its inclusion proof form a certificate.
  • These certificates are mathematically sound proofs that cannot be faked or tampered with, and advantageously are independently verifiable away from and separate to the platform 300 or any services associated with the platform such as the data writer 302a.
  • one or more features, methods or processes associated with data services 302 of the platform 300 in Figure 3 while at the same time capable of being implemented independently from the platform 300 to allow for the storage or provision of notarised or publicised customer or client data at the point of notarisation or publication, and for the subsequent retrieval of said data.
  • a data retrieval functionality is provided which advantageously allows the client or customer entity to retrieve notarisation and publication certificates mentioned above, from the platform 300.
  • one or more processors associated with the platform 300 or data services 302 generate one or more on-chain transactions.
  • Data services further generate a certificate, which is a data bundle including a transaction, a block header, and an inclusion proof linking the transaction to the block header.
  • a first embodiment or implementation of the fifth aspect depicts a method for establishing how any transaction may be proven to be included in a block.
  • step 1 is part of the longest proof-of-work chain of blocks. In some embodiments , this includes using an independently sourced view of the longest proof-of- work blockchain
  • steps may be performed by one or more processors or tooling or software associated the data services itself in some examples.
  • using data services introduces an element of trust on the platform 300 for the verification.
  • the verification process according to the present disclosure is advantageously performed without any reliance data services 302 or indeed any platform services tooling.
  • step 1102 acquires C, either from local copies or storage associated with a client or account or from Data Services storage facility in step 1104.
  • a local headers client is one that is configured to store block headers associated with the transaction T.
  • Other known or existing techniques for establishing the longest chain may also be utilised.
  • headers client is mention herein after in the present disclosure.
  • Verification can be performed against a local database of Bitcoin block headers.
  • This database may be populated from the Bitcoin network, by synchronising header messages in real-time from a rotating subset of all peers on the network.
  • the longest chain is advantageously independently sourced from a random and rotating selection of all peers, to eventually synchronise with all peers. This advantageously prevents eclipse attacks on the verification process of the first embodiment, and therefore the creation of adversarial forks if a malign party has access to or controls a number of nodes or IP addresses in the blockchain network.
  • An eclipse attack is one where the malign party may try to hide a valid chain of block by providing incorrect proofs that can still be mathematically traced back to a block , but that block may be one that is invalid or may have been generated by the malign party.
  • headers client operates as described above and may be used to source the longest chain of headers. As it is open source, it may also be inspected by an independent verifier entity, to ensure that the chain identified faithfully and truthfully represents the longest chain of block headers.
  • channel may be used for verification data to be sent and received
  • the data writer 302a of data services provides an API that allows for customers to notarise and/or publicise individual data payloads. This is by embedding either the data (publicise as set out above ) or a salted hash commit of the data (notarise as specified above) into a Bitcoin transaction. The platform then funds the transaction.
  • customers or clients advantageously do not participate in on-chain transaction construction , other than supplying the embedded data via a HTTP request, such as POST.
  • a data carrier transaction pays value or funds from the platform back to the platform ( change, less any mining fees), as mentioned above in the third aspect, and then includes a data commitment as an additional provably unspendable transaction output. Notarisation and publication set out above follow a similar flow.
  • the data is enveloped into a transaction, which is submitted to the blockchain.
  • the transaction is included into a block.
  • the client then initiates an operation by making an HTTP POST request, such as given below as an example:
  • the platform may provide one or more storages or storage modules that are integrated within the platform or otherwise associated with the platform. These storages may be provided for one or more clients associated with platform services. Therefore, if the client may be one that does not have storage associated with it, or prefers to store data associated with the platform 300 at a location other than at the client entity or in associated with one or more processors associated with the client, the storage associated with the platform may be bought or rented or used. In this case, if platform related storage is present or active, the payload in the client request (HTTP POST) is written to private and/or geo- restricted data storage associated with the platform.
  • HTTP POST HyperText Transfer Protocol
  • a commitment payload is generated, which is a salted hash of the full customer or client payload.
  • the data carrier transaction is constructed, and funded Transactions are then submitted to the blockchain, allowing for an accept/reject message to be received in response
  • the response to the request contains an identifier ,i.e. a write ID, which can be used later to request a copy of the data certificate (if available), and to retrieve the original data payload (if stored).
  • the present disclosure extends the verification set out in the first embodiment so that it applies not only the integrity of the transaction, but additionally to confirm that the transaction contains the expected customer or client data.
  • the second implementation may be performed without dependence the platform processor
  • Extract T from C in step 1206. Extraction may include reading the data based on a key, if the Certification is in a JSON format. Alternatively, binary encoding or other known methods may be used to parse the data in C to extract T.
  • event streams are a blockchain-backed append-only logs.
  • Clients associated with platform services 300 may create, append to, as well as close event streams as set out in Figures 5 to 8.
  • data appended to an event stream may be notarised or publicised, and underlying data may optionally be stored in private and/or geo-fenced storage. These choices may be made per-stream ES , rather than per-entry E n .
  • the data writer 302a associated with event streams may be used to certify any single entry within a log, as set out above.
  • Event streams utilise the underlying blockchain to extend advantages associated with the first and second embodiments of the fifth aspect by at least the following inherent properties or rules or facts associated with event streams:
  • the streams are append-only, and therefore
  • Unauthorised parties may not append events to an event stream.
  • the transaction template is extended to include a chain of dust (which is a lowest possible value of Bitcoin, as mentioned above) linking the individual transactions.
  • Each transaction in this dust chain contains a data carrier that represents a single event in a stream.
  • Transactions in the dust chain are linked by a successive transaction spending the dust output from the preceding transaction, as set out in detail in the third aspect.
  • the Bitcoin blockchain does not allow double spending of any value in the system. Therefore, each spent transaction output is spent exactly once in exactly one successor transaction.
  • This property advantageously (i) prevents any forking of the log; (ii) ensures that each entry has exactly one predecessor and either zero or one successor; (iii) no other transaction, other than the above-mentioned transaction, would be valid under Bitcoin's rules and thus, no other structure could be possible with event streams.
  • An immutable ledger prevents transaction graphs from being rewritten at a later point in time. This advantageously ensures that no entries can be inserted after-the-fact. Whilst it is possible for a party to withhold details of a transaction, and therefore entry, somewhere in the dust chain; it is not possible for that party to construct an alternative movement of funds that would pass transaction inclusion validation checks in order to convince another party that the dust chain did not include a particular entry. The dust chain would reveal the absence of any entry that a party had attempted to withhold.
  • An actual API call may accept many parameters defining access control policy, retention policy, on-chain visibility and more.
  • the API may then respond with information relating to the event stream:
  • Data may be appended to an event stream with additional HTTP requests such as:
  • the optional after parameter of seq-no allows the caller to append to an event stream only if it has not been appended to since last observed. This can be useful when synchronising event stream operations between multiple clients , using atomic blockchain or rendezvous transactions according the fourth aspect. This may serve as a form of optimistic concurrency control.
  • HTTP response template An example of the HTTP response template is given below:
  • Event stream data such as optionally stored payloads, plus certificates may be downloaded from the platform services 300 HTTP API.
  • an authorised observer may receive a replica of an event stream using a different API, such as one associated with simple payment verification (SPV).
  • SPV simple payment verification
  • This API may offers push notifications for new data.
  • the Event Streams service acts as an SPV Channels server, and observers (receiving a replica) may be SPV Channels clients.
  • the third implementation of the fifth aspect extends both the first and second implementations to additionally confirm relationships between events in an event stream.
  • the certificates generated by event streams form proofs for causal came-before, comes-after, immediately- precedes and immediately-follows relationships.
  • an event stream's integrity may be verified in the third implementation by starting at one end of the stream and traversing each transaction in the dust chain until the other end of the stream is reached.
  • the transaction's inputs and outputs are inspected.
  • the first input to a transaction must reference the first output of the previous transaction, which must be dust. Any discrepancy in the dust chain indicates that the associated append-only log is not reliable.
  • the method according to the implementation can be performed by the platform service 300 to perform this verification; the fifth aspect allows for fully independent verification to be performed.
  • This verification may be performed forwards or backwards in an event stream forward verification [To, . . . , T n , . . . [, 7w]] is herein described, but is not to be considered limiting.
  • step 1306 Verify that the first output of To is dust as per 1308 , else fail in step 1310
  • computing device 2600 may be used to implement any of the systems illustrated and described above.
  • the computing device 2600 may be configured to be used as one or more components of DBMS of figure, or the computing device 2600 may be configured to be a client entity that is associated with a given user, the client entity making database requests for a database that is managed by the DBMS of Figure 14.
  • computing device 2600 may be a portable computing device, a personal computer, or any electronic computing device.
  • the computing device 2600 may include one or more processors with one or more levels of cache memory and a memory controller (collectively labelled 2602) that can be configured to communicate with a storage subsystem 2606 that includes main memory 2608 and persistent storage 2610.
  • the main memory 2608 can include dynamic random-access memory (DRAM) 2618 and read only memory (ROM) 2620 as shown.
  • DRAM dynamic random-access memory
  • ROM read only memory
  • the storage subsystem 2606 and the cache memory 2602 and may be used for storage of information, such as details associated with transactions and blocks as described in the present disclosure.
  • the processor(s) 2602 may be utilized to provide the steps or functionality of any embodiment as described in the present disclosure.
  • the processor(s) 2602 can also communicate with one or more user interface input devices 2612, one or more user interface output devices 2614, and a network interface subsystem 2616.
  • a bus subsystem 2604 may provide a mechanism for enabling the various components and subsystems of computing device 2600 to communicate with each other as intended. Although the bus subsystem 2604 is shown schematically as a single bus, alternative embodiments of the bus subsystem may utilise multiple buses.
  • the network interface subsystem 2616 may provide an interface to other computing devices and networks.
  • the network interface subsystem 2616 may serve as an interface for receiving data from, and transmitting data to, other systems from the computing device 2600.
  • the network interface subsystem 2616 may enable a data technician to connect the device to a network such that the data technician may be able to transmit data to the device and receive data from the device while in a remote location, such as a data centre.
  • the user interface input devices 2612 may include one or more user input devices such as a keyboard; pointing devices such as an integrated mouse, trackball, touchpad, or graphics tablet; a scanner; a barcode scanner; a touch screen incorporated into the display; audio input devices such as voice recognition systems, microphones; and other types of input devices.
  • user input devices such as a keyboard; pointing devices such as an integrated mouse, trackball, touchpad, or graphics tablet; a scanner; a barcode scanner; a touch screen incorporated into the display; audio input devices such as voice recognition systems, microphones; and other types of input devices.
  • input device is intended to include all possible types of devices and mechanisms for inputting information to the computing device 2600.
  • the one or more user interface output devices 2614 may include a display subsystem, a printer, or non-visual displays such as audio output devices, etc.
  • the display subsystem may be a cathode ray tube (CRT), a flat-panel device such as a liquid crystal display (LCD), light emitting diode (LED) display, or a projection or other display device.
  • CTR cathode ray tube
  • LCD liquid crystal display
  • LED light emitting diode
  • output device is intended to include all possible types of devices and mechanisms for outputting information from the computing device 2600.
  • the one or more user interface output devices 2614 may be used, for example, to present user interfaces to facilitate user interaction with applications performing processes described and variations therein, when such interaction may be appropriate.
  • the storage subsystem 2606 may provide a computer-readable storage medium for storing the basic programming and data constructs that may provide the functionality of at least one embodiment of the present disclosure.
  • the applications programs, code modules, instructions
  • the storage subsystem 2606 may additionally provide a repository for storing data used in accordance with the present disclosure.
  • the main memory 2608 and cache memory 2602 can provide volatile storage for program and data.
  • the persistent storage 2610 can provide persistent (non-volatile) storage for program and data and may include flash memory, one or more solid state drives, one or more magnetic hard disk drives, one or more floppy disk drives with associated removable media, one or more optical drives (e.g. CD-ROM or DVD or Blue-Ray) drive with associated removable media, and other like storage media.
  • Such program and data can include programs for carrying out the steps of one or more embodiments as described in the present disclosure as well as data associated with transactions and blocks as described in the present disclosure.
  • the computing device 2600 may be of various types, including a portable computer device, tablet computer, a workstation, or any other device described below. Additionally, the computing device 2600 may include another device that may be connected to the computing device 2600 through one or more ports (e.g., USB, a headphone jack, Lightning connector, etc.). The device that may be connected to the computing device 2600 may include a plurality of ports configured to accept fibre-optic connectors. Accordingly, this device may be configured to convert optical signals to electrical signals that may be transmitted through the port connecting the device to the computing device 2600 for processing. Due to the ever- changing nature of computers and networks, the description of the computing device 2600 depicted in Figure 13 is intended only as a specific example for purposes of illustrating the preferred embodiment of the device. Many other configurations having more or fewer components than the system depicted in Figure 14 are possible.
  • a method for verifying that a transaction is included in a blockchain comprising the steps of: identifying a transaction T to be verified; obtaining a certificate C associated with the transaction T, wherein the certificate includes a block identifier for a given block and an inclusion proof linking the transaction to the given block in the blockchain; determining a longest chain of valid blocks in the blockchain; and verifying that the given block is included in the longest chain.
  • a computer implemented method for implementing a channel service for one or more clients comprising the steps of : receiving a request from a given client among the one or more clients, the request pertaining to creation of a channel; providing the given client access to one or more functions that enable direct communication between the given client and another entity via the channel, wherein said one or more functions include: channel functions or procedures pertaining to the channel for transmission of data; and/or message functions or procedures pertaining to the data being transmitted using the channel; issuing one or more access tokens for the channel, said one or more access tokens being configured for secure communication with another entity via the channel; and storing and/or providing one or more notifications associated with the channel for the given client.
  • a computer implemented method for processing transactions associated with a blockchain the method implemented by one or more processors associated with a client and comprising the steps of: obtaining from a channel service access to one or more functions that enable direct communication between the given client and another entity, said one or more functions including: channel functions or procedures pertaining to a channel for transmission of data; and/or message functions or procedures pertaining to the data being transmitted using a channel; obtaining from the channel service one or more access tokens, said access tokens enabling secure communication with the other entity; responsive to obtaining or identifying a transaction identifier (TxlD) for a given transaction associated with the client; using one or more channel functions received from the channel processor, creating a given channel for communication with another entity; sending the one or more access tokens associated with the given channel to the other entity; receiving a notification associated with the given channel, the notification pertaining to data in the given for verification that the given transaction is included in the blockchain.
  • TxlD transaction identifier
  • the disclosure may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer.
  • a device claim enumerating several means several of these means may be embodied by one and the same item of hardware.
  • the mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

La présente invention concerne des procédés, des dispositifs et des systèmes de vérification de transactions de chaîne de blocs associées à une plateforme fournissant une pluralité de services associés à une chaîne de blocs à un ou plusieurs clients.
EP21709101.6A 2020-02-19 2021-02-17 Vérification de services de plateforme Pending EP4107689A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GBGB2002285.1A GB202002285D0 (en) 2020-02-19 2020-02-19 Computer-implemented system and method
GBGB2013929.1A GB202013929D0 (en) 2020-09-04 2020-09-04 Computer-implemented system and method
GBGB2020279.2A GB202020279D0 (en) 2020-12-21 2020-12-21 Computer-implemented system and method
PCT/IB2021/051333 WO2021165848A1 (fr) 2020-02-19 2021-02-17 Vérification de services de plateforme

Publications (1)

Publication Number Publication Date
EP4107689A1 true EP4107689A1 (fr) 2022-12-28

Family

ID=83405446

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21709101.6A Pending EP4107689A1 (fr) 2020-02-19 2021-02-17 Vérification de services de plateforme

Country Status (2)

Country Link
EP (1) EP4107689A1 (fr)
CN (1) CN115151934A (fr)

Also Published As

Publication number Publication date
CN115151934A (zh) 2022-10-04

Similar Documents

Publication Publication Date Title
US20230119035A1 (en) Platform services verification
US20230095965A1 (en) Compute services for a platform of services associated with a blockchain
US20220156725A1 (en) Cross-chain settlement mechanism
US20230082545A1 (en) Event streams for a sequence of events associated with a blockchain
US20230306412A1 (en) Docket credential insertion in non-fungible tokens
US20240062169A1 (en) Nonfungible token path synthesis with social sharing
WO2023099357A1 (fr) Chaînes de blocs compressibles
US12047507B2 (en) Creating non-fungible token shards
US20230412402A1 (en) Endorsement policy consolidation in blockchain networks
US20220399988A1 (en) Linking blockchain operations
EP4107689A1 (fr) Vérification de services de plateforme
US20230093411A1 (en) Synchronising event streams
Antal et al. Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. Future Internet 2021, 13, 62
US20240320636A1 (en) Cheques in blockchain networks
US20220067028A1 (en) Trustless operations for blockchain networks
US12126721B2 (en) Reputation profile propagation on blockchain networks
US20240212040A1 (en) Method for digitally securing an asset
US20230252482A1 (en) Lock contracts in blockchain networks
US20220311611A1 (en) Reputation profile propagation on blockchain networks

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20220905

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230506

REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40083571

Country of ref document: HK