PEDDaL blockchaining for document integrity verification preparation
First Claim
1. A computer implemented method of using a blockchain to generate evidence for later proving integrity of a document, the method executable by a processor, the method comprising:
- providing a first node on a computer network, the node having a non-transitory computer readable medium;
storing, on the non-transitory computer readable medium at the first node, a first integrity verification code (IVC) associated with a first document and a first user account;
storing, on the non-transitory computer readable medium at the first node, a second IVC associated with a second document and a second user account, the second IVC being different than the first IVC and the second user account being different than the first user account;
appending the first IVC and the second IVC to an open first document dating list (DDL) edition, wherein the first DDL edition does not contain either the first document or the second document;
storing, on the non-transitory computer readable medium at the first node, a third IVC associated with a third document and a third user account, the third IVC being different than the first IVC and the second IVC and the third user account being different than the first user account and the second user account;
appending the third IVC to an open second DDL edition, wherein the second DDL edition does not contain the third document; and
closing the first DDL edition, wherein closing the first DDL edition comprises generating a fourth IVC for the first DDL edition and appending the fourth IVC to the open second DDL edition, thereby chaining the first DDL edition with the second DDL edition to create a set of chained DDL editions.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed which use a block chain (“blockchain”) to enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection.
48 Citations
16 Claims
-
1. A computer implemented method of using a blockchain to generate evidence for later proving integrity of a document, the method executable by a processor, the method comprising:
-
providing a first node on a computer network, the node having a non-transitory computer readable medium; storing, on the non-transitory computer readable medium at the first node, a first integrity verification code (IVC) associated with a first document and a first user account; storing, on the non-transitory computer readable medium at the first node, a second IVC associated with a second document and a second user account, the second IVC being different than the first IVC and the second user account being different than the first user account; appending the first IVC and the second IVC to an open first document dating list (DDL) edition, wherein the first DDL edition does not contain either the first document or the second document; storing, on the non-transitory computer readable medium at the first node, a third IVC associated with a third document and a third user account, the third IVC being different than the first IVC and the second IVC and the third user account being different than the first user account and the second user account; appending the third IVC to an open second DDL edition, wherein the second DDL edition does not contain the third document; and closing the first DDL edition, wherein closing the first DDL edition comprises generating a fourth IVC for the first DDL edition and appending the fourth IVC to the open second DDL edition, thereby chaining the first DDL edition with the second DDL edition to create a set of chained DDL editions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program embodied on a non-transitory computer readable medium and configured to be executed by a processor, the program comprising:
-
code for storing, on the non-transitory computer readable medium at a first node on a computer network, a first integrity verification code (IVC) associated with a first document and a first user account; code for storing, on the non-transitory computer readable medium at the first node, a second IVC associated with a second document and a second user account, the second IVC being different than the first IVC and the second user account being different than the first user account; code for appending the first IVC and the second IVC to an open first document dating list (DDL) edition, wherein the first DDL edition does not contain either the first document or the second document; code for storing, on the non-transitory computer readable medium at the first node, a third IVC associated with a third document and a third user account, the third IVC being different than the first IVC and the second IVC and the third user account being different than the first user account and the second user account; and code for appending the third IVC to an open second DDL edition, wherein the second DDL edition does not contain the third document; code for closing the first DDL edition, wherein closing the first DDL edition comprises generating a fourth IVC for the first DDL edition and appending the fourth IVC to the open second DDL edition, thereby chaining the first DDL edition with the second DDL edition to create a set of chained DDL editions. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification