Electronic certification data structures for verifying resource integrity
Abstract:
Techniques for certifying a document and for securely transmitting access to the document across a blockchain network are disclosed. A document, which details results of a soft inquiry executed against a user's credit history, is accessed. A hash algorithm is applied to the document to certify it. The hash algorithm is based on a timestamp indicating when the document was created. Applying the hash algorithm also generates a portable identifier reflecting the document is certified at the time indicated by the timestamp. The portable identifier is added as a record to a blockchain. The record is transmitted to a second computer system using public and private keys.
Information query
Patent Agency Ranking
0/0