Electronic certification data structures for verifying resource integrity
Techniques for certifying a document and for securely transmitting access to the document across a blockchain network are disclosed. A document, which details results of a soft inquiry executed against a user's credit history, is accessed. A hash algorithm is applied to the document to certify...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Techniques for certifying a document and for securely transmitting access to the document across a blockchain network are disclosed. A document, which details results of a soft inquiry executed against a user's credit history, is accessed. A hash algorithm is applied to the document to certify it. The hash algorithm is based on a timestamp indicating when the document was created. Applying the hash algorithm also generates a portable identifier reflecting the document is certified at the time indicated by the timestamp. The portable identifier is added as a record to a blockchain. The record is transmitted to a second computer system using public and private keys. |
---|