WO2017136879A1 - A system and method for document information authenticity verification - Google Patents

A system and method for document information authenticity verification Download PDF

Info

Publication number
WO2017136879A1
WO2017136879A1 PCT/AU2017/050096 AU2017050096W WO2017136879A1 WO 2017136879 A1 WO2017136879 A1 WO 2017136879A1 AU 2017050096 W AU2017050096 W AU 2017050096W WO 2017136879 A1 WO2017136879 A1 WO 2017136879A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
metadata
verification
hash
computer readable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/AU2017/050096
Other languages
English (en)
French (fr)
Inventor
Lindsay MOLONEY
Guy Scott
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2016900405A external-priority patent/AU2016900405A0/en
Priority to US16/073,914 priority Critical patent/US10972281B2/en
Priority to HK19100401.2A priority patent/HK1258030B/xx
Priority to CA3012870A priority patent/CA3012870C/en
Priority to BR112018016212-4A priority patent/BR112018016212A2/en
Priority to MX2018009616A priority patent/MX2018009616A/es
Priority to CR20180435A priority patent/CR20180435A/es
Priority to KR1020187022860A priority patent/KR20180110670A/ko
Priority to MYPI2018702583A priority patent/MY183574A/en
Priority to JP2018536277A priority patent/JP6959618B2/ja
Priority to CN201780018818.8A priority patent/CN109075971B/zh
Priority to AU2017218452A priority patent/AU2017218452B2/en
Application filed by Individual filed Critical Individual
Priority to CONC2018/0009397A priority patent/CO2018009397A2/es
Priority to CUP2018000085A priority patent/CU20180085A7/es
Priority to SG11201805566XA priority patent/SG11201805566XA/en
Priority to EP17749821.9A priority patent/EP3414867B1/en
Priority to EA201891795A priority patent/EA034354B1/ru
Publication of WO2017136879A1 publication Critical patent/WO2017136879A1/en
Priority to ZA2018/04492A priority patent/ZA201804492B/en
Priority to PH12018501569A priority patent/PH12018501569A1/en
Priority to SA518390002A priority patent/SA518390002B1/ar
Priority to IL261020A priority patent/IL261020B/en
Anticipated expiration legal-status Critical
Priority to AU2018101148A priority patent/AU2018101148A4/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • the present invention relates to document information authenticity verification and in particular, but not necessarily entirely, to a system and method for document information authenticity verification for applications including verifying the authenticity of information of statements of attainment of course documentation issued by registered training organisations, verification of travel documents and other sensitive documents requiring authenticity verification such as documents issued by law firms, accountancy firms, governmental institutions and the like.
  • the authenticity verification techniques described herein may be widely applied for differing document mediums including in hardcopy (i.e. paper, smart card travel document) and softcopy (i.e. electronic formats including in PDF format including being stored within document repositories) format.
  • hardcopy i.e. paper, smart card travel document
  • softcopy i.e. electronic formats including in PDF format including being stored within document repositories
  • Document authenticity verification is desirous for applications including, for example, verification of the authenticity of information in legal documentation, personal identity documentation, accreditation documentation, access documentation and the like.
  • Dl suffers from the disadvantage and that the server may be compromised and the hash stored therein modified to match a tampered document.
  • Dl is not suitable for applications requiring high security stringency such as for utilisation for boarding passes, personal identification documentation and the like.
  • the present invention utilises, in a preferred embodiment, a distributed cryptographically based blockchain for storing document verification records in a way that cannot be altered.
  • D2 hashes an electronic document (such as a PDF) and stores the hash as a special bitcoin transaction that encodes/contains the hash via an OP_RETURN script.
  • This is a bitcoin scripting opcode that marks the transaction output as provably unspendable and allows a small amount of data to be inserted, which in this case is the document's hash, plus a marker to identify all of D2's transactions.
  • D2 is not directed to the problem verifying the authenticity of information in a document but rather proving that a particular document existed in a particular electronic format at a particular time.
  • D2 cannot be used to detect whether a document has been tampered with.
  • D2 hashes the entire electronic document file and therefore cannot be used for hardcopy documents wherein slight printing, scanning, photocopying appearance aberrations would generate an entirely different hash using the system of D2 and therefore the document information contained therein would be unverifiable.
  • the present invention utilises document content metadata (stored using a metadata hash, as opposed to the document hash of Dl) as the basis for verification and can therefore be utilised for hardcopy documents.
  • Dl and D2 are deficient in that document information cannot be updated with the document remaining verifiable.
  • the present invention utilises blockchain update transactions for the purposes of updating document content fields in this way, during the document verification stage, the blockchain can be inspected in reverse chronological order to detect whether or not a document (or specific document content information fields) has been superseded.
  • both Dl and D2 are deficient in that verification cannot be for a predetermined period.
  • the present invention in accordance with an embodiment, creates blockchain transactions specifying a validity period.
  • the present invention in accordance with an embodiment, utilises revocation- type blockchain transactions such that the revocation of the authenticity of a document may be detected by a revocation-type transaction subsequent in time to a former verification transaction.
  • Dl and D2 are deficient in that verified information cannot be displayed in association with the document for visual comparison.
  • the present invention stores the meta data, such as in the computer readable data (i.e. 2D barcode) within the document itself or within the blockchain such that the information may subsequently be extracted and displayed to the user.
  • the computer readable data i.e. 2D barcode
  • a method for document information authenticity verification comprising: a verification record creation stage comprising: receiving document content metadata from a document; generating a metadata hash using the document content metadata; creating a blockchain transaction comprising the metadata hash; and generating computer readable data encoding the metadata hash; updating the document with the computer readable data; a document verification stage comprising: receiving the document; extracting the metadata hash from the computer readable data; and identifying the metadata hash within blockchain transactions of the blockchain to verify the authenticity of the document metadata.
  • Dl or D2 do not disclose the creation of a metadata hash for document information of a document, the creation of an associated blockchain transaction and the updating of the document with computer readable data (i.e. 2D barcode) with the meta will data hash.
  • the computer readable data may be a barcode.
  • the barcode may be a two dimensional barcode.
  • the verification record stage further may comprise signing the document with a private key associated with a document verification server.
  • the method may further comprise storing the document content metadata such that wherein the document verification stage further may comprise retrieving the document content metadata and displaying the document content metadata.
  • Storing the document content metadata may comprise encoding the metadata within the computer readable data.
  • Storing the document content metadata may comprise encoding the metadata within the blockchain transaction.
  • the verification record creation stage further may comprise identification of the document content metadata from the document.
  • the identification of the document content metadata may comprise optical character recognition.
  • the identification of the document content metadata may comprise performing search string queries against text extracted using the optical character recognition.
  • the identification of the document content metadata may comprise isolating text within at least one user defined region of the document.
  • the method may further comprise a document content updating stage comprising: receiving updated document content metadata for the document; generating a new metadata hash using the updated document metadata; creating a further blockchain transaction comprising the new metadata hash.
  • the document verification stage may comprise: identifying two or more blockchain transaction associated with the document.
  • the document verification stage further may comprise identifying that the document content metadata may be superseded by the updated document content metadata.
  • the method may further comprise identifying which of the document may be superseded.
  • the method may further comprise a document verification revocation stage comprising: creating a revocation blockchain transaction such that, during the document verification stage, the method further may comprise: identifying the revocation blockchain transaction subsequent in time to the blockchain transaction to fail the verification of the authenticity of the document information.
  • the blockchain transaction further specifies a validity period, such that, during the document verification stage, the method further may comprise failing the verification of the document if the validity period has expired.
  • the method may further comprise creating a validity period renewal blockchain transaction comprising a further validity period such that, during the document verification stage, the further validity period may be used when determining the validity of the document.
  • a system for document information authenticity verification comprising: a document information verification server, the document information verification server comprising: a database comprising: a hash blockchain; anda document metadata table stored in relation to the one-way hash blockchain; software modules comprising: a document creation module; and a document information verification module; a client terminal in operable communication with the document information verification server, the client terminal comprising: a computer readable data reader; a software application in operable communication with the computer readable data reader, the software application comprising: a document information verification module; wherein, in use, the system may be configured for a verification record creation stage comprising: the document creation module of the document information verification server: receiving document metadata in relation to a document; receiving or generating a one-way hash from the document metadata using a
  • the system further may comprise a document issuer server in operable communication with the document information verification server.
  • the document information verification server may be configured for receiving the document metadata from the document issuer server.
  • the document information verification stage further may comprise at least one of the client terminal and document information verification server sending at least one of the one-way hash and the document metadata to the document issuer server for further verification of the document.
  • the document issuer server may comprise a database comprising at least one of hash and metadata data and wherein the further verification may comprise cross-referencing at least one of hash and metadata data within the document issuer server database.
  • the document information verification module of the document information verification server may be further configured for sending a verification result to the client terminal.
  • the client terminal software application may be further configured for generating graphical user interface and wherein the graphical user interface may be configured for displaying the verification result.
  • the graphical user interface may be further configured for displaying at least a subset of the document metadata.
  • the system may comprise a plurality of document information verification servers and wherein the blockchain may be a distributed blockchain distributed across the plurality of document information verification servers.
  • Creating the computer readable data may comprise creating an optical computer readable data.
  • the computer readable data may be a 2-D barcode.
  • the system may further comprise inserting the computer readable data into the document.
  • Figure 1 shows a system for document information authenticity verification in accordance with an embodiment of the present disclosure
  • Figure 2 shows an exemplary method for the creation of document information authenticity verification records in accordance with an embodiment
  • Figure 3 shows an exemplary method for verifying the authenticity of a document using the formally created document authenticity verification records in accordance with an embodiment
  • Figure 4 shows an exemplary method for updating document information while yet being able to verify the authenticity of the updated document in accordance with an embodiment
  • Figure 5 shows an exemplary method for revoking the authenticity records of a particular document in accordance with an embodiment
  • Figure 6 shows an exemplary graphical user interface displayed by a client terminal of the system when verifying a document of Figure 1 in accordance with an embodiment of the present disclosure.
  • FIG 1 there is shown a system 1 for document information authenticity verification.
  • the system 1 is configured for verifying the authenticity of documents, such as paper-based and electronic documents, especially the information presented by such documents for reducing or eliminating document forgery, falsification of qualifications and the like.
  • the system 1 comprises a document verification server 19.
  • the document verification server 19 is configured with various software modules for performing the various computational processing tasks described herein.
  • the document verification server 19 may take the form of a physical (such as rack mounted) computer server but, in alternative embodiments, the server in relating may take the form of a virtualised server instance, such as that which may be implemented by Amazon Web Services (AWS).
  • AWS Amazon Web Services
  • the document verification server 19 maintains copy of a blockchain ledger and therefore the processes described herein of the document verification server 19 may be shared between a plurality of servers 19.
  • the document verification server 19 comprises a processor 31 for processing digital data.
  • a processor 31 for processing digital data.
  • a memory device 29 In operable communication with the processor 31 across a system bus 33 is a memory device 29.
  • the memory device 29 is configured for storing digital data including computer program code.
  • the processor 31 may fetch and execute instructions stored within the memory device 29 and store the data results of such execution on the memory device in 29.
  • the memory 29 may take the form of a combination of volatile (RAM) and nonvolatile (HDD) storage.
  • the memory 29 is shown in figure 1 as being configured with a plurality of software modules 15 and associated data within database neural 20.
  • the software modules 15 may comprise a creation module 14 for creating document verification records which may be subsequently verified by verification module 13 in the manner described in further detail below.
  • the data shown within the database has been shown for illustrative convenience as comprising document metadata 23 and, in embodiments where a blockchain is utilised, the blockchain data 26 comprising a plurality of document hashes 21, 22 representative of document metadata 23 of various verified documents.
  • the document verification server 19 further comprises an I/O interface 30 for communicating with various computer peripherals including user interface peripherals and the like.
  • the I/O interface 30 may further interface with data storage peripherals such as USB memory storage devices.
  • the computer program code modules 15 may be stored on a computer readable medium which may be uploaded to the verification server 19 via the I/O interface 30 (or network interface 32) so as to configure the document verification server 19 to perform the specific computational processing tasks described herein.
  • the document verification server 19 further comprises a network interface 32 for sending and receiving data across a computer network illustrated as being the Internet 34 in the system 1 shown. In this manner, the document verification server 19 may be in operable communication with the other computing actors shown in figure 1.
  • the system 1, in embodiments, may further comprise a document issuer server 16.
  • the document issuer server 16 is utilised by the person, entity, organisation, authority or the like issuing sensitive documents requiring authenticity verification in the manner described herein.
  • the document issuer may utilise the document issuer server 16 for the purposes of storing document metadata 16, compiling and generating documents, storing and forwarding the documents across the Internet 34 and the like.
  • the document issuer server 16 may similarly comprise software modules 10 having verification 11 and creation modules 12. Furthermore, the document issuer server 16 may further store document metadata 18 and associated hashes 24.
  • the document issuer server 16 can perform, in embodiments, all of the document authenticity verification tasks and data such as where, for example, an organisation utilises the document issuer server 16 for performing the document verification in an isolated manner.
  • the document issuer 16 may utilise the document verification server 19 (such as on a subscription API basis) for performing all of or at least some of the document verification tasks.
  • System 1 further comprises a client terminal 25 in operable communication with at least one of the document issuer server 16 and document verification server 19 across the Internet 34.
  • the client terminal 25 may be utilised for displaying information indicative of the authenticity of a document.
  • the client terminal 25 may take the form of a personal computer device such as a notebook, mobile communication device (such as a smart phone device such as an Apple iPhone or the like) which may be utilised by a user to verify the authenticity of a document.
  • a personal computer device such as a notebook
  • mobile communication device such as a smart phone device such as an Apple iPhone or the like
  • the client terminal 25 may further comprise a network interface 32 for communicating across the Internet 34.
  • the network interface 32 may send and receive data across the cellular network such as a 3-5G cellular data network.
  • the client terminal 25 similarly comprises a processor 31 for processing digital data and a memory device 29 in operable communication with the processor 31 across a system bus 33.
  • the client terminal 25 memory 29 may further comprise an operating system 30 such as the Apple OS or Android operating systems.
  • the client terminal 25 may further comprise an I/O interface 30 which, in the embodiments shown, may interface with a computer readable data reader 8.
  • the reader 8 may read computer readable data 27 from a document 2 for verification so as to verify the authenticity of the document.
  • the reader 8 may take the form of the image capture/camera device of the client terminal 25 and the computer readable data 27 may take the form of a two dimensional (2D) (such as a Quick Response (QR)) barcode.
  • 2D two dimensional
  • QR Quick Response
  • the client terminal 25 (taking the form of a mobile communication device) be configured utilising a downloaded software application "app" 9 which may be downloaded for installation and execution by the client terminal 25 such as from a software application store, such as the Apple App Store or the like.
  • the software application 9 may comprise various sub modules/software modules including a verification module 6 and a graphical user interface module 7.
  • Figure 1 further shows the system 1 comprising a document 2 which is verified by the system 1.
  • the document 2 may take the form of hard copy and soft copy documents.
  • the soft copy (electronic, such as in PDF format) documents may be stored within a document database 34.
  • particular documents may be retrieved utilising a URL and document ID or other unique identifier, such as a document hash.
  • the document 2 may comprise document content 5. Furthermore, the document 2 may comprise computer readable data 27 which, as alluded to above, may take the form of a 2D barcode included or printed on the document 2. As such, the computer readable data 27 may be read by the client terminal 25 (or other computing actor across the Internet 34) so as to verify the authenticity thereof.
  • the computer readable data 27 may comprise a document ID, a document metadata hash 4 or document metadata 3 or a combination thereof depending on the particular application.
  • the particular architecture provided in figure 1 is for the application wherein a document verification server 19 is deployed for utilisation on a subscription basis such that various document issuers, users and the like may selectively access the web functions exposed by the document verification server 19 for verifying documents.
  • the particular architecture may be modified whilst yet performing the same document authenticity verification tasks and functionality within the purposive scope of the embodiments described herein.
  • the method 35 is utilised for creating document authenticity records which may be subsequently utilised and subsequent verification steps.
  • the document 2 is a physical document
  • the document may be scanned utilising a scanner and the document content obtained utilising optical character recognition (OCR).
  • OCR optical character recognition
  • the document content may be read from the electronic file system document itself (such as by reading various document metadata or document content, including wherein the document content may also be recognise using OCR) or alternatively retrieved from an appropriate database, such as the database 17 of the document issuer server 16.
  • the document content is the important document content (referred to herein as metadata, which is hashed into a metadata hash such as the M D5, SHA256 hash or other suitable oneway hash) for which subsequent alterations or modifications to this important document content may be detected by the system 1.
  • metadata the important document content
  • the entire document may be hashed into a document hash so that any alterations to the document may be detected.
  • system 1 may comprise functionality for the updating of the document content/metadata, or for the revoking of the authenticity accreditation.
  • the metadata may represent the name of the issue organisation, the name of the attainer and the name of the qualification.
  • the metadata may represent the name of the passenger, the flight number, the boarding gate, the passport number the destination and the like.
  • the system 1 is configured for creating a metadata hash 4 of the metadata such that tampering of the important metadata may be detected by the system 1.
  • the metadata may be kept in non-hashed format (either in plan text or encrypted) so as to allow for the subsequent display by the client terminal 25 during verification.
  • Metadata at step 40 may be useful for hard copy documents such that the important information presented thereon is isolated for verification.
  • the document may be modified in other manners, such as including photocopying and scanning aberrations, printing on differing letterheads or the like without affecting the ability to verify the authenticity thereof.
  • the electronic document file may be hash, such as the MD5, SHA256 hash or the like.
  • a separate meta data hash and document hash may be utilised so that modification of the document or the sensitive meta data therein may be detected independently.
  • the metadata used may be user-specified. For example, certain metadata is used from the document issuer database 29 is user-specified.
  • search string filters may be specified so as to allow the system 1 to extract (including using OCR) the appropriate metadata.
  • document regions/rectangles may be specified (representing the location of the document metadata within the document) so as to allow the system to extract text only from the specified regions.
  • a document ID may be obtained or generated.
  • the document ID is globally unique (GUID) so as to prevent or substantially eliminate document ID collisions.
  • the document ID may be utilised for uniquely identifying documents for verification.
  • the document ID may be utilised for retrieving documents from the document database 34 utilising a URL comprising the document ID.
  • the document ID may be utilised for updating documents for revoking documents.
  • the document ID may be generated by the system 1.
  • the document ID 1 may be provided by the document issuer such as wherein, for example, a registered training organisation issues statement of attainment documents in numerical sequential order.
  • the document ID may also be hashed as part of the meta data hash or document hash so as to prevent tampering of the document ID.
  • a document ID need not necessarily be required.
  • a hard copy document may comprise a 2D barcode thereon representing a hash of the metadata, the metadata representing the information displayed by the document.
  • the 2D barcode may be scanned for verifying the document content without necessarily having to use a document ID.
  • the hash generated from the document file or metadata may serve as the unique document ID.
  • a hash 4 is created.
  • the hash is a one-way hash such as MD5, SHA256 or the like.
  • MD5 hash
  • SHA256 hash-way hash
  • the hash provides the ability to reduce potentially a large amount of information into a small size but, importantly, wherein tampering even with a single letter of the content drastically affects the hash.
  • the hash 4 is a meta data hash such that the meta data (important document information) is hashed so as to be able to detect subsequent altering of this important document information.
  • the hash 4 may be a document hash of the electronic document file.
  • a combination of the above information may be hashed to form the hash 4.
  • the system 1 utilises a blockchain for the purposes of storing the hashes 4 so as to be able to provide an unalterable distributed and trusted ledger of verifying documents.
  • the document verification server 19 may store a copy of a blockchain ledger 26 within the database 20 which may be synchronised with other documentation verification server 19.
  • the hash is added to a blockchain transaction which is then subsequently mined and added to a block in the blockchain.
  • the hash may be added to a blockchain, including, wherein the bitcoin blockchain is utilised, within the bitcoin scripting opcode.
  • a customised blockchain may be utilised comprising appropriate data fields.
  • the blockchain may be inspected to ascertain whether the hash 4 (which may be scanned from the 2D barcode 27 or alternatively calculated on the fly) resides within the blockchain.
  • the entire blockchain may be searched for a hash but, in a preferred embodiment, a separate hash index may be used for speeding the hash finding process.
  • the document issuer server 16 may maintain the database of document metadata 18 (or document content) and associated document hashes 24 or document IDs for the purposes of allowing for the verification of documents in isolation without the utilisation of a shared ledger. It is way, the system 1 yet maintains a copy of the meta data 18 (so as to, for example, allow for the display of the meta data during the verification process for visual comparison by the user) and associated hashes so as to be able to detect tampering of the meta data (albeit without security against the database 17 tampering which may be avoided utilising the blockchain).
  • step 44 computer readable data may be generated which may then be utilised in conjunction with the document for verification.
  • step 46 the computer readable data is inserted into the document, either visibly or invisibly.
  • the computer readable data 27 may take the form of a 2D barcode comprising one or more of the document hash, document ID and document metadata.
  • the computer readable data 27 is visible so as to allow for printing, scanning and photocopying of the document.
  • the document may be modified to visibly display the computer readable data 27 such as wherein, for example, a PDF document is modified to include an image of the 2D barcode at the bottom right-hand side of the document.
  • a PDF document is modified to include an image of the 2D barcode at the bottom right-hand side of the document.
  • the user may utilise the camera device of the smart phone 25 to capture an image of the 2D barcode to verify the contents or the metadata of the document.
  • the computer readable data 27 need not necessarily be human visible and may be incorporated within, for example, the metadata of the document. In this way, when displaying the document the document display software may, in the background, inspect the associated metadata and displaying and indication as to whether the document is verified or not.
  • a PDF document may be updated such that the PDF document metadata comprises the computer readable data 27 (which, as alluded to above, may include one or more of the document metadata, document ID and a document hash).
  • the PDF software may automatically inspect the computer readable data 27 and display an indication as to whether the document is verified or not.
  • FID tags may be used.
  • the document may also be digitally signed so as to prevent tampering or modification of the computer readable data included or inserted thereon.
  • the document verification server 19 may sign the document using a private key such that others may subsequently verify that the document verification server 19 had indeed signed the document utilising the associated public key.
  • FIG 2 there is shown an exemplary method 36 for document authenticity verification. As will become apparent from the ensuing description, the method 36 is utilised for the purposes of verifying the authenticity of a document utilising the computer readable data 27 associated therewith.
  • the method 36 starts at step 47 wherein the document is obtained.
  • a physical document may be obtained in hand or alternatively, an electronic document may be retrieved from a file system, downloaded from a URL or the like.
  • step 48 the computer readable data associated with the document is scanned or read.
  • the barcode may be read utilising the reader 8 of the client terminal 25.
  • the computer readable data 27 may be retrieved by the document display software (such as Adobe Acrobat).
  • the document display software such as Adobe Acrobat.
  • the hash may be extracted from the computer readable data 27.
  • the document ID may also be retrieved from the computer readable data so as to be able to compare against the document ID used to retrieve the document or associated with the document.
  • the blockchain may be inspected for blocks containing transactions containing the hash and, in embodiments, the associated document ID.
  • a verification may be displayed to the user indicating that the document is authentic.
  • metadata may be extracted from the computer readable data which may then be displayed by the client terminal 25 so as to allow the user to compare the metadata extracted from the computer readable data to that which is displayed on the document.
  • the meta data 23 may be stored within the blockchain 26 itself such that the metadata 23 may be retrieved from the blockchain 26 during verification so as to negate the need to store the metadata 23 within the 2D barcode 27 itself.
  • FIG 4 there is shown an exemplary method 37 for updating document metadata.
  • a need may arise to update document metadata.
  • a gate change may occur for boarding passes.
  • the name of the attainer may be changed from a maiden name.
  • method 37 may be utilised for allowing updating of certain document fields while yet being able to maintain the ability to verify the authenticity of a document.
  • the document ID for the document to be updated may be generated or obtained (or other unique identifier such as the document or metadata hash).
  • the updated metadata (or document content) is received.
  • the updated metadata may comprise a new surname.
  • step 56 the new hash is added by way of a further transaction to the blockchain.
  • the document may be modified to incorporate the new computer readable data 27.
  • the updating of the 2D barcode 27 need not necessarily take place, especially for documents which have already been disseminated.
  • the blockchain transactions may be inspected in reverse chronological order wherein the most recent in time verification transaction is utilised as the current verification transaction.
  • the client terminal 25 may inform the user that the document metadata/content is out of date and that the document has been superseded.
  • the verification result may indicate that the document has been superseded. However, in other embodiments the verification result may indicate which document content metadata has been superseded.
  • the document ID and the original metadata hash may be stored within the blockchain.
  • the computer readable data 27 may be read by the client terminal 25 to extract the document ID and the metadata hash.
  • the blockchain may be searched for blockchain transactions associated with the document ID.
  • the system 1 is able to compare the retrieved hash against the two or more transactions to identify whether the particular transaction is current or has been superseded.
  • FIG 5 there is shown an exemplary method 38 for document authenticity revocation.
  • a need may arise to revoke a document.
  • a person having received a statement of attainment may have subsequently have been found out to having fraudulently obtained the qualification and therefore the statement of attainment requires revocation.
  • the method 38 utilises a revocation transaction which is added to the blockchain to revoke a document.
  • the method 38 starts at step 60 wherein a revocation request is received for a particular document as is identified by a document ID (or other unique identifier such as the document or metadata hash).
  • a revocation transaction is added to the blockchain.
  • the revocation transaction is identified by transaction type (the revocation transaction type, which may again be stored in the bitcoin scripting opcode) and the document ID.
  • step 62 the computer readable data is received for the document and the document ID and or document hash is extracted therefrom.
  • the blockchain is searched for matching document IDs or hashes.
  • the system 1 identifies a subsequent revocation transaction within the blockchain associated with the document ID or hash and therefore, at step 64, the verification fails.
  • documents may have a finite authenticity. Wherein, for example, documents are valid for 12 months only such as the case may be for driver licenses.
  • verification transaction stored within the blockchain may specify a validity period (which may again be stored in the bitcoin scripting opcode).
  • the system 1 may inspect the entry dates of the verification transactions and should the current date exceed the validity period, the verification fails.
  • validity period may be renewed through the addition of subsequent in time blockchain verification transactions.
  • the document issuer (RTO) server 16 comprises a plurality of software modules 10.
  • the software modules 10 may comprise a verification record creation module 12 for the purposes of creating a document record for subsequent verification.
  • the document information verification server 19 may itself comprise a plurality of software modules 15 itself comprising a verification record creation module 14.
  • the software modules 10 of the document issuer (RTO) server 16 may further comprise a verification module 11 for the subsequent verification of documents.
  • the software modules 15 of the document information verification server 19 similarly comprise a verification module 13 the purposes of verifying documents as will be described in further detail below.
  • verification and creation functionality may be implemented by the same modules if the functionality of the document issuer (RTO) server 16 and the document information verification server 19 is implemented by a single server.
  • the document issuer (RTO) server 16 comprises a database 17.
  • the database 17 may comprise metadata 18, or other type of structured data, configured for storing various information fields in relation to the course completed by James Smith.
  • a hash is created of the above metadata.
  • the metadata is concatenated such as into a string comprising:
  • the concatenated string is hashed using a one-way hash algorithm, such as an M D5, SHA256 or other hash algorithm.
  • a hash may generate the following hash:
  • the metadata hash is stored so as to be usable for subsequent document information verification.
  • the document information verification server 19 comprises a database 20 for storing various information including hash data.
  • the above metadata hash is inserted into the database 20.
  • Such insertion may comprise the document information verification server 19 receiving the metadata (or the metadata hash) from the database 17 of the document issuer ( TO) server 16, such as at periodic intervals, upon request and the like.
  • the hashing algorithm described herein may be performed by any of the computing actors within the purposive scope of the embodiments described herein.
  • the document issuer (RTO) server 16 or the document information verification server 19 may perform the hashing.
  • the system 1 may implement a distributed public ledger blockchain 26 such that each hash entry is verifiable in accordance with the other hash entries within the database 20.
  • the verification is performed by a single document information verification server 19.
  • the blockchain 26 may be a distributed blockchain distributed across a number of servers 19.
  • any distributed cryptography based blockchains may be utilised within the purposive scope of the embodiments described here and including those being used in, or being similar to Bitcoin, ehterum, litecoin blockchains and the like.
  • each RTO 16 ("document information issuer") and document verification server 19 may be assigned an "issuer address", which may be a Bitcoin wallet address. Capacitor, transactions within the Bitcoin blockchain may be uniquely associated with the respective document issuer server 16 or document verification server 19.
  • the metadata may also be stored within the database 20 of the document information verification server 19. In this manner, having the hash (or document ID), the metadata may be looked up.
  • the hash may serve as a primary key.
  • the database 20 need not necessarily comprise the metadata 23 so as to comprise the hash only for the purposes of document information verification.
  • computer readable data is generated comprising at least one of the hash and the metadata.
  • the creation of the computer readable data will allow the insertion of the computer readable data onto a document, such as a certificate of attainment, being a paper-based or electronic (i.e. PDF) document which may be subsequently read using the client terminal 25 for the purposes of verifying the authenticity of the document and the document metadata stored therein.
  • the computer readable data is embodied in a 2D barcode.
  • the following formats may be utilised for data encoding: a. [Key_hash]
  • FIG. 1 As can be seen from figure 1, there is shown a document 2 being a certificate of attainment for the course completed by James Smith.
  • the document 2 is issued as a PDF document by the document issuer (RTO) server 16.
  • RTO document issuer
  • James Smith may utilise the electronic PDF document 2 as evidence of his qualification for various employment purposes.
  • the document may comprise document content 5 which may comprise the usual human readable information including at least a subset of the above described metadata.
  • document content 5 may comprise the usual human readable information including at least a subset of the above described metadata.
  • document may be edited, either electronically or physically so as to represent fraudulent information.
  • the document by additionally comprising the computer readable data 27 may be verified using the client terminal 25.
  • the computer readable data 27 borne by the document 2 may comprise at least one of the metadata 3, the metadata or document hash 4 and the document ID.
  • only the metadata 3 is be encoded within the computer readable data 27 such that the hash may be calculated from the metadata for verification.
  • only the hash 4 is encoded within the computer readable data 27 such that the metadata may be retrieved from the database 20 of the document information verification server 19 or the database 17 of the document issuer (RTO) server 16 or the blockchain.
  • the client terminal 25 comprises a software application 9 configured for implementing the features and functionality described herein.
  • the client terminal 25 is a mobile communication device, such as a smart phone device or the like.
  • the client terminal 25 may comprise a reader 8, which, in embodiments may take the form of the mobile phone camera.
  • the operation of the client terminal 25 may download the software application 9 for execution by the client terminal 25, such as from a software application store, such as the Apple iTunes store or the like.
  • the software application 9 may comprise a verification module 6 configured for implementing the client terminal implemented functionality for document information verification and also a graphical user interface (GUI) module presented a graphical user interface for display to the 7 for the purposes of displaying various information to the client terminal user.
  • GUI graphical user interface
  • the client terminal user in order to verify the authenticity of the document, the client terminal user, using the reader 8, will scan the 2-D barcode computer readable data 27 provided on the document. Having received the computer readable data from the document 2, at least one of the client terminal 25 and the document information verification server 19 is configured for identifying at least one of the metadata 3 and the hash 4.
  • the metadata 3 is encoded within the computer readable data 27 such that the GUI 7 of the client terminal 25 may display the metadata.
  • both the hash 4 and the metadata 3 is encoded within the computer readable data 27 such that the client terminal 25 may generate a hash using the hashing algorithm using the encoded metadata 3 so as to verify at least that the encoded hash 4 matches the metadata 3.
  • a propriety hash algorithm may be utilised so as to prevent fraudsters from fraudulently generating and encoding the hash using a known hashing algorithm.
  • the client terminal 25 by being in operable communication with the document information verification server 19 across a data network, such as the Internet, is able to send at least one of the metadata 3 and the hash 4 to the document information verification server 19 for verification.
  • the document information verification server 19 is configured to compare the hash received from the client terminal 25 (or calculated from the metadata 3 read by the client terminal 25) against the hash value stored within the blockchain 26.
  • the document information verification server 19 is able to send a verification result back to the client terminal 25 verifying that the document information is authentic.
  • the verification server 19 is configured to send and non-verification result back to the client terminal 25 indicating that the document information may be fraudulent or has been tampered with.
  • the GUI 7 is configured for displaying the verification results to the client terminal user. Additionally, the GUI 7 may display the associated metadata.
  • FIG 6 For example, and turning now to figure 6, there is shown an exemplary interface 28 displayed by the GUI 7 where the document has been verified. As can be seen, the interface 28 comprises various of the metadata and a confirmation that the document information is authentic.
  • the system 1 is configured for implementing a further verification wherein the records held within the RTO server database 17 are further cross-referenced (in case the records have been updated or revoked). Specifically, cross-referencing may be performed using at least one of the hash and the metadata.
  • the database 17 of the document issuer (RTO) server 16 may be configured for storing the hash values 24 in relation to the metadata 19. As alluded to above, such hash values 24 may be received from the document information verification server 19 or alternatively be computed by the document issuer (RTO) server 16 itself.
  • the database 17 need not necessarily comprise the hash values 24 wherein the metadata 18 is cross-referenced.
  • At least one of the client terminal 25 and the document information verification server 19 may send a further query to the verification module 11 of the document issuer (RTO) server 16 to verify the data stored within the database 17.
  • the client terminal 25 may send the document number to the RTO server 16 to verify that the document number is genuine.
  • Other cross-referencing may be done within the purposive scope of the embodiments described herein.
  • problems of hard copy documentation may include the appearance of the documentation changing over time, such as by being caused by photocopying aberrations and the like.
  • the hard copy document is a contract of sale document which has been countersigned by the seller, purchaser and witness.
  • the hard copy document further specifies the immovable property being sold, identified by lot number.
  • the executed contract document may be scanned using a scanner and wherein the system 1 then performs OCR recognition of the document to identify relevant metadata from the contract of sale.
  • the relevant metadata is the names of the seller and purchaser and lot number.
  • the system 1 is configured to extract such metadata from the document.
  • the system 1 may be configured to utilise string matching or the like to extract these fields from the data.
  • an image scan of the document may be displayed on the client terminal 25 such that the lawyer is able to demarcate the metadata to be verified, such as by dragging rectangles around the associated text using the mouse.
  • a document ID may be specified by the lawyer, being a file system generated document ID.
  • the system 1 hashes the metadata (and the document ID in embodiments) and creates a verification transaction within the blockchain.
  • system 1 Furthermore, the system 1 generates computer readable data in the form of a 2D barcode which is then printed onto the contract of sale document.
  • the 2D barcode comprises the metadata hash 4, the document ID and the metadata.
  • the conveyancer captures an image of the document utilising the camera of the conveyancer's mobile communication device 25.
  • the mobile communication device 25 comprises an application 9 which identifies the 2D barcode and extracts the metadata hash, document ID and metadata from the 2D barcode.
  • the mobile communication device 25 then sends a verification request across the Internet 34 to the document verification server 19.
  • the verification request comprises the hash but, in embodiments, may additionally include the document ID.
  • the document verification server 19 searches through the verification transactions of the blockchain and identifies the earlier verification transaction created.
  • the document verification server 19 then sends a verification response to the mobile communication device 25 such that the mobile communication device 25 is able to display an indication that a verification record exists.
  • the conveyancer's mobile communication device 25 may display the metadata extracted from the 2D barcode. As such, the conveyancer may visually inspect the names of the parties and the lot number on the document as is displayed by the mobile communication device 25 so as to ensure their consistency. [258] It should be noted that the client terminal 25 may rehash the metadata stored within the 2D barcode so as to confirm whether the generated hash matches the hash of the 2D barcode (so as to prevent tampering of the metadata within the barcode).
  • the metadata may also have been stored within the blockchain such that the metadata may sent to the client terminal 25 from the document verification server 19 for display.
  • the mobile communication device may perform optical character recognition so as to read the text from the document (despite the photocopying aberrations) and confirm whether the recognised text matches the metadata.
  • the client terminal 25 may search the OCR text to identify such metadata. If such is not identified, such as of the scanned document does not contain the same lot number, then the verification fails.
  • the relevant metadata is demarcated within boundaries such as wherein, for example, in the embodiment described above, the lawyer draws rectangles over the metadata displayed on screen to be verified.
  • the lot number may be in the middle top centre of the page whereas the names of the parties may be at the bottom left-hand right corners of the document respectively.
  • the mobile communication device 25 is configured for recognising text only within the demarcated boundaries and then comparing the text extracted from these demarcated boundaries against the metadata.
  • the mobile communication device 25 may identify the page corners for orientation so as to be able to accurately place the demarcated boundaries.
  • relevant metadata may include the boarding pass ID, name of the passenger, and the departure gate.
  • the document verification server 19 may hash the metadata and create an entry within the blockchain and send a 2D barcode to the passenger record computing system which is then printed onto the boarding pass.
  • the passenger record computing system may send the boarding pass ID and updated gate number.
  • the document verification server 19 For each update, the document verification server 19 creates a new entry within the blockchain.
  • the 2D barcodes of the boarding passes are scanned and the boarding pass ID, and metadata (passenger name and gate number) are extracted from the barcodes.
  • metadata passenger name and gate number
  • such information may also be retrieved via OCR from the boarding pass print.
  • Such extracted metadata may be then sent to the document verification server 19 for verification.
  • the boarding gate computer may maintain a copy of the blockchain so avoid time-consuming queries across the Internet to the document verification server 19.
  • the boarding pass may have been tampered with to change the name printed on the boarding pass and also the associated entry within the passenger record computing system database.
  • the metadata stored within the 2D barcode may additionally have been modified.
  • the boarding pass may still represent the old gate number.
  • the new gate number may be sent by the passenger checking computer to the document verification server 19 wherein the document verification server 19 is able to identify a further verification transaction in relation to the boarding pass ID with the new gate number and therefore pass the verification of the boarding pass.
  • the verification would fail for any other gate number provided not matching the gate updating transaction within the blockchain.
  • the invention may be embodied using devices conforming to other network standards and for other applications, including, for example other WLAN standards and other wireless standards.
  • Applications that can be accommodated include IEEE 802.11 wireless LANs and links, and wireless Ethernet.
  • wireless and its derivatives may be used to describe circuits, devices, systems, methods, techniques, communications channels, etc., that may communicate data through the use of modulated electromagnetic radiation through a non-solid medium. The term does not imply that the associated devices do not contain any wires, although in some embodiments they might not. In the context of this document, the term “wired” and its derivatives may be used to describe circuits, devices, systems, methods, techniques, communications channels, etc., that may communicate data through the use of modulated electromagnetic radiation through a solid medium. The term does not imply that the associated devices are coupled by electrically conductive wires.
  • processor may refer to any device or portion of a device that processes electronic data, e.g., from registers and/or memory to transform that electronic data into other electronic data that, e.g., may be stored in registers and/or memory.
  • a "computer” or a “computing device” or a “computing machine” or a “computing platform” may include one or more processors.
  • the methodologies described herein are, in one embodiment, performable by one or more processors that accept computer-readable (also called machine-readable) code containing a set of instructions that when executed by one or more of the processors carry out at least one of the methods described herein.
  • Any processor capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken are included.
  • a typical processing system that includes one or more processors.
  • the processing system further may include a memory subsystem including main RAM and/or a static RAM, and/or ROM.
  • a computer-readable carrier medium may form, or be included in a computer program product.
  • a computer program product can be stored on a computer usable carrier medium, the computer program product comprising a computer readable program means for causing a processor to perform a method as described herein.
  • the one or more processors operate as a standalone device or may be connected, e.g., networked to other processor(s), in a networked deployment, the one or more processors may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer or distributed network environment.
  • the one or more processors may form a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • each of the methods described herein is in the form of a computer- readable carrier medium carrying a set of instructions, e.g., a computer program that are for execution on one or more processors.
  • embodiments of the present invention may be embodied as a method, an apparatus such as a special purpose apparatus, an apparatus such as a data processing system, or a computer-readable carrier medium.
  • the computer-readable carrier medium carries computer readable code including a set of instructions that when executed on one or more processors cause a processor or processors to implement a method.
  • aspects of the present invention may take the form of a method, an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects.
  • the present invention may take the form of carrier medium (e.g., a computer program product on a computer-readable storage medium) carrying computer-readable program code embodied in the medium.
  • Carrier Medium
  • the software may further be transmitted or received over a network via a network interface device.
  • the carrier medium is shown in an example embodiment to be a single medium, the term “carrier medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
  • the term “carrier medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by one or more of the processors and that cause the one or more processors to perform any one or more of the methodologies of the present invention.
  • a carrier medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media.
  • a device A connected to a device B should not be limited to devices or systems wherein an output of device A is directly connected to an input of device B. It means that there exists a path between an output of A and an input of B which may be a path including other devices or means.
  • Connected may mean that two or more elements are either in direct physical or electrical contact, or that two or more elements are not in direct contact with each other but yet still co-operate or interact with each other.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Document Processing Apparatus (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
PCT/AU2017/050096 2016-02-08 2017-02-07 A system and method for document information authenticity verification Ceased WO2017136879A1 (en)

Priority Applications (21)

Application Number Priority Date Filing Date Title
EA201891795A EA034354B1 (ru) 2016-02-08 2017-02-07 Система и способ проверки подлинности информации документа
CONC2018/0009397A CO2018009397A2 (es) 2016-02-08 2017-02-07 Sistema y método para la verificación de la autenticidad de la información de documentos
CA3012870A CA3012870C (en) 2016-02-08 2017-02-07 A system and method for document information authenticity verification
BR112018016212-4A BR112018016212A2 (en) 2016-02-08 2017-02-07 system and method for verifying the authenticity of document information
MX2018009616A MX2018009616A (es) 2016-02-08 2017-02-07 Sistema y metodo para la verificacion de la autenticidad de la informacion de documentos.
CR20180435A CR20180435A (es) 2016-02-08 2017-02-07 Sistema y método para la verificación de la autenticidad de la información de documentos
KR1020187022860A KR20180110670A (ko) 2016-02-08 2017-02-07 문서 정보의 진본성을 검증하기 위한 시스템 및 방법
MYPI2018702583A MY183574A (en) 2016-02-08 2017-02-07 A system and method for document information authenticity verification
JP2018536277A JP6959618B2 (ja) 2016-02-08 2017-02-07 文書情報の真正性検証のためのシステムおよび方法
HK19100401.2A HK1258030B (en) 2016-02-08 2017-02-07 A system and method for document information authenticity verification
AU2017218452A AU2017218452B2 (en) 2016-02-08 2017-02-07 A system and method for document information authenticity verification
US16/073,914 US10972281B2 (en) 2016-02-08 2017-02-07 System and method for document information authenticity verification
SG11201805566XA SG11201805566XA (en) 2016-02-08 2017-02-07 A system and method for document information authenticity verification
CN201780018818.8A CN109075971B (zh) 2016-02-08 2017-02-07 用于文档信息真实性验证的系统和方法
CUP2018000085A CU20180085A7 (es) 2016-02-08 2017-02-07 Sistema y método para la verificación de la autenticidad de la información de documentos
EP17749821.9A EP3414867B1 (en) 2016-02-08 2017-02-07 A system and method for document information authenticity verification
ZA2018/04492A ZA201804492B (en) 2016-02-08 2018-07-05 A system and method for document information authenticity verification
SA518390002A SA518390002B1 (ar) 2016-02-08 2018-07-24 نظام وطريقة للتحقق من مصادقة معلومات مستند
PH12018501569A PH12018501569A1 (en) 2016-02-08 2018-07-24 A system and method for document information authenticity verification
IL261020A IL261020B (en) 2016-02-08 2018-08-07 System and method for authenticating information about documents
AU2018101148A AU2018101148A4 (en) 2016-02-08 2018-08-13 A system and method for document information authenticity verification

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2016900405 2016-02-08
AU2016900405A AU2016900405A0 (en) 2016-02-08 A system for document information authenticity verification

Publications (1)

Publication Number Publication Date
WO2017136879A1 true WO2017136879A1 (en) 2017-08-17

Family

ID=59562866

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2017/050096 Ceased WO2017136879A1 (en) 2016-02-08 2017-02-07 A system and method for document information authenticity verification

Country Status (28)

Country Link
US (1) US10972281B2 (enExample)
EP (1) EP3414867B1 (enExample)
JP (1) JP6959618B2 (enExample)
KR (1) KR20180110670A (enExample)
CN (1) CN109075971B (enExample)
AU (2) AU2017218452B2 (enExample)
BR (1) BR112018016212A2 (enExample)
CA (1) CA3012870C (enExample)
CL (1) CL2018002135A1 (enExample)
CO (1) CO2018009397A2 (enExample)
CR (1) CR20180435A (enExample)
CU (1) CU20180085A7 (enExample)
CZ (1) CZ2018449A3 (enExample)
EA (1) EA034354B1 (enExample)
EC (1) ECSP18067575A (enExample)
GE (1) GEP20207163B (enExample)
IL (1) IL261020B (enExample)
MA (1) MA44016A (enExample)
MX (1) MX2018009616A (enExample)
MY (1) MY183574A (enExample)
NI (1) NI201800081A (enExample)
PH (1) PH12018501569A1 (enExample)
PT (1) PT3414867T (enExample)
SA (1) SA518390002B1 (enExample)
SG (1) SG11201805566XA (enExample)
SV (1) SV2018005732A (enExample)
WO (1) WO2017136879A1 (enExample)
ZA (1) ZA201804492B (enExample)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108718341A (zh) * 2018-05-30 2018-10-30 北京阿尔山金融科技有限公司 数据的共享和搜索的方法
GB2561875A (en) * 2017-04-26 2018-10-31 Sita Advanced Travel Solutions Ltd System and method for authenticating a non-transferrable access token
WO2018224724A1 (en) * 2017-06-09 2018-12-13 Nokia Technologies Oy Electronic documents certification
JP2019053695A (ja) * 2017-09-19 2019-04-04 株式会社Yslソリューション 建物情報管理システム
JP2019121946A (ja) * 2018-01-09 2019-07-22 Kddi株式会社 文書管理システム、文書管理方法及び文書管理プログラム
WO2019154736A1 (en) * 2018-02-09 2019-08-15 Airbus (S.A.S.) Systems and methods of verifying credentials of aircraft personnel using a blockchain computer system
US20190327080A1 (en) * 2018-04-24 2019-10-24 International Business Machines Corporation Document transfer processing for blockchains
FR3081075A1 (fr) * 2018-05-11 2019-11-15 Arkyan Utilisation d'une technologie a chaine de blocs et systeme d'authentification pour authentifier un fichier informatique
CN110543545A (zh) * 2019-09-05 2019-12-06 腾讯科技(深圳)有限公司 基于区块链的档案管理方法、装置及存储介质
JP2019211563A (ja) * 2018-06-01 2019-12-12 富士ゼロックス株式会社 データ処理装置
WO2020006350A1 (en) * 2018-06-28 2020-01-02 Blockchain Integrated Partners, Llc Systems and methods for data validation and assurance
WO2020012156A1 (en) * 2018-07-10 2020-01-16 Netmaster Solutions Ltd A method and system for managing digital evidence using a blockchain
KR20200013886A (ko) * 2018-07-31 2020-02-10 전자부품연구원 해쉬체인 생성장치 및 해쉬체인 생성방법
WO2020046498A1 (en) * 2018-08-29 2020-03-05 Advanced Messaging Technologies, Inc. Electronic document signing using blockchain
WO2020102246A1 (en) 2018-11-13 2020-05-22 Banqu, Inc. Managing permissions to access user data in a distributed ledger trust network
JP2020086553A (ja) * 2018-11-16 2020-06-04 株式会社エヌ・ティ・ティ・データ 情報処理装置、情報処理方法およびプログラム
WO2020114597A1 (en) * 2018-12-06 2020-06-11 Telefonaktiebolaget Lm Ericsson (Publ) Technique for cryptographic document protection and verification
WO2020130864A1 (en) * 2018-12-21 2020-06-25 Sava Zivanovic System for automatic management and depositing of documents (images) hash in block-chain technology
WO2020149177A1 (ja) * 2019-01-16 2020-07-23 株式会社医療情報技術研究所 文書管理システム
EP3706020A1 (fr) * 2019-03-07 2020-09-09 Informatique 65800 Calcul de signature et vérification d'intégrité de données numériques
IT201900003867A1 (it) * 2019-03-18 2020-09-18 Studio Boost S R L Metodo per la certificazione di fatture elettroniche
JP2020155891A (ja) * 2019-03-19 2020-09-24 株式会社スカイコム 管理サーバ、文書ファイル管理システム、文書ファイル管理方法、および文書ファイル管理プログラム
WO2020202326A1 (ja) * 2019-03-29 2020-10-08 富士通株式会社 情報処理プログラム、装置、及び方法
JP2020166732A (ja) * 2019-03-29 2020-10-08 株式会社オージス総研 情報処理装置、情報処理方法及びコンピュータプログラム
US10860659B1 (en) * 2018-09-06 2020-12-08 Amazon Technologies, Inc. Distributed verification of digital work product
JP2020537771A (ja) * 2017-08-31 2020-12-24 ゼネラル・エレクトリック・カンパニイ 積層造形のための知的財産交換エコシステム
JP2021507407A (ja) * 2017-12-20 2021-02-22 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation ブロックチェーン・ライフサイクルを管理するための方法、装置及びコンピュータ・プログラム
CN112417517A (zh) * 2020-11-19 2021-02-26 成都无右区块链科技有限公司 一种基于区块链的数据标准管理方法
US20210073369A1 (en) * 2019-09-11 2021-03-11 Ricoh Company, Ltd. Tampering detection method and apparatus and non-transitory computer-readable storage medium
CN112559846A (zh) * 2020-11-16 2021-03-26 北京版信通技术有限公司 一种app编码认证系统及其实现方法
US11061886B2 (en) 2018-06-28 2021-07-13 Blockchain Integrated Partners, Llc Systems and methods for data validation and assurance
JP2021517324A (ja) * 2018-06-19 2021-07-15 ▲騰▼▲訊▼科技(深▲セン▼)有限公司 媒体リソース割当方法、装置、システム、コンピュータプログラム及びコンピュータ装置
EP3819855A4 (en) * 2018-11-26 2021-09-29 Advanced New Technologies Co., Ltd. METHOD AND SYSTEM FOR CROSS-BLOCK CHAIN INTERACTION, COMPUTER DEVICE AND STORAGE MEDIUM
US11138590B2 (en) 2017-12-11 2021-10-05 Titan Seal, Inc. Apparatus and method for embedding digital certifications within documents
JP2022066016A (ja) * 2020-10-16 2022-04-28 株式会社Pfu 画像管理システム、画像管理方法、及びプログラム
EP3803671A4 (en) * 2018-05-31 2022-07-06 Pencildata, Inc. TRACK THE ORIGINS OF DIGITAL DATA
EP3776403A4 (en) * 2018-03-28 2023-02-22 Konstantinos Bakalis SYSTEMS AND METHODS FOR USING CODE AND IMAGES IN A BLOCKCHAIN
US11645422B2 (en) 2020-02-12 2023-05-09 International Business Machines Corporation Document verification
US11756128B2 (en) 2017-05-02 2023-09-12 State Farm Mutual Automobile Insurance Company Distributed ledger system for managing smart vehicle data

Families Citing this family (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112018072929A2 (pt) * 2016-05-13 2019-02-19 nChain Holdings Limited método e sistema para verificar a integridade de um software de computador e programa de software de computador
US10419225B2 (en) 2017-01-30 2019-09-17 Factom, Inc. Validating documents via blockchain
US10411897B2 (en) 2017-02-17 2019-09-10 Factom, Inc. Secret sharing via blockchains
US20180260888A1 (en) * 2017-03-08 2018-09-13 Factom Validating Mortgage Documents
US20180260889A1 (en) * 2017-03-10 2018-09-13 Factom Sourcing Mortgage Documents via Blockchains
US20180268504A1 (en) * 2017-03-15 2018-09-20 Factom Indexing Mortgage Documents via Blockchains
US10817873B2 (en) 2017-03-22 2020-10-27 Factom, Inc. Auditing of electronic documents
US10685399B2 (en) 2017-03-31 2020-06-16 Factom, Inc. Due diligence in electronic documents
WO2018186391A1 (ja) * 2017-04-03 2018-10-11 株式会社野村総合研究所 検査システム、検査方法、およびコンピュータプログラム
US10270599B2 (en) 2017-04-27 2019-04-23 Factom, Inc. Data reproducibility using blockchains
US11494402B1 (en) 2017-09-13 2022-11-08 Inveniam Capital Partners, Inc. Apparatus and methods for producing data structures having internal self-references suitable for immutably representing and verifying data
US10491375B2 (en) 2017-10-05 2019-11-26 Accenture Global Solutions Limited Secure verification of conditions of a contract using a set of verification tools
US11063744B2 (en) * 2017-10-20 2021-07-13 Sap Se Document flow tracking using blockchain
US11170092B1 (en) * 2017-12-14 2021-11-09 United Services Automobile Association (Usaa) Document authentication certification with blockchain and distributed ledger techniques
US11170366B2 (en) 2018-05-18 2021-11-09 Inveniam Capital Partners, Inc. Private blockchain services
US11134120B2 (en) 2018-05-18 2021-09-28 Inveniam Capital Partners, Inc. Load balancing in blockchain environments
US10783164B2 (en) 2018-05-18 2020-09-22 Factom, Inc. Import and export in blockchain environments
CN112236987A (zh) * 2018-06-01 2021-01-15 诺基亚技术有限公司 用于分布式网络中的分散式信任评估的方法和装置
JP6616868B1 (ja) * 2018-07-30 2019-12-04 株式会社Artrigger 情報処理システム及び情報処理方法
US11328290B2 (en) 2018-08-06 2022-05-10 Inveniam Capital Partners, Inc. Stable cryptocurrency coinage
US20200042982A1 (en) 2018-08-06 2020-02-06 Factom Digital Contracts in Blockchain Environments
US11989208B2 (en) 2018-08-06 2024-05-21 Inveniam Capital Partners, Inc. Transactional sharding of blockchain transactions
US11327950B2 (en) 2018-11-06 2022-05-10 Workday, Inc. Ledger data verification and sharing system
US11093479B2 (en) 2018-11-06 2021-08-17 Workday, Inc. Ledger data generation and storage for trusted recall of professional profiles
KR102178583B1 (ko) * 2018-11-13 2020-11-13 주식회사 싸이투코드 디지털 컨텐츠 원본 확인키를 이용한 블록체인 방식의 계약 단말 및 방법
KR101989902B1 (ko) * 2018-11-23 2019-06-17 주식회사 에이티앤아이 블록체인을 이용한 문서생성 관리방법 및 이를 이용한 기록관리 시스템
KR102171746B1 (ko) * 2018-11-26 2020-10-29 주식회사 시큐센 블록체인을 이용한 바이오전자서명 방법, 및 장치
KR102171749B1 (ko) * 2018-11-26 2020-10-29 주식회사 시큐센 블록체인을 이용한 복수서명자의 바이오전자서명 방법, 및 장치
US11574134B2 (en) 2018-12-20 2023-02-07 Lexmark International, Inc. Systems and methods of processing a document in an imaging device
CN111353152A (zh) * 2018-12-20 2020-06-30 北京京东尚科信息技术有限公司 基于区块链的文档管理方法、装置、系统及存储介质
US10659647B1 (en) * 2018-12-20 2020-05-19 Lexmark International, Inc. Systems and methods of processing a document in an imaging device
KR102208748B1 (ko) * 2018-12-21 2021-01-28 한국통합민원센터 주식회사 민원문서 위변조 판별 시스템
CN109858259B (zh) * 2018-12-29 2023-03-28 中国科学院合肥物质科学研究院 基于HyperLedger Fabric的社区健康服务联盟数据保护和共享方法
CN110022298B (zh) * 2019-03-04 2021-04-06 创新先进技术有限公司 基于区块链的证据验证的方法、装置、电子设备
KR102002488B1 (ko) * 2019-04-02 2019-07-23 주식회사 한국정보보호경영연구소 블록체인 기반 오프 체인 분산형 저장소를 활용한 문서 임치 시스템
WO2020212771A1 (en) 2019-04-16 2020-10-22 Stegvision Corp. Product authentication systems, methods, and devices
CN110245186B (zh) * 2019-05-21 2023-04-07 深圳壹账通智能科技有限公司 一种基于区块链的业务处理方法及相关设备
JP6617253B1 (ja) * 2019-05-21 2019-12-11 株式会社医療情報技術研究所 文書管理システム
CA3141578A1 (en) * 2019-05-23 2020-11-26 Nikodem HORST Method of binding a digital representation of an actual event with the real time of its occurrence
GB2584298A (en) * 2019-05-28 2020-12-02 Wealden Computing Services Ltd Data verification
KR102266059B1 (ko) * 2019-06-04 2021-06-17 주식회사 한글과컴퓨터 문서의 신뢰성을 보장하기 위한 블록체인 기반의 문서 정보 관리 장치 및 그 동작 방법
KR102266056B1 (ko) * 2019-06-04 2021-06-17 주식회사 한글과컴퓨터 블록체인을 기반으로 문서 정보의 관리를 가능하게 하는 문서 정보 관리 장치 및 그 동작 방법
JP7157015B2 (ja) * 2019-07-11 2022-10-19 フリーサイン株式会社 スマートコントラクトシステム及びプログラム
JP7291272B2 (ja) * 2019-07-11 2023-06-14 フリーサイン株式会社 スマートコントラクトシステム及びプログラム
CN110417781B (zh) * 2019-07-30 2021-11-19 中国工商银行股份有限公司 基于区块链的文档加密管理方法、客户端及服务器
KR102282788B1 (ko) * 2019-09-26 2021-07-29 (주)하이퍼서트 트랜잭션에 포함된 평문 데이터의 변경을 지원하는 블록체인 시스템
KR102147083B1 (ko) * 2019-09-30 2020-08-24 주식회사 디지털존 블록체인 기술을 이용한 전자문서 유효성 검증 시스템 및 그것의 제어 방법
JP6836643B1 (ja) * 2019-11-27 2021-03-03 株式会社スカイコム 管理サーバ、文書ファイル管理システム、文書ファイル管理方法、および文書ファイル管理プログラム
JP7443036B2 (ja) * 2019-12-03 2024-03-05 株式会社サイバーリンクス 担保バッジ表示システム、担保バッジ表示システムのプログラム
US11823120B2 (en) * 2019-12-13 2023-11-21 Salesforce, Inc. System or method of verifying an asset using blockchain and collected asset and device information
US11343075B2 (en) 2020-01-17 2022-05-24 Inveniam Capital Partners, Inc. RAM hashing in blockchain environments
US11455403B2 (en) * 2020-01-20 2022-09-27 International Business Machines Corporation Privacy-preserving document sharing
CN115668256A (zh) * 2020-04-06 2023-01-31 多佛欧洲有限公司 用于产品验证的系统和方法
JP7520691B2 (ja) * 2020-10-28 2024-07-23 キヤノン株式会社 画像形成装置、制御方法、プログラム
DE102020128685A1 (de) * 2020-10-30 2022-05-05 Bundesdruckerei Gmbh Blockchain-basiertes digitales Dokumentensystem
JP7621772B2 (ja) * 2020-11-10 2025-01-27 キヤノン株式会社 情報処理装置、制御方法、およびそのプログラム
US12038979B2 (en) * 2020-11-25 2024-07-16 International Business Machines Corporation Metadata indexing for information management using both data records and associated metadata records
SE545318C2 (en) * 2021-03-01 2023-07-04 Enigio AB Method and system for registering digital documents
JP7478440B2 (ja) * 2021-03-25 2024-05-07 国立研究開発法人産業技術総合研究所 情報処理方法及び情報処理システム
IT202100007472A1 (it) * 2021-03-26 2022-09-26 Reviewercredits S R L Metodo per l’identificazione univoca ai fini di accreditamento e catalogazione per attività di revisione
US12008526B2 (en) 2021-03-26 2024-06-11 Inveniam Capital Partners, Inc. Computer system and method for programmatic collateralization services
US12007972B2 (en) 2021-06-19 2024-06-11 Inveniam Capital Partners, Inc. Systems and methods for processing blockchain transactions
US12137179B2 (en) 2021-06-19 2024-11-05 Inveniam Capital Partners, Inc. Systems and methods for processing blockchain transactions
IT202100017276A1 (it) * 2021-06-30 2022-12-30 Alab Tech S R L Metodo e sistema per certificare la corrispondenza di un documento digitale a una versione precedentemente ricevuta
US11880479B2 (en) * 2021-08-05 2024-01-23 Bank Of America Corporation Access control for updating documents in a digital document repository
US12248597B2 (en) * 2021-08-24 2025-03-11 Red Hat, Inc. Encrypted file name metadata in a distributed file system directory entry
FR3129231B1 (fr) * 2021-11-15 2025-03-14 Veritise Procédé d’authentification de données
FR3129744B1 (fr) * 2021-11-30 2024-08-09 Banks And Acquirers Int Holding Procédé de traitement d’une transaction impliquant l’utilisation d’un identifiant public, dispositif, système et programmes d'ordinateurs correspondants.
US11551496B1 (en) * 2022-02-18 2023-01-10 Passivebolt, Inc. Access control systems, devices, and methods therefor
US12493890B2 (en) * 2022-04-22 2025-12-09 Outlander Capital LLC Blockchain powered art authentication
US20230351407A1 (en) * 2022-05-02 2023-11-02 Walmart Apollo, Llc System and method for product certification management
KR102447177B1 (ko) * 2022-05-10 2022-09-23 이인상 전자문서를 관리하는 전자장치
US12081684B2 (en) * 2022-05-18 2024-09-03 Jpmorgan Chase Bank, N.A. System and method for fact verification using blockchain and machine learning technologies
US12333054B2 (en) * 2022-07-14 2025-06-17 Genetec Inc. Tamper-evident storage and provisioning of media streams
EP4605874A1 (en) * 2022-10-18 2025-08-27 Maersk A/S Methods for verification of electronic documents and related electronic devices
US20240256688A1 (en) * 2023-01-31 2024-08-01 Verified Genius Inc. Authenticated document storage vault
FR3145816B1 (fr) * 2023-02-15 2025-03-14 Keeex procédé d’établissement d’une liaison inviolable entre un fichier numérique et une donnée variable
CN116935395A (zh) * 2023-03-03 2023-10-24 中国移动通信有限公司研究院 文本识别方法、装置、电子设备及存储介质
CN117034360B (zh) * 2023-07-19 2025-10-31 中移动信息技术有限公司 文件泄密风险检测方法、设备、存储介质及装置
US20250077481A1 (en) * 2023-08-31 2025-03-06 American Express Travel Related Services Company, Inc. Metadata extraction and schema evolution tracking for distributed nosql data stores
CN117271516B (zh) * 2023-09-27 2025-12-05 长城汽车股份有限公司 物料清单数据存储方法、装置、电子设备及存储介质
CN117149716A (zh) * 2023-10-27 2023-12-01 北京美络克思科技有限公司 一种电子文档真实性检测方法、装置和设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103023A1 (en) * 2002-11-25 2004-05-27 Irwin John R. Coupon barcode internet verification system
US20060271787A1 (en) * 2005-05-31 2006-11-30 Xerox Corporation System and method for validating a hard-copy document against an electronic version
US20110161674A1 (en) * 2009-12-29 2011-06-30 Konica Minolta Systems Laboratory, Inc. Document authentication using document digest verification by remote server
US20140254796A1 (en) * 2013-03-08 2014-09-11 The Chinese University Of Hong Kong Method and apparatus for generating and/or processing 2d barcode

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003048905A2 (en) * 2001-12-05 2003-06-12 E-Xchange Advantage, Inc. Method and system for managing distributed trading data
JP2006309523A (ja) * 2005-04-28 2006-11-09 Canon Inc 文書管理システム、文書管理方法、プログラム
JP4687703B2 (ja) * 2007-10-02 2011-05-25 ソニー株式会社 記録システム、情報処理装置、記憶装置、記録方法及びプログラム
US8430301B2 (en) * 2009-11-23 2013-04-30 Konica Minolta Laboratory U.S.A., Inc. Document authentication using hierarchical barcode stamps to detect alterations of barcode
US9367530B2 (en) * 2011-01-21 2016-06-14 Jive Software Distributed document co-authoring and processing
US8504480B2 (en) * 2011-02-03 2013-08-06 Ricoh Co., Ltd Creation of signatures for authenticating applications
CA2829127A1 (en) * 2011-03-07 2012-09-13 Roberto GIORI System and method for providing and transferring fungible electronic money
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
US9166986B1 (en) * 2012-11-30 2015-10-20 Microstrategy Incorporated Witnessing documents
US9858569B2 (en) * 2014-03-21 2018-01-02 Ramanan Navaratnam Systems and methods in support of authentication of an item
CA2985040A1 (en) 2014-05-06 2015-12-03 Case Wallet, Inc. Cryptocurrency virtual wallet system and method
US9818092B2 (en) 2014-06-04 2017-11-14 Antti Pennanen System and method for executing financial transactions
CO7240114A1 (es) 2015-01-16 2015-04-17 Lleidanetworks Serveis Telematics Sa Método para creación de contratos electrónicos certificados por parte de un usuario de un operador de telecomunicaciones
SG11201708000PA (en) * 2015-03-31 2017-10-30 Nasdaq Inc Systems and methods of blockchain transaction recordation
US10303887B2 (en) * 2015-09-14 2019-05-28 T0.Com, Inc. Data verification methods and systems using a hash tree, such as a time-centric merkle hash tree
US20170075877A1 (en) * 2015-09-16 2017-03-16 Marie-Therese LEPELTIER Methods and systems of handling patent claims
CN105281913B (zh) * 2015-09-17 2019-01-15 杭州猿人数据科技有限公司 用于电子签名的电子证据处理方法、系统及动态码服务系统
US10318746B2 (en) * 2015-09-25 2019-06-11 Mcafee, Llc Provable traceability
US20170213221A1 (en) * 2016-01-26 2017-07-27 Bank Of America Corporation System for tracking and validation of multiple instances of an entity in a process data network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103023A1 (en) * 2002-11-25 2004-05-27 Irwin John R. Coupon barcode internet verification system
US20060271787A1 (en) * 2005-05-31 2006-11-30 Xerox Corporation System and method for validating a hard-copy document against an electronic version
US20110161674A1 (en) * 2009-12-29 2011-06-30 Konica Minolta Systems Laboratory, Inc. Document authentication using document digest verification by remote server
US20140254796A1 (en) * 2013-03-08 2014-09-11 The Chinese University Of Hong Kong Method and apparatus for generating and/or processing 2d barcode

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"What is proof of existence?", 22 December 2015 (2015-12-22), XP055407486, Retrieved from the Internet <URL:https://web.archive.org/web/20151222163927/https://proofofexistence.com/about> [retrieved on 20160420] *
CROSBY, M. ET AL.: "BlockChain Technology Beyond Bitcoin", PANTAS AND TING, SUTARDJA CENTER FOR ENTREPRENEURSHIP & TECHNOLOGY TECHNICAL REPORT, BERKELEY ENGINEERING, 16 October 2015 (2015-10-16), pages 1 - 35, XP055407487 *

Cited By (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2561875A (en) * 2017-04-26 2018-10-31 Sita Advanced Travel Solutions Ltd System and method for authenticating a non-transferrable access token
US12190389B2 (en) 2017-05-02 2025-01-07 State Farm Mutual Automobile Insurance Company Distributed ledger system for managing smart data
US12026780B1 (en) 2017-05-02 2024-07-02 State Farm Mutual Automobile Insurance Company Distributed ledger system for managing loss histories for properties
US11756128B2 (en) 2017-05-02 2023-09-12 State Farm Mutual Automobile Insurance Company Distributed ledger system for managing smart vehicle data
WO2018224724A1 (en) * 2017-06-09 2018-12-13 Nokia Technologies Oy Electronic documents certification
JP2020537771A (ja) * 2017-08-31 2020-12-24 ゼネラル・エレクトリック・カンパニイ 積層造形のための知的財産交換エコシステム
US11468528B2 (en) 2017-08-31 2022-10-11 General Electric Company Intellectual property exchange ecosystem for additive manufacturing
US11948215B2 (en) 2017-08-31 2024-04-02 General Electric Company Intellectual property exchange ecosystem for additive manufacturing
JP7077399B2 (ja) 2017-08-31 2022-05-30 ゼネラル・エレクトリック・カンパニイ 積層造形のための知的財産交換エコシステム
JP2019053695A (ja) * 2017-09-19 2019-04-04 株式会社Yslソリューション 建物情報管理システム
US11138590B2 (en) 2017-12-11 2021-10-05 Titan Seal, Inc. Apparatus and method for embedding digital certifications within documents
JP2021507407A (ja) * 2017-12-20 2021-02-22 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation ブロックチェーン・ライフサイクルを管理するための方法、装置及びコンピュータ・プログラム
JP7028532B2 (ja) 2017-12-20 2022-03-02 インターナショナル・ビジネス・マシーンズ・コーポレーション ブロックチェーン・ライフサイクルを管理するための方法、装置及びコンピュータ・プログラム
JP2019121946A (ja) * 2018-01-09 2019-07-22 Kddi株式会社 文書管理システム、文書管理方法及び文書管理プログラム
WO2019154736A1 (en) * 2018-02-09 2019-08-15 Airbus (S.A.S.) Systems and methods of verifying credentials of aircraft personnel using a blockchain computer system
EP3776403A4 (en) * 2018-03-28 2023-02-22 Konstantinos Bakalis SYSTEMS AND METHODS FOR USING CODE AND IMAGES IN A BLOCKCHAIN
US12223517B2 (en) 2018-03-28 2025-02-11 Silakab Corp. Systems and methods for securing communication data and property using blockchain
US20190327080A1 (en) * 2018-04-24 2019-10-24 International Business Machines Corporation Document transfer processing for blockchains
CN112005236A (zh) * 2018-04-24 2020-11-27 国际商业机器公司 区块链网络上的文档访问
WO2019206598A1 (en) * 2018-04-24 2019-10-31 International Business Machines Corporation Document access on a blockchain network
US11563557B2 (en) 2018-04-24 2023-01-24 International Business Machines Corporation Document transfer processing for blockchains
FR3081075A1 (fr) * 2018-05-11 2019-11-15 Arkyan Utilisation d'une technologie a chaine de blocs et systeme d'authentification pour authentifier un fichier informatique
CN108718341A (zh) * 2018-05-30 2018-10-30 北京阿尔山金融科技有限公司 数据的共享和搜索的方法
CN108718341B (zh) * 2018-05-30 2021-06-01 北京阿尔山区块链联盟科技有限公司 数据的共享和搜索的方法
US12088730B2 (en) 2018-05-31 2024-09-10 PencilData, Inc. Tracking provenance of digital data
EP3803671A4 (en) * 2018-05-31 2022-07-06 Pencildata, Inc. TRACK THE ORIGINS OF DIGITAL DATA
JP7077792B2 (ja) 2018-06-01 2022-05-31 富士フイルムビジネスイノベーション株式会社 データ処理装置
JP2019211563A (ja) * 2018-06-01 2019-12-12 富士ゼロックス株式会社 データ処理装置
US11412105B2 (en) 2018-06-01 2022-08-09 Fujifilm Business Innovation Corp. Data processing device
US11164218B2 (en) 2018-06-19 2021-11-02 Tencent Technology (Shenzhen) Company Limited Media resource allocation method, apparatus, and system, storage medium, and computer device
JP7183293B2 (ja) 2018-06-19 2022-12-05 ▲騰▼▲訊▼科技(深▲セン▼)有限公司 媒体リソース割当方法、装置、システム、コンピュータプログラム及びコンピュータ装置
JP2021517324A (ja) * 2018-06-19 2021-07-15 ▲騰▼▲訊▼科技(深▲セン▼)有限公司 媒体リソース割当方法、装置、システム、コンピュータプログラム及びコンピュータ装置
WO2020006350A1 (en) * 2018-06-28 2020-01-02 Blockchain Integrated Partners, Llc Systems and methods for data validation and assurance
US11874819B2 (en) 2018-06-28 2024-01-16 Blockchain Integrated Partners, Llc Systems and methods for data validation and assurance
US11061886B2 (en) 2018-06-28 2021-07-13 Blockchain Integrated Partners, Llc Systems and methods for data validation and assurance
US12298962B2 (en) 2018-06-28 2025-05-13 Blockchain Integrated Partners, Llc Systems and methods for data validation and assurance
AU2019301272B2 (en) * 2018-07-10 2022-06-30 Thomson Reuters Enterprise Centre Gmbh A method and system for managing digital evidence using a blockchain
US12153717B2 (en) * 2018-07-10 2024-11-26 Thomson Reuters Enterprise Centre Gmb Method and system for managing digital evidence using a blockchain
WO2020012156A1 (en) * 2018-07-10 2020-01-16 Netmaster Solutions Ltd A method and system for managing digital evidence using a blockchain
US20210294920A1 (en) * 2018-07-10 2021-09-23 Netmaster Solutions Ltd A method and system for managing digital evidence using a blockchain
KR102084855B1 (ko) * 2018-07-31 2020-03-04 전자부품연구원 해쉬체인 생성장치 및 해쉬체인 생성방법
KR20200013886A (ko) * 2018-07-31 2020-02-10 전자부품연구원 해쉬체인 생성장치 및 해쉬체인 생성방법
WO2020046498A1 (en) * 2018-08-29 2020-03-05 Advanced Messaging Technologies, Inc. Electronic document signing using blockchain
US11223481B2 (en) 2018-08-29 2022-01-11 J2 Cloud Services, Llc Electronic document signing using blockchain
US10860659B1 (en) * 2018-09-06 2020-12-08 Amazon Technologies, Inc. Distributed verification of digital work product
CN113287141A (zh) * 2018-11-13 2021-08-20 班克公司 管理对访问分布式账本信托网络中的用户数据的许可
EP3881270A4 (en) * 2018-11-13 2022-08-17 Banqu, Inc. DEFINITION AND MANAGEMENT OF SHAPES IN A DISTRIBUTED LEDGER TRUST NETWORK
CN113302645A (zh) * 2018-11-13 2021-08-24 班克公司 定义和管理分布式账本信托网络中的表单
US20220060330A1 (en) * 2018-11-13 2022-02-24 Banqu, Inc. Defining and managing forms in a distributed ledger trust network
EP3881271A4 (en) * 2018-11-13 2022-08-17 Banqu, Inc. MANAGING PERMISSIONS TO ACCESS USER DATA IN A LEDGER DISTRIBUTED TRUST NETWORK
US12113781B2 (en) 2018-11-13 2024-10-08 Banqu, Inc. Managing permissions to access user data in a distributed ledger trust network
WO2020102246A1 (en) 2018-11-13 2020-05-22 Banqu, Inc. Managing permissions to access user data in a distributed ledger trust network
WO2020102242A1 (en) 2018-11-13 2020-05-22 Banqu, Inc. Defining and managing forms in a distributed ledger trust network
JP7112944B2 (ja) 2018-11-16 2022-08-04 株式会社エヌ・ティ・ティ・データ 情報処理装置、情報処理方法およびプログラム
JP2020086553A (ja) * 2018-11-16 2020-06-04 株式会社エヌ・ティ・ティ・データ 情報処理装置、情報処理方法およびプログラム
EP3819855A4 (en) * 2018-11-26 2021-09-29 Advanced New Technologies Co., Ltd. METHOD AND SYSTEM FOR CROSS-BLOCK CHAIN INTERACTION, COMPUTER DEVICE AND STORAGE MEDIUM
US11882214B2 (en) 2018-12-06 2024-01-23 Telefonaktiebolaget Lm Ericsson (Publ) Technique for cryptographic document protection and verification
WO2020114597A1 (en) * 2018-12-06 2020-06-11 Telefonaktiebolaget Lm Ericsson (Publ) Technique for cryptographic document protection and verification
US11893055B2 (en) 2018-12-21 2024-02-06 Sava ZIVANOVIC System for automatic management and depositing of documents (images) hash in block-chain technology
CN113169978A (zh) * 2018-12-21 2021-07-23 萨瓦·兹万诺维奇 用于在区块链技术中自动管理和存放文件(图像)哈希的系统
WO2020130864A1 (en) * 2018-12-21 2020-06-25 Sava Zivanovic System for automatic management and depositing of documents (images) hash in block-chain technology
US12086280B2 (en) 2019-01-16 2024-09-10 Iryou Jyouhou Gijyutu Kenkyusho Corporation Document management system
WO2020149177A1 (ja) * 2019-01-16 2020-07-23 株式会社医療情報技術研究所 文書管理システム
FR3093576A1 (fr) * 2019-03-07 2020-09-11 Informatique 65800 Calcul de signature et vérification d’intégrité de données numériques
EP3706020A1 (fr) * 2019-03-07 2020-09-09 Informatique 65800 Calcul de signature et vérification d'intégrité de données numériques
IT201900003867A1 (it) * 2019-03-18 2020-09-18 Studio Boost S R L Metodo per la certificazione di fatture elettroniche
JP2020155891A (ja) * 2019-03-19 2020-09-24 株式会社スカイコム 管理サーバ、文書ファイル管理システム、文書ファイル管理方法、および文書ファイル管理プログラム
WO2020202326A1 (ja) * 2019-03-29 2020-10-08 富士通株式会社 情報処理プログラム、装置、及び方法
JPWO2020202326A1 (enExample) * 2019-03-29 2020-10-08
JP7136339B2 (ja) 2019-03-29 2022-09-13 富士通株式会社 情報処理プログラム、装置、及び方法
JP2020166732A (ja) * 2019-03-29 2020-10-08 株式会社オージス総研 情報処理装置、情報処理方法及びコンピュータプログラム
CN110543545A (zh) * 2019-09-05 2019-12-06 腾讯科技(深圳)有限公司 基于区块链的档案管理方法、装置及存储介质
US12079323B2 (en) * 2019-09-11 2024-09-03 Ricoh Company, Ltd. Tampering detection method and apparatus and non-transitory computer-readable storage medium
US20210073369A1 (en) * 2019-09-11 2021-03-11 Ricoh Company, Ltd. Tampering detection method and apparatus and non-transitory computer-readable storage medium
EP3792792A1 (en) * 2019-09-11 2021-03-17 Ricoh Company, Ltd. Tampering detection method for paper copy and apparatus and non-transitory computer-readable storage medium
US11645422B2 (en) 2020-02-12 2023-05-09 International Business Machines Corporation Document verification
JP2022066016A (ja) * 2020-10-16 2022-04-28 株式会社Pfu 画像管理システム、画像管理方法、及びプログラム
JP7714331B2 (ja) 2020-10-16 2025-07-29 株式会社Pfu 画像管理システム、画像管理方法、及びプログラム
CN112559846B (zh) * 2020-11-16 2023-10-03 北京版信通技术有限公司 一种app编码认证系统及其实现方法
CN112559846A (zh) * 2020-11-16 2021-03-26 北京版信通技术有限公司 一种app编码认证系统及其实现方法
CN112417517B (zh) * 2020-11-19 2023-11-28 成都无右区块链科技有限公司 一种基于区块链的数据标准管理方法
CN112417517A (zh) * 2020-11-19 2021-02-26 成都无右区块链科技有限公司 一种基于区块链的数据标准管理方法

Also Published As

Publication number Publication date
CL2018002135A1 (es) 2018-12-07
SV2018005732A (es) 2019-04-04
JP6959618B2 (ja) 2021-11-02
BR112018016212A2 (en) 2018-12-18
AU2017218452A1 (en) 2018-07-19
CN109075971A (zh) 2018-12-21
US20190044727A1 (en) 2019-02-07
CN109075971B (zh) 2022-02-18
EP3414867B1 (en) 2021-06-09
EP3414867A4 (en) 2019-08-28
KR20180110670A (ko) 2018-10-10
CO2018009397A2 (es) 2018-09-20
CA3012870A1 (en) 2017-08-17
CA3012870C (en) 2024-02-06
EP3414867A1 (en) 2018-12-19
CR20180435A (es) 2019-01-21
CU20180085A7 (es) 2018-10-04
EA201891795A1 (ru) 2019-01-31
US10972281B2 (en) 2021-04-06
AU2018101148A4 (en) 2018-09-13
IL261020B (en) 2020-06-30
SA518390002B1 (ar) 2021-12-23
PT3414867T (pt) 2021-10-15
JP2019511758A (ja) 2019-04-25
ZA201804492B (en) 2019-05-29
CZ2018449A3 (cs) 2019-10-23
ECSP18067575A (es) 2018-10-31
EA034354B1 (ru) 2020-01-30
NI201800081A (es) 2019-02-18
GEP20207163B (en) 2020-10-12
MA44016A (fr) 2018-12-19
MY183574A (en) 2021-02-26
AU2017218452B2 (en) 2019-06-20
MX2018009616A (es) 2019-03-28
IL261020A (en) 2018-10-31
SG11201805566XA (en) 2018-08-30
HK1258030A1 (zh) 2019-11-01
PH12018501569A1 (en) 2019-01-21

Similar Documents

Publication Publication Date Title
AU2018101148A4 (en) A system and method for document information authenticity verification
US11349666B2 (en) Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and ID validation methods
US10402784B2 (en) Dynamic notary system
US9122911B2 (en) System, method and computer program for verifying a signatory of a document
CA2925325C (en) Document authentication based on expected wear
CN112487490A (zh) 篡改识别方法、设备和介质
CN102012999B (zh) 机读信息卡的电子档案及其实现方法与系统
KR102256922B1 (ko) 조회 이력 통지에 의하여 인증 기능이 강화된 문서 인증 방법 및 문서 인증 시스템
JP7477937B1 (ja) 鑑定証明システム、及び鑑定証明方法
CN112464968A (zh) 印鉴快速鉴伪方法、服务器及用户终端
OA18753A (en) A system and method for document information authenticity verification
HK1258030B (en) A system and method for document information authenticity verification
CN100588223C (zh) 信息处理装置和方法
JP2017175377A (ja) タイムスタンプ保管サーバ、携帯端末、電子データ保管サーバ、タイムスタンプ保管プログラム、携帯端末プログラム、及び、電子データ保管プログラム
EP4167520B1 (en) Digital certification of scanned documents
JP7367270B1 (ja) 鑑定証明システム、及び鑑定証明方法
JP2003303276A (ja) 稟議システムおよび稟議決裁方法
TW202025061A (zh) 基於區塊鏈技術之數位證書管理方法、系統、電腦程式產品及電腦可讀取記錄媒體
JP2002092617A (ja) 印鑑登録・照合システム
KR20150067558A (ko) 증명사진 등록 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17749821

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018536277

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017218452

Country of ref document: AU

Date of ref document: 20170207

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 11201805566X

Country of ref document: SG

Ref document number: 12018501569

Country of ref document: PH

WWE Wipo information: entry into national phase

Ref document number: 3012870

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 261020

Country of ref document: IL

Ref document number: 2018-000081 I

Country of ref document: NI

Ref document number: MX/A/2018/009616

Country of ref document: MX

ENP Entry into the national phase

Ref document number: 20187022860

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 001497-2018

Country of ref document: PE

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112018016212

Country of ref document: BR

WWE Wipo information: entry into national phase

Ref document number: DZP2018000438

Country of ref document: DZ

ENP Entry into the national phase

Ref document number: 14871

Country of ref document: GE

WWE Wipo information: entry into national phase

Ref document number: 201891795

Country of ref document: EA

Ref document number: PV2018-449

Country of ref document: CZ

WWE Wipo information: entry into national phase

Ref document number: CR2018-000435

Country of ref document: CR

WWE Wipo information: entry into national phase

Ref document number: 2017749821

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2017749821

Country of ref document: EP

Effective date: 20180910

ENP Entry into the national phase

Ref document number: 112018016212

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20180808

WWE Wipo information: entry into national phase

Ref document number: 518390002

Country of ref document: SA