International Business Machines Corporation
CERTIFYING AUTHENTICITY OF DATA MODIFICATIONS

Last updated:

Abstract:

An example operation may include one or more of receiving, at a data provider, a data file from a data modifier which comprises a modification to an initial content state of a data file, generating a hash value of the initial content state of the data file prior to modification and generating a hash value of a modified content state of the data file after the modification, and transmitting the generated hash values to a blockchain peer node for inclusion within one or more data blocks among a hash-linked chain of data blocks.

Status:
Application
Type:

Utility

Filling date:

20 May 2022

Issue date:

1 Sep 2022