International Business Machines Corporation
CERTIFYING AUTHENTICITY OF DATA MODIFICATIONS
Last updated:
Abstract:
An example operation may include one or more of receiving, at a data provider, a data file from a data modifier which comprises a modification to an initial content state of a data file, generating a hash value of the initial content state of the data file prior to modification and generating a hash value of a modified content state of the data file after the modification, and transmitting the generated hash values to a blockchain peer node for inclusion within one or more data blocks among a hash-linked chain of data blocks.
Status:
Application
Type:
Utility
Filling date:
20 May 2022
Issue date:
1 Sep 2022