Defensive Publishing of Proof of Existence

Easily Verify and Safeguard Your Creative Works and Discoveries!

Protecting intellectual property can be a daunting task, typically involving patenting or publishing.

Patenting secures your copyright but demands a lengthy, intricate process with numerous requirements, such as utility models, industrial design patents, and mechanical processes. Additionally, patenting is eventually necessary but can be too expensive in the early phases of your scientific or engineering work.

Publishing, on the other hand, grants copyright to your literary, musical, or graphical creations but exposes them to the public domain. While this allows others to view and reference your work, it may not suit those desiring to keep their creations confidential but still have proof of authorship available.

In both cases, originality and applicability are crucial factors, making the verification and protection of your intellectual property a top priority.

We provide an affordable solution for verifying authorship, via Proof of Existence without requiring the publication of your creative work.

Secure your IP or other information

How the process works

process
Frequently asked questions

Q: How can Proof of Existence (PoE) be used as evidence in court?

A: If your country’s legal system allows digital evidence, then it is likely the court will also allow PoE as part of this evidence. Discuss this with your legal counsel who will advise you on the exact restrictions of allowing digital evidence in courts in your region.

Q: Can I combine different creative works and package them to save on the costs?

A: Yes, you can put different files into one zip archive and create the defensive proof of existence for this file. It will validate the existence of multiple creative works at the same time.

Can PoE (Proof of Existence) record re-create my data?

A: No. It is impossible to re-generate or reveal any data in your file from the SHA-256 key that is submitted in the public blockchain(s). The PoE can only verify the file and the timestamp of the submission.

Q: What are the chances that a hash number already exists in the blockchain?

A: The chances of having a duplicate key for SHA-256 cryptographic key is 4.3*10^-60, meaning that if every person on the planet created one key every second, it would take 252 288 trillion years for the first duplication to appear.

Frequently asked questions

Q: What happens if I change my file after the submission?

A: The Proof Of strongly recommends archiving files and never updating or saving any new changes on it. If the file has been changed, the unique hash number will no longer be able to validate the existence of your work. The best way to safeguard your IP and protect your original file is to zip archive it and store it in a cloud or other safe storage location.

Q: What you are offering are NFT-s?

A: The concept of NFT (Non-Fungible Token) is somewhat similar, but the purpose is different. The purpose of the NFT-s is to sell the validation record, earn royalties etc. While we simply offer the protection of creative work and Proof of Existence of data. Most of the NFT-s are stored on the Ethereum blockchain, we store the validation of data in public blockchain.

Q: What is cryptographic key?

A: The SHA-256 cryptographic key we use a unique fingerprint for a single file (document, journal, image etc). This means that if even one bit (one char or pixel) of information is changed on a file, the key fingerprint will also change. It ensures that the file exists in exactly the same way as the timestamp on the original cryptographic key.

The key looks like this: 7bf7b57f02b399d418cb61686930ac2fdd3a3b1c201a891003b0b7797fd3627d

How does it work?

The Solution works on 4 principles

  • Defensive Publishing of

    For the purposes of protecting your work, defensive publishing provides electronic or non-constructive evidence that the information exists in a digital file format at certain time and date – powered by blockchain as an immutable record of your work.

    Music and Sound Artwork Video Literature Computer Programs Utility ModelsIndustrial DesignsMechanical ProcessesProof for Insurance

    In this context, while the file itself will not be submitted, the data or contents of this cannot be changed at later stage.

  • Non-Constructive Evidence

    With this, you can digitally validate the existence of your work, but this has a limitation in that you can’t use this PoE to re-create the original information in any way.

    The evidence will be the only piece of information stored. All you need to do is to make sure that the file to be protected will remain intact and unedited.

  • as Proof of Existence (PoE)

    Think of this as a code. This ‘code’ is in fact a cryptographic key created in SHA-256 – a cryptographic hash algorithm assigned to a file to corroborate its existence.

    Each hash number is completely unique, and no two are ever the same. This is extremely useful as it can then verify work as your own.

  • stored in Public Blockchain

    A public blockchain is one where anyone is free to join and participate in the core activities of the blockchain network. Anyone can read, write, and audit the ongoing activities on a public blockchain network, which helps achieve the self-governed, decentralized nature often touted when blockchain is discussed.

    In this instance, The Proof Of makes use of a decentralized blockchain as an immutable record of your work. Once approved, this record can’t ever be deleted or changed. With thousands of independent validators that approve transactions, even if the chain is somehow hacked or compromised, it is impossible to alter any already-existing data.

Generate hash value

Protect Your intellectual property Now