It’s also covered by patents in

Australia Italy
Austria Monaco
Brazil Netherlands
Canada Norway
China Poland
Denmark Singapore
Finland Spain
France Sweden
Germany Switzerland
Greece UAE
Hong Kong United Kingdom
Ireland
Australia
Austria
Brazil
Canada
China
Denmark
Finland
France
Germany
Greece
Hong Kong
Ireland
Italy
Monaco
Netherlands
Norway
Poland
Singapore
Spain
Sweden
Switzerland
UAE
United Kingdom
map and country

How We Use Blockchain to Protect Document Security

To increase privacy and enhance security in Justlaw, user files are stored on media servers with a security mechanism using file proxying through an intermediary (media provider) which has information about the requester’s credentials. This storage method provides increased data protection and improves the security of file storage.

Here's how the process works and how it provides protection:

Anonymize access to files

When using a media provider to proxy files, the file storage itself is hidden from direct access. This ensures the anonymity of the storage itself and prevents direct access to files without appropriate authority.

Access Control and Authorization

The media provider has credential-based access control mechanisms, where granting access to files is dependent on checking the credentials and authorization of the requester. This allows users to restrict access to files to authorized users only.

Logging and Monitoring

The media provider tracks file requests, logs user activity, and monitors data access. This allows users to detect unauthorized access attempts or file usage anomalies.

Access Rights Management

The media provider provides access rights management capabilities, allowing administrators to flexibly configure user permissions to read, write, or delete files.

Data encryption

To increase the security of storing files, they are encrypted on the side of the media provider, providing an additional level of protection in the event of information leakage.

image slide
image slide
image slide
image slide
image slide
This approach to storing files by proxying information through a media provider with knowledge of credentials improves data security, provides access control, and prevents unwanted access to sensitive information.

Here's how the process works and how it provides protection:

filter background

Blockchain

Our blockchain is native, which means it was designed into the platform rather than added as an afterthought.Files are saved in the JustLaw Vault, and the hash function (time stamp) is stored in the Polygon public blockchain network, which ensures provable authenticity and unforgeability. A timestamp on the blockchain allows users to confirm the authenticity of a document and its content at a specific point in time. Due to blockchain characteristics such as data immutability and decentralization, documents once recorded with a timestamp cannot be altered or tampered with.

image fot item
image for item
image for item