US-20260128864-A1 - SYSTEMS AND METHODS OF FACILITATING DOCUMENT VALIDATION
Abstract
The present disclosure provides a method of facilitating document validation. Further, the method may include receiving one or more access requests from one or more first user devices associated with one or more first users. Further, the one or more access requests includes one or more first hash values, and one or more encryption keys. Further, the method may include retrieving one or more second hash values from one or more databases. Further, the method may include analyzing the one or more first hash values and the one or more second hash values. Further, the method may include generating one or more results based on the analyzing of the one or more first hash values and the one or more second hash values. Further, the method may include transmitting the one or more results to the one or more first user devices.
Inventors
- REMY A. EISENSTEIN
Assignees
- Token Economics Sas
Dates
- Publication Date
- 20260507
- Application Date
- 20251104
Claims (20)
- 1 . A method of facilitating document validation, the method comprising: receiving, using a communication device, at least one access request from at least one first user device associated with at least one first user, wherein the at least one access request comprises at least one first hash value, and at least one encryption key; retrieving, using a storage device, at least one second hash value from at least one database; analyzing, using a processing device, the at least one first hash value and the at least one second hash value; generating, using the processing device, at least one result based on the analyzing of the at least one first hash value and the at least one second hash value; and transmitting, using the communication device, the at least one result to the at least one first user device.
- 2 . The method of claim 1 further comprising: receiving, using the communication device, at least one user data from at least one institution device; generating, using the processing device, the at least one second hash value of the at least one user data using at least one hash function; encrypting, using the processing device, the at least one user data using the at least one encryption key; generating, using the processing device, at least one digital identifier, wherein the at least one digital identifier comprises the at least one second hash value and the at least one encryption key; and storing, using the storage device, the at least one second hash value, the at least one encryption key, and the at least one digital identifier in the at least one database.
- 3 . The method of claim 2 further comprising: receiving, using the communication device, at least one admin data associated with at least one administrator from the at least one institution device; analyzing, using the processing device, the at least one admin data; generating, using the processing device, a public key, a private key, and a directory key using at least one encryption algorithm based on the analyzing of the at least one admin data; obtaining, using the processing device, at least one admin password based on the generating of the public key, the private key, and the directory key using the at least one encryption algorithm; generating, using the processing device, an encrypted public key, an encrypted private key, and an encrypted directory key using the at least one admin password based on the obtaining of the at least one admin password; generating, using the processing device, at least one admin hash value of the at least one admin password using the at least one hash function based on the obtaining of the at least one admin password; and storing, using the storage device, the encrypted public key, the encrypted private key, the encrypted directory key, and the at least one admin hash value in the at least one database.
- 4 . The method of claim 3 further comprising: receiving, using the communication device, at least one user request from at least one second user device associated with at least one second user, wherein the at least one user request comprises at least one account creation request; analyzing, using the processing device, the at least one user request; generating, using the processing device, at least one user account for the at least one second user based on the analyzing of the at least one user request; generating, using the processing device, at least one user password for the at least one user account based on the generating of the at least one user account; retrieving, using the storage device, the private key, and the directory key from the at least one database; generating, using the processing device, a user-encrypted private key and a user-encrypted directory key using the at least one user password based on the retrieving of the private key and the directory key from the at least one database; and storing, using the storage device, the user-encrypted private key, and the user-encrypted directory key in the at least one database.
- 5 . The method of claim 4 further comprising: generating, using the processing device, at least one user hash value of the at least one user password using the at least one hash function; generating, using the processing device, at least one message based on the generating of the at least one hash value of the at least one user password; and transmitting, using the communication device, the at least one message to at least one second user device associated with at least one second user.
- 6 . The method of claim 5 , wherein the at least one message represents at least one e-mail, wherein the at least one e-mail comprises at least one user account information, the at least one user password, at least one instruction to validate the at least one user account, and the at least one user hash value.
- 7 . The method of claim 2 , further comprising: deactivating, using the processing device, the at least one digital identifier based on the generating of the negative result; generating, using the processing device, at least one alert based on the deactivating of the at least one digital identifier; and transmitting, using the communication device, the at least one alert to at least one first user device.
- 8 . The method of claim 1 , wherein the generating of the at least one result comprises generating one of a positive result and a negative result, wherein the positive result indicates a validity of at least one user data, wherein the negative result indicates an invalidity of the at least one user data.
- 9 . The method of claim 8 , further comprising: obtaining, using the processing device, at least one user data identifier and at least one encrypted user data based on the generating of the positive result; and transmitting, using the communication device, the at least one user data identifier and the at least one encrypted user data to the at least one first device.
- 10 . The method of claim 1 , wherein the at least one user data comprises at least one user information and the at least one document of the at least one user, wherein the at least one document comprises at least one of an education document, a medical document, an employment contract, a power of attorney, an email communication, and a legal document, wherein the at least one user information comprises at least one of a user name, and user address.
- 11 . A system for facilitating document validation, the system comprising: a communication device configured for: receiving at least one access request from at least one first user device associated with at least one first user, wherein the at least one access request comprises at least one first hash value, and at least one encryption key; and transmitting at least one result to the at least one first user device; a processing device communicatively coupled with the communication device, wherein the processing device is configured for: analyzing the at least one first hash value and at least one second hash value; generating the at least one result based on the analyzing of the at least one first hash value and the at least one second hash value; and a storage device communicatively coupled with the processing device, wherein the storage device is configured for: retrieving the at least one second hash value from at least one database.
- 12 . The system of claim 11 , wherein the communication device is further configured for receiving the at least one user data from at least one institution device, wherein the processing device is configured for: generating the at least one second hash value of the at least one user data using at least one hash function; encrypting the at least one user data using the at least one encryption key; generating at least one digital identifier, wherein the at least one digital identifier comprises the at least one second hash value and the at least one encryption key, wherein the storage device is further configured for storing the at least one second hash value, the at least one encryption key, and the at least one digital identifier in the at least one database.
- 13 . The system of claim 12 , wherein the communication device is further configured for receiving at least one admin data associated with at least one administrator from the at least one institution device, wherein the processing device is further configured for: analyzing the at least one admin data; generating a public key, a private key, and a directory key using at least one encryption algorithm based on the analyzing of the at least one admin data; obtaining at least one admin password based on the generating of the public key, the private key, and the directory key using the at least one encryption algorithm; generating an encrypted public key, an encrypted private key, and an encrypted directory key using the at least one admin password based on the obtaining of the at least one admin password; and generating at least one admin hash value of the at least one admin password using the at least one hash function based on the obtaining of the at least one admin password, wherein the storage device is further configured for storing the encrypted public key, the encrypted private key, the encrypted directory key, and the at least one admin hash value in the at least one database.
- 14 . The system of claim 13 , wherein the communication device is further configured for receiving at least one user request from at least one second user device associated with at least one second user, wherein the at least one user request comprises at least one account creation request, wherein the processing device is further configured for: analyzing the at least one user request; generating at least one user account for the at least one second user based on the analyzing of the at least one user request; generating at least one user password for the at least one user account based on the generating of the at least one user account; generating a user-encrypted private key and a user-encrypted directory key using the at least one user password based on retrieving of a private key and a directory key from the at least one database, wherein the storage device is further configured for: retrieving the private key, and the directory key from the at least one database; and storing the at least one user-encrypted private key, and the user-encrypted directory key in the at least one database.
- 15 . The system of claim 14 , wherein the communication device is further configured for transmitting at least one message to at least one second user device associated with at least one second user, wherein the processing device is further configured for: generating at least one user hash value of the at least one user password using the at least one hash function; and generating the at least one message based on the generating of the at least one hash value of the at least one user password.
- 16 . The system of claim 15 , wherein the at least one message represents at least one e-mail, wherein the at least one e-mail comprises at least one user account information, the at least one user password, at least one instruction to validate the at least one user account, and the at least one user hash value.
- 17 . The system of claim 11 , wherein the generating of the at least one result comprises generating one of a positive result and a negative result, wherein the positive result indicates a validity of at least one user data, wherein the negative result indicates an invalidity of the at least one user data.
- 18 . The system of claim 17 , wherein the communication device is further configured for transmitting at least one user data identifier and at least one encrypted user data to the at least one first device, wherein the processing device is further configured for obtaining the at least one user data identifier and the at least one encrypted user data based on the generating of the positive result.
- 19 . The system of claim 17 , wherein the communication device is further configured for transmitting at least one alert to at least one first user device, wherein the processing device is further configured for: deactivating the at least one digital identifier based on the generating of the negative result; and generating the at least one alert based on the deactivating of the at least one digital identifier.
- 20 . The system of claim 11 , wherein the at least one user data comprises at least one user information and the at least one document of the at least one user, wherein the at least one document comprises at least one of an education document, a medical document, an employment contract, a power of attorney, an email communication, and a legal document, wherein the at least one user information comprises at least one of a user name, and user address.
Description
The current application claims a priority to the U.S. provisional patent application Ser. No. 63/715,960 filed on Nov. 4, 2025. FIELD OF THE INVENTION The present disclosure generally relates to the field of data processing. More specifically, the present disclosure relates to systems and methods of facilitating document validation. BACKGROUND OF THE INVENTION The present disclosure generally relates to the field of secure digital data management and verification technologies. More particularly, the disclosure pertains to systems and methods for facilitating secure verification of digital or digitized documents, including but not limited to academic credentials, legal contracts, government records, corporate certificates, and healthcare documents. The field of digital document verification is of critical importance in modern data-driven ecosystems where institutions and individuals increasingly rely on digital records for decision-making, compliance, and authentication. As organizations transition from paper-based systems to digital infrastructures, ensuring the authenticity, integrity, and confidentiality of documents has become a foundational requirement for maintaining trust in digital transactions. The ability to verify the genuineness of digital documents in a secure, efficient, and tamper-proof manner is essential to prevent fraud, data manipulation, and identity theft. A desirable objective is to enable real-time, automated, and privacy-preserving verification of documents while maintaining the confidentiality of sensitive data and ensuring that such verification processes remain resistant to malicious interference or unauthorized modification. Achieving the objective requires technological frameworks that provide not only cryptographic security but also adaptive, scalable, and user-trust-enhancing mechanisms capable of supporting secure document management across diverse application domains such as education, corporate governance, healthcare, and government administration. However, existing systems for digital document verification encounter numerous technical and operational challenges that hinder the realization of the objective. Traditional verification systems often rely on centralized authorities or third-party intermediaries, introducing vulnerabilities such as single points of failure, delayed authentication, and potential misuse of personal information. Many existing solutions lack dynamic response capabilities to detect and prevent fraudulent activities in real time, resulting in prolonged exposure of compromised credentials. Additionally, static document identifiers such as unencrypted or fixed QR codes can be easily duplicated, redirected, or manipulated, thereby allowing forged documents to appear legitimate. Conventional digital security infrastructures also face difficulties in maintaining privacy and adaptability. Systems that store or process document data in plaintext form are exposed to unauthorized access, increasing the risk of data breaches. Furthermore, the systems generally lack interoperability, limiting the ability to collaborate securely across institutions and jurisdictions. The growing complexity of cyber threats further exacerbates the challenges. Sophisticated attacks targeting encryption weaknesses, authentication bypasses, or database tampering highlight the need for multi-layered protection mechanisms that can intelligently detect anomalies and prevent fraud. The absence of real-time notification frameworks leaves stakeholders uninformed when document authenticity is compromised, perpetuating reliance on outdated or invalid records. Another persistent problem in the field lies in balancing security with performance and usability. High computational overhead from conventional encryption systems often results in latency during document verification, particularly in large-scale institutional deployments or resource-constrained environments. Similarly, users often encounter difficulties in verifying authenticity without specialized knowledge or access to dedicated infrastructure, limiting the practical adoption of digital verification technologies. Emerging trends, including the advent of quantum computing and the proliferation of distributed data ecosystems, further expose the inadequacy of traditional document verification frameworks. Current systems are ill-equipped to handle post-quantum threats, decentralized verification scenarios, or privacy-preserving data sharing across heterogeneous networks. Moreover, the lack of intelligent fraud detection, adaptive algorithmic upgrades, and privacy-compliant analytics impedes the ability of the systems to evolve alongside technological progress. Therefore, there is a need for improved methods and systems for facilitating document validation that can overcome one or more of the preceding problems. SUMMARY OF THE INVENTION This summary is provided to introduce a selection of concepts in a simplified form, that are further desc