| CPC G06Q 40/04 (2013.01) [G06Q 20/38215 (2013.01); G06Q 20/3827 (2013.01); G06Q 20/389 (2013.01); G06Q 20/405 (2013.01); G06Q 40/06 (2013.01); G06Q 40/10 (2013.01); G06Q 40/12 (2013.12); H04L 9/3297 (2013.01); G06Q 30/018 (2013.01); H04L 9/50 (2022.05); H04L 2209/56 (2013.01)] | 20 Claims |

|
1. A computer-implemented method of preparing for an external audit by a company by recording corporate governance information on an immutable blockchain, the method comprising:
in real time, with software executing on a computer system:
drafting and recording general corporate matters;
encrypting at least a portion of the recording of the general corporate matters as encrypted data, wherein the at least a portion comprises identifiable information, such that the identifiable information is accessible only with a decryption key;
storing the encrypted data of the general corporate matters on a blockchain, such that the recording creates an immutably verifiable record that is time-stamped and that cannot be subject to subsequent data entry manipulation;
drafting and recording financial and accounting matters;
encrypting at least a portion of the recording of the financial and accounting matters as encrypted data, wherein the at least a portion comprises identifiable information, such that the identifiable information is accessible only with the decryption key;
storing the encrypted data of the financial and accounting matters on a blockchain, such that the recording creates an immutably verifiable record that is time-stamped and that cannot be subject to subsequent data entry manipulation;
drafting and recording tax filing maters;
encrypting at least a portion of the recording of the tax filing matters as encrypted data, wherein the at least a portion comprises identifiable information, such that the identifiable information is accessible only with the decryption key;
storing the encrypted data of the tax filing matters on a blockchain, such that the recording creates an immutably verifiable record that is time-stamped and that cannot be subject to subsequent data entry manipulation;
creating a list of certificate holders that have access to the decryption key; and
designating at least one certificate holder who has access to the decryption key on the immutable blockchain.
|