CPC G06Q 40/06 (2013.01) [H04L 9/0643 (2013.01); H04L 9/50 (2022.05); H04L 2209/56 (2013.01)] | 20 Claims |
1. A computer implemented method for comparing files to determine file authenticity and maintain investment strategy confidentiality, the computer implemented method comprising:
algorithmically obtain a global variable set associated with a first user at a first time, the global variable set comprising name identifier, portfolio identifier, type, and global user metadata, and first file, wherein the first file comprises at least one of local user metadata and portfolio information, wherein the portfolio information comprises at least one of a set of holdings, orders and/or user notes;
hashing the first file using a hashing algorithm to obtain a first file hash;
algorithmically create a first file entry in a distributed ledger comprising the global variable set and the first file hash at a first time, wherein the creation of the first file entry in the distributed ledger creates a first timestamp associated with the first file entry and a first file transaction ID;
modifying the first file at a second time with a modified dataset, the modified dataset comprising secondary portfolio information different from the information stored in the first file entry to create a modified file;
hashing the modified file using the same hashing algorithm applied to the first file to obtain a modified file hash;
algorithmically create a second file entry in the distributed ledger at a third time, the second file entry comprising the global variable set, the modified file hash, and the first file transaction ID, wherein the creation of the second file entry in the distributed ledger creates a second timestamp associated with the second file entry;
algorithmically obtain a second file at a fourth time, the second file comprising a copy of the modified file;
verify the second file obtained at the fourth time matches the second file entry, wherein the second file obtained at the fourth time is verified by hashing the second file using the same hashing algorithm applied to the first file to obtain a second file hash and searching for the second file hash in the distributed ledger to obtain a verification status in real time;
wherein the verification status provides an indication of authenticity of the second file when the second file hash is determined to be present in the distributed ledger while allowing a user to maintain confidentiality of the first file and modified dataset from the first time until the fourth time;
obtain asset performance data associated with the portfolio information in the first file and modified dataset from a portfolio database;
generate a portfolio performance data set from the asset performance data and the second file; and
cause the second file, the verification status, the portfolio performance data set, and the first and second timestamps to be displayed on a screen.
|