Who benefits from us?
Intellectual property protection is critical to encourage innovation and culture. Without protection of ideas, businesses and individuals would not reap the full benefits of their inventiveness and would focus less on R&D. Same applies for commercial and marketing materials, where huge investments and business opportunities would be at stake. Similarly, artists would not be fully rewarded for their creations and cultural vitality would suffer as a result. |
Most people are not aware that they own intellectual property. They assume only large organizations with profitable names, logos and brands to protect are the only ones who really have a need to safeguard intangible assets. But the truth is, virtually anything that is written, visually designed, and unique to an individual or organization is intellectual property which means that millions of individuals and businesses own more than they think. |

Understanding the hash
Protecting IP rights requires a third party to intervene as the registrar. When you turn to IP agents or notary services to protect the authorship of your creations, IP costs can be overwhelmingly high. It doesn't need to be so.
In the digital world, an email message, a JPEG image or a MP3 recording are only a few amongst the many digital file types that exist, where a digital file can be described as a set of data comprising a unique distribution of Zeros and Ones. For every individual set of data, a unique digital footprint —a hash— can be obtained by means of a cryptographic hash function. For the hash to be reliable, cryptographic hash functions must have two main properties:
- it is infeasible to modify a file without changing the hash
- it is infeasible to find two different files with the same hash.
When these properties are met, the resulting hash is to all intents and purposes a precise and indubitable representaion of a given file. Accordingly, registering a hash equals registering the file from which the hash was obtained. Simple as that.

Forward your digital content to us to instantly secure authorship proof
Some cutting edge networks allow to store hashes in blockchain databases based on the bitcoin protocol. Although pretty smart and effective, understanding how the blockchain works is, to put it mildly, too much of a challenge for the average person.
Our approach is much simplier and at least as effective: email us your digital files and we'll take care of the rest. When we receive your email we use a public chryptography hash function to obtain unique hashes from the email and from each of its individual attachments, if any. Once we electronically sign and time-stamp the receipt containign a full copy of your email and all associated hashes, your property rights over the data are forever granted and protected.

Time to prove authorship of your digital files
To prove authorship of your files you only need to provide the evidence receipt, in digital format. This receipt contains the original email with its attachments, their hash, and the date in which the receipt was issued. That's all you need.