Certificate Guide: Understanding Your Timestamp Certificate
What Your Certificate Contains
Every TimeProof timestamp certificate includes these key fields:
File Information
- File Name: The original file name at time of timestamping
- SHA-256 Hash: The 64-character hexadecimal fingerprint of your exact file
- File Size: The file size at time of hashing
The SHA-256 hash is the most important field. It’s the unique identifier that connects your physical file to the blockchain record. If even a single byte of your file changes, the hash will be completely different.
Blockchain Anchor
- Transaction Hash: The Polygon blockchain transaction ID (starts with
0x) - Block Number: The specific block where the transaction was included
- Block Timestamp: The exact time the block was mined (UTC)
- Smart Contract Address: The TimeProofAnchor contract address
These fields allow anyone to look up your timestamp on the public blockchain. The transaction hash is a direct link to the proof.
Merkle Proof
- Merkle Root: The root hash of the Merkle tree stored on-chain
- Proof Path: The sequence of hashes connecting your file hash to the root
- Leaf Index: Your file’s position in the Merkle tree
The Merkle proof is what allows your individual file to be verified against the single root hash stored on the blockchain. It’s typically a series of 5-15 hashes, depending on the batch size.
Verification
- Polygonscan Link: Direct URL to view the transaction on Polygon’s block explorer
- Verification Instructions: Step-by-step guide to verify independently
Reading Your Certificate
The hash field
SHA-256: e3b0c44298fc1c149afbf4c8996fb924
27ae41e4649b934ca495991b7852b855
This 64-character string is your file’s unique fingerprint. To verify your file hasn’t changed since timestamping:
- Compute the SHA-256 hash of your file using any tool
- Compare it character-by-character with the certificate hash
- They must match exactly — even a single different character means the file has changed
The transaction field
Transaction: 0x7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d
3e4f5a6b7c8d9e0f1a2b3c4d5e6f7a8b
This is your direct reference to the blockchain. You can:
- Copy this value
- Go to polygonscan.com
- Paste it in the search bar
- View the full transaction details: when it was submitted, which block it was included in, and the data it contains
The block timestamp
Block Time: 2025-03-15T14:23:47Z (UTC)
Block: #67,543,210
This is the authoritative timestamp — the time determined by the Polygon network’s consensus mechanism. It’s not set by TimeProof, your computer, or any single entity. It’s the consensus of the entire validator network.
Verifying Your Certificate
Quick verification (30 seconds)
- Go to TimeProof’s verification page
- Drag your original file onto the page
- The system re-hashes your file and checks it against the blockchain
- Green check = verified
Independent verification (5 minutes)
- Re-hash your file:
- Windows:
certutil -hashfile yourfile SHA256 - Mac/Linux:
sha256sum yourfile
- Windows:
- Compare the hash to the certificate — must match exactly
- Check the blockchain: Open the Polygonscan link from the certificate
- Verify the transaction exists and the block timestamp matches
Full cryptographic verification (for experts)
- Re-hash the file
- Walk the Merkle proof: starting from your hash, combine with each sibling hash in the proof path to compute the root
- Compare the computed root against the Merkle root in the blockchain transaction
- If they match, the proof is mathematically valid
Presenting Certificates as Evidence
In a business dispute
Include the certificate alongside a brief explanation:
- “This certificate proves the attached file existed on [date]”
- “Verification: visit [Polygonscan link] to confirm independently”
- “The SHA-256 hash matches the file, confirming it hasn’t been modified”
In legal proceedings
For court use, Legal-Grade certificates are recommended. They include:
- Identity attestation (who created the timestamp)
- A verification guide for judges and attorneys
- Comprehensive evidence packaging
Even standard certificates can be presented with appropriate explanation. The key information to convey:
- What the certificate proves (file existence at a specific time)
- How to verify it (public blockchain, no trust required)
- Why it’s reliable (SHA-256 + immutable blockchain + network consensus)
For compliance audits
Organize certificates chronologically alongside the documents they certify. Auditors should be able to:
- Match each document to its certificate
- Verify any certificate independently
- Confirm the timeline meets compliance requirements
Certificate Storage Best Practices
Always keep certificates with files
Store the certificate in the same directory as the original file. If you move the file, move the certificate too.
Backup both
The certificate is useless without the original file (you need the file to re-hash and verify). The file is less protected without the certificate. Back up both together.
Don’t modify the certificate
The certificate is a reference document with precise values. Don’t edit, reformat, or modify it — doing so could change the data and make verification confusing.
Download promptly
Download your certificate immediately after timestamping and save it locally. While you can re-download from your TimeProof account, having a local copy ensures you’re never dependent on account access.
Test periodically
Every few months, pick a random file and verify its certificate. This confirms:
- Your files haven’t been accidentally modified
- Your certificates are intact and accessible
- You remember the verification process
Use the live product for timestamping and verification.
The company site owns the technical reference. The app handles runtime workflows.