🔐 Prior-IP Proof Tool

Cryptographically Prove Your Intellectual Property Ownership Before Entering Agreements

Why Use This Tool?

When entering business agreements, partnerships, or collaborations, protecting your prior intellectual property (IP) is crucial. This tool provides cryptographic proof that you possessed specific IP on a specific date—before any collaboration began.

The Problem

Imagine you're about to work with a company, and you're bringing valuable code, designs, or ideas to the table. Later, disputes might arise about:

  • What IP did you already own before the partnership?
  • What was created during the collaboration?
  • Who owns what if things go wrong?

Without proof, these disputes can cost millions in legal fees and lost opportunities.

The Solution

This tool creates an irrefutable timestamp and cryptographic proof that you possessed specific files or folders on a specific date. It works like this:

  1. You package your confidential IP (code, documents, designs, etc.)
  2. The tool generates a unique "fingerprint" (SHA-256 hash) of your files
  3. This fingerprint is digitally signed with your private key
  4. You share the hash and signature with all parties—but NOT the actual files
  5. If a dispute arises later, you can prove you had those exact files on that date

This is the same method used by Google, OpenAI, and major tech companies in multi-billion dollar deals.

How It Protects You

Timestamped Proof

Creates verifiable evidence that you possessed specific IP on a specific date—before negotiations even began.

🔒

Zero Trust Required

You don't need to trust the other party. The cryptographic signature is mathematically verifiable by anyone.

🤐

Keeps Secrets Secret

You share only a hash—not your actual IP. Your confidential files stay private unless there's a dispute.

⚖️

Court-Ready

Cryptographic signatures are admissible in court and nearly impossible to forge or dispute.

🚀

Fast & Simple

Takes less than 60 seconds to generate complete proof. No technical expertise required.

📋

Organized Output

Automatically creates folders with clear instructions for what to send to whom.

Installation (macOS)

📥 Download Script

Direct download:

Download prove-prior-ip.sh

Or view on GitHub: github.com/vantasnerdan/prior-ip

1 Install Homebrew (if not already installed)

Open Terminal and run:

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"

2 Install GnuPG

GnuPG (GPG) is the cryptographic tool that creates digital signatures:

brew install gnupg

3 Download the Script

Download using the button above, or use curl:

curl -O https://raw.githubusercontent.com/vantasnerdan/prior-ip/master/prove-prior-ip.sh

4 Make it Executable

In Terminal, navigate to the script's location and run:

chmod +x prove-prior-ip.sh

How to Use

Basic Usage

Run the script with the path to your IP (file or folder):

./prove-prior-ip.sh --file ~/Documents/my-secret-project

What Happens

  1. GPG Key Generation: If you don't have a GPG key, the script automatically creates a strong 4096-bit RSA key pair (takes ~10-20 seconds)
  2. IP Packaging: Your files are compressed into a secure .tar.gz archive
  3. Hash Generation: A SHA-256 hash (unique fingerprint) is computed
  4. Digital Signature: The hash is signed with your private key
  5. Public Key Export: Your public key is exported for verification
  6. Organized Output: Three folders are created with clear instructions

Output Structure

prior-ip-proof-2025-11-25_YourName/
1_send_to_counterparty_and_lawyers/
hash.txt
hash.txt.asc
public-key.asc
2_KEEP_PRIVATE_OFFLINE/
original-my-secret-project.tar.gz
README_KEEP_SAFE.txt
3_send_to_YOUR_lawyer_for_vault_storage/
[Copy of folder 2]
README_FOR_LAWYER.txt

What to Do Next

🚨 Critical Steps

  1. Send to All Parties: Email the three files in folder 1_send_to_counterparty_and_lawyers/ to:
    • Your business counterparty
    • Your lawyer
    • Their lawyer
  2. Backup Originals: Store folder 2_KEEP_PRIVATE_OFFLINE/ in multiple secure locations:
    • Encrypted USB drive
    • Bank safe deposit box
    • Encrypted cloud storage (optional)
  3. Optional - Lawyer Vault: Send folder 3_send_to_YOUR_lawyer_for_vault_storage/ to your lawyer for professional vault storage

Real-World Example

Scenario: Software Developer Entering Partnership

Situation: Sarah is a developer with a machine learning algorithm. She's about to partner with a company to commercialize it, but wants to ensure they can't later claim they developed the core algorithm.

Action: Before the first meeting, Sarah runs:

./prove-prior-ip.sh --file ~/Projects/ml-algorithm

Result: Sarah sends the hash and signature to the company and both lawyers. The actual code stays private.

Outcome: Six months later, there's a dispute. Sarah reveals her original files, proves the hash matches, and demonstrates she had the algorithm before the partnership began. Case closed.

Cost of tool: Free. Cost without it: Potentially millions in legal fees and lost IP rights.

Technical Details

How It Works

Security Guarantees

Frequently Asked Questions

Do I need to trust the other party?

No! That's the beauty of cryptography. The math doesn't lie, and the signature can't be faked.

What if I lose my private key?

Your proof is still valid—you already sent the signature to all parties on record. However, you won't be able to create new signatures. Back up your GPG keys!

Can they see my confidential files?

Absolutely not. They only receive a hash (fingerprint) and signature. Your actual files stay in folder 2_KEEP_PRIVATE_OFFLINE/.

When do I reveal the actual files?

Only if there's a dispute or legal proceeding. At that point, you reveal the original files, and everyone can verify the hash matches what you sent earlier.

How long does this protection last?

Forever. As long as the emails/records exist showing you sent the hash on a specific date, your proof is valid.

Is this legally binding?

Yes. Digital signatures are legally recognized in most countries under laws like the U.S. ESIGN Act and EU eIDAS Regulation.

When to Use This Tool

💡 Pro Tip

Run this tool before any substantive discussions about your IP. The earlier you establish proof, the stronger your legal position.

Support & Source Code

This tool is open source and free to use. The script is fully auditable—every line of code is visible and can be reviewed by security experts.

🔗 GitHub Repository: github.com/vantasnerdan/prior-ip

📥 Direct Download: prove-prior-ip.sh

Version: 1.3 (GPG 2.5.x compatible)

License: MIT (free for personal and commercial use)

Compatible with: macOS (Homebrew + GPG)