Resources





Formatting CSV File for Upload

The most important part of using VINChainLedger is the correct formatting for your requests. VINChainLedger accepts only .CSV files in a specific format. Fortunately, is easily accessible and straightforward.

Example:

Sample Excel Template With Request Data From Internal Database You Want Uploaded




Save The File As A .CSV.



User Can Open .CSV File in A Word Document To Confirm Correct Formatting



.CSV File is Now in Correct Form To Be Uploaded To VINChainLedger

Notes:

  • No personal information should be uploaded in any form
  • There should be exactly 5 columns in the .CSV file. Any other number of columns will be rejected.
  • The number of characters in the first column is limited to 17
  • The number of characters in other columns after is limited to 50.

Help for Requestees - Insurance Agent/Provider

The most important part of using VINChainLedger is the correct formatting for your requests. VINChainLedger accepts only .CSV files in a specific format. Fortunately, is easily accessible and straightforward


  • No personal information should be uploaded in any form
  • There should be exactly five columns in the .CSV file. Any other number of columns will be rejected.
  • The number of characters in the first column is limited to 17
  • The number of characters in other columns after is limited to 50.


What is SHA-256

SHA-256 is one type of the SHA-2 (Secure Hash Algorithm 2). SHA-256 is a patented cryptographic hash function that outputs a value that is 256 bits long, no matter the bit size of the original string.

A Hash (many types), is a one-way compressible function. Hashing is the process of scrambling raw information to the extent that it cannot reproduce it back to its original form. It takes a piece of information and passes it through a function that performs mathematical operations on the plaintext. This function is called the hash function, and the

You have probably used some form of SHA-2 1000's of times, and haven't realized it. Have you ever logged into a website with a password? If so, you have used a form of SHA-2. All you passwords are stored as hashes.