Internet-Draft PoP Appraisal February 2026
Condrey Expires 18 August 2026 [Page]
Workgroup:
Remote ATtestation procedureS
Internet-Draft:
draft-condrey-rats-pop-appraisal-01
Published:
Intended Status:
Standards Track
Expires:
Author:
D. Condrey
WritersLogic

Proof of Process (PoP): Forensic Appraisal and Security Model

Abstract

This document specifies the forensic appraisal methodology and quantitative security model for the Proof of Process (PoP) framework. It defines how Verifiers evaluate behavioral entropy, perform liveness detection, and calculate forgery cost bounds.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 18 August 2026.

Table of Contents

1. Introduction

The value of Proof of Process (PoP) evidence lies in the Verifier's ability to distinguish biological effort from algorithmic simulation. This document provides the normative framework for forensic appraisal, defining the appraisal logic required to generate a Writers Authenticity Report (WAR).

2. Jitter Seal: Captured Behavioral Entropy

Verifiers appraisal behavioral entropy (jitter) to establish a biological binding to the document.

      jitter-binding = {
          1 => entropy-source,                    ; 1=keystroke, 2=pause, 3=mouse
          2 => bstr,                              ; jitter-digest (compressed)
          3 => bstr .size 32,                     ; hmac-binding to content
      }

2.1. Entropy Thresholds

For a checkpoint to be considered "Biologically Bound," the JitterDigest MUST contain at least a minimum threshold of min-entropy (H_min). For ENHANCED profiles, this protocol RECOMMENDS H_min = 128 bits per 1,000 characters of input.

3. Forensic Assessment Mechanisms

SNR (Signal-to-Noise Ratio) Analysis:
Verifying the 1/f fractal noise signature of human motor signals to detect machine-clocked synthetic injection. Biological noise exhibits non-linear variance that is computationally expensive to simulate.
Cognitive Load Correlation (CLC):
To defeat high-fidelity AI jitter models, Verifiers MUST correlate timing patterns with semantic complexity. Human authors exhibit increased inter-keystroke intervals (IKI) during the composition of high-entropy segments (e.g., complex technical definitions).
Mechanical Turk Detection:
Analyzes intra-checkpoint correlation (C_intra) to detect "robotic pacing"—where an automated system maintains a machine-clocked editing rate regardless of content complexity.
Error Topology Analysis:
Human authors exhibit characteristic patterns: Localized corrections near recent insertions, and fractal self-similarity in revision patterns across different time scales.

4. Forgery Cost Bounds (Quantified Security)

Forgery cost bounds provide a Verifier with a lower bound on the computational resources required to forge an Evidence Packet. The cost (C_total) is computed as:

  C_total = C_vdf + C_entropy + C_hardware

5. Absence Proofs: Negative Evidence

Absence proofs assert that certain events did NOT occur during the monitored session.

Type 1: Computationally-Bound
Verifiable from the evidence chain alone (e.g., "Max single delta size < 100 bytes").
Type 2: Monitoring-Dependent
Requires trust in AE monitoring (e.g., "No content was pasted from unauthorized sources").
Type 3: Environmental
Assertions about system state (e.g., "No debugger attached" or "Hardware temperature remained within T_min/T_max").

6. Tool Receipt Protocol (AI Attribution)

When external tools contribute content, the PoP framework enables a "compositional provenance" model:

  1. Receipt Signing: The Tool signs a "Receipt" containing its identity and a commitment to the generated content.
  2. Binding: The Attester records a PASTE event in the transcript referencing the Tool Receipt.
  3. Countersigning: The Attester binds the Receipt into the next human-driven checkpoint, anchoring the automated work into the linear human effort.

7. Privacy and Inclusivity

Verifiers MUST support Evidence Quantization to mitigate stylometric de-anonymization risks. Additionally, Verifiers MUST support Accessibility Modes for authors using assistive technologies, ensuring they are not systematically excluded.

8. References

8.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.
[RFC9334]
Birkholz, H., Thaler, D., Richardson, M., Smith, N., and W. Pan, "Remote ATtestation procedureS (RATS) Architecture", RFC 9334, DOI 10.17487/RFC9334, , <https://www.rfc-editor.org/info/rfc9334>.

8.2. Informative References

[Goodman2007]
Goodman, A. and V. Zabala, "Using Stylometry for Biometric Keystroke Dynamics", , <https://doi.org/10.1007/978-3-540-77343-6_14>.
[Monrose2000]
Monrose, F. and A. Rubin, "Keystroke dynamics as a biometric for authentication", , <https://doi.org/10.1145/351427.351438>.
[PoP-Protocol]
Condrey, D., "Proof of Process (PoP): Architecture, Evidence Format, and VDF", Work in Progress, Internet-Draft, draft-condrey-rats-pop-protocol-02, , <https://datatracker.ietf.org/doc/html/draft-condrey-rats-pop-protocol-02>.
[Sardar-RATS]
Sardar, M.U., "Security Considerations for Remote ATtestation procedureS (RATS)", , <https://www.researchgate.net/publication/380430034_Security_Considerations_for_Remote_ATtestation_procedureS_RATS>.

Author's Address

David Condrey
WritersLogic Inc
San Diego, California,
United States