<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude"
     version="3"
     docName="draft-condrey-rats-pop-appraisal-00"
     ipr="trust200902"
     category="std"
     consensus="true"
     submissionType="IETF"
     sortRefs="true"
     symRefs="true"
     tocInclude="true"
     tocDepth="4">

  <front>
    <title abbrev="PoP Appraisal">Proof of Process (PoP): Forensic Appraisal and Security Model</title>
    <seriesInfo name="Internet-Draft" value="draft-condrey-rats-pop-appraisal-00"/>
    <author fullname="David Condrey" initials="D." surname="Condrey">
      <organization abbrev="WritersLogic">WritersLogic Inc</organization>
      <address>
        <postal>
          <city>San Diego, California</city>
          <country>United States</country>
        </postal>
        <email>david@writerslogic.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="14"/>

    <area>Security</area>
    <workgroup>Remote ATtestation procedureS</workgroup>

    <keyword>attestation</keyword>
    <keyword>forensics</keyword>
    <keyword>biometrics</keyword>
    <keyword>security economics</keyword>

    <abstract>
      <t>
        This document specifies the forensic appraisal methodology and quantitative security model for the Proof of Process (PoP) framework. It defines how Verifiers evaluate behavioral entropy, perform liveness detection (SNR and Cognitive Load Correlation), and calculate forgery cost bounds. Additionally, it establishes the taxonomy for Absence Proofs and the Tool Receipt protocol for AI attribution within the linear human authoring process.
      </t>
    </abstract>
  </front>

  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>
        The value of Proof of Process (PoP) evidence lies in the Verifier's ability to distinguish biological effort from algorithmic simulation. This document provides the normative framework for forensic appraisal, defining the appraisal logic required to generate a Writers Authenticity Report (WAR).
      </t>
    </section>

    <section anchor="behavioral-entropy">
      <name>Jitter Seal: Captured Behavioral Entropy</name>
      <t>
        Verifiers appraisal behavioral entropy (jitter) to establish a biological binding to the document.
      </t>
      <section anchor="entropy-thresholds">
        <name>Entropy Thresholds</name>
        <t>
          For a checkpoint to be considered "Biologically Bound," the JitterDigest MUST contain at least a minimum threshold of min-entropy (H_min). For ENHANCED profiles, this protocol RECOMMENDS <strong>H_min = 128 bits</strong> per 1,000 characters of input.
        </t>
      </section>
    </section>

    <section anchor="semantic-events">
      <name>Semantic Event Definitions</name>
      <t>
        Verifiers use canonical semantic events to reconstruct the authorship topology:
      </t>
      <dl>
        <dt>INS (Insert):</dt>
        <dd>Content addition at specific offsets.</dd>
        <dt>DEL (Delete):</dt>
        <dd>Range-based content removal (error correction analysis).</dd>
        <dt>MOV (Move):</dt>
        <dd>Content restructuring (high cognitive load indicator).</dd>
        <dt>PASTE (Import):</dt>
        <dd>External source integration (AI agent attribution).</dd>
      </dl>
    </section>

    <section anchor="forensic-assessment">
      <name>Forensic Assessment Mechanisms</name>
      <dl>
        <dt>SNR (Signal-to-Noise Ratio) Analysis:</dt>
        <dd>Verifying the 1/f fractal noise signature of human motor signals to detect machine-clocked synthetic injection.</dd>
        <dt>Cognitive Load Correlation (CLC):</dt>
        <dd>To defeat high-fidelity deepfake jitter, Verifiers MUST correlate timing cadence with semantic complexity (IKIs for complex vs simple segments).</dd>
        <dt>Mechanical Turk Detection:</dt>
        <dd>Analyzing intra-checkpoint correlation (C_intra) to detect "robotic pacing" in automated systems.</dd>
        <dt>QR Presence Challenge (OOB-PC):</dt>
        <dd>Bridging the digital-physical gap via secondary physical devices to ensure a human is in the loop.</dd>
      </dl>
    </section>

    <section anchor="economic-model">
      <name>Forgery Cost Bounds</name>
      <t>
        Verifiers calculate the quantified economic cost (<em>C_total</em>) required to forge an Evidence Packet:
      </t>
      <artwork><![CDATA[
  C_total = C_vdf + C_entropy + C_hardware
      ]]></artwork>
      <ul>
        <li><strong>C_vdf:</strong> Electricity and pro-rated hardware cost for sequential VDF computation.</li>
        <li><strong>C_entropy:</strong> Effort required to synthesize biological noise that satisfies SNR and CLC constraints.</li>
      </ul>
    </section>

    <section anchor="absence-proofs">
      <name>Absence Proofs and Tool Receipts</name>
      <t>
        Specifies the <strong>Tool Receipt Protocol</strong> for AI agent attribution and the three-type taxonomy for negative evidence claims (Computationally-bound, Monitoring-dependent, and Environmental).
      </t>
    </section>

    <section anchor="privacy-and-accessibility">
      <name>Privacy and Inclusivity</name>
      <t>
        To mitigate de-anonymization risks, Verifiers MUST support <strong>Evidence Quantization</strong>. To ensure inclusivity, Verifiers MUST support <strong>Accessibility Modes</strong> for non-typical authors (e.g., motor disabilities).
      </t>
    </section>
  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9334.xml"/>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="PoP-Protocol">
          <front>
            <title>Proof of Process (PoP): Architecture, Evidence Format, and VDF</title>
            <author fullname="David Condrey" initials="D." surname="Condrey"/>
            <date year="2026"/>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-condrey-rats-pop-protocol-01"/>
        </reference>
        <reference anchor="Monrose2000" target="https://doi.org/10.1145/351427.351438">
          <front>
            <title>Keystroke dynamics as a biometric for authentication</title>
            <author fullname="F. Monrose" initials="F." surname="Monrose"/>
            <author fullname="A. Rubin" initials="A." surname="Rubin"/>
            <date year="2000"/>
          </front>
        </reference>
        <reference anchor="Goodman2007" target="https://doi.org/10.1007/978-3-540-77343-6_14">
          <front>
            <title>Using Stylometry for Biometric Keystroke Dynamics</title>
            <author fullname="A. Goodman" initials="A." surname="Goodman"/>
            <author fullname="V. Zabala" initials="V." surname="Zabala"/>
            <date year="2007"/>
          </front>
        </reference>
        <reference anchor="Sardar-RATS" target="https://www.researchgate.net/publication/380430034_Security_Considerations_for_Remote_ATtestation_procedureS_RATS">
          <front>
            <title>Security Considerations for Remote ATtestation procedureS (RATS)</title>
            <author fullname="Muhammad Usama Sardar" initials="M.U." surname="Sardar"/>
            <date year="2024" month="May"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
</rfc>