<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ramirez-rhv-core-00" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RHV Core">Real Human Verification (RHV): A Hardware-Rooted Cryptographic Standard for Human-Origin Visual Evidence</title>
    <seriesInfo name="Internet-Draft" value="draft-ramirez-rhv-core-00"/>
    <author initials="J." surname="Ramirez" fullname="Jonathan Ramírez">
      <organization/>
      <address>
        <email>jonathan.ramirezf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="20"/>
    <area>Security</area>
    <workgroup>None</workgroup>
    <keyword>human-origin</keyword>
    <keyword>visual evidence</keyword>
    <keyword>cryptographic provenance</keyword>
    <keyword>hardware root of trust</keyword>
    <keyword>transparency logs</keyword>
    <abstract>
      <?line 31?>
<t>This document defines Real Human Verification (RHV), a public cryptographic standard for
establishing a constitutional root of trust for direct human-origin visual evidence in the
post-AI era.
RHV specifies cryptographic primitives, hardware-backed capture requirements, and public
transparency logging mechanisms that allow digital photos and videos to prove that they
originate from a physically authenticated human capture pipeline. RHV does not judge
content truth; it defines cryptographically verifiable human-origin capture, tamper-evident
integrity, and publicly auditable provenance chains.
By anchoring visual evidence in hardware roots of trust and append-only transparency logs,
RHV provides a neutral, publicly verifiable foundation for judicial, institutional, and societal
reliance on digital visual evidence across operating systems, cameras, drones, and
sensor-based capture devices.</t>
    </abstract>
  </front>
  <middle>
    <?line 45?>

<section anchor="status-of-this-memo">
      <name>Status of This Memo</name>
      <t>This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP
79.
This document is not an Internet Standard. It is a work in progress and is subject to change.
It may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate
to use this document as reference material or to cite it other than as a “work in progress.”</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Digital visual evidence has historically served as a foundational pillar for legal, institutional,
and societal trust. For over a century, photographs and videos have functioned as primary
instruments for documenting reality, establishing accountability, and preserving historical
truth.
The emergence of generative artificial intelligence has fundamentally altered this trust
model. Synthetic images and videos can now be generated that are visually
indistinguishable from direct human-origin capture, rendering traditional visual verification
methods unreliable. As a result, the evidentiary value of digital visual media is undergoing
rapid erosion across judicial systems, public institutions, media organizations, and digital
platforms.
At present, there exists no public, neutral, and cryptographically verifiable constitutional root
of trust for establishing whether digital visual content originated from a physically
authenticated human capture pipeline. Existing authenticity mechanisms focus primarily on
content provenance, metadata, or platform-level attestations, but do not provide a universal,
hardware-backed, and publicly auditable guarantee of direct human-origin capture.
Real Human Verification (RHV) defines a constitutional cryptographic layer that addresses
this structural deficiency. RHV introduces a public, vendor-neutral, and hardware-rooted
framework for establishing verifiable human-origin capture, tamper-evident integrity, and
publicly auditable provenance chains for digital photos and videos.
By anchoring visual evidence in hardware roots of trust and append-only transparency logs,
RHV establishes a foundational trust primitive upon which operating systems, hardware
manufacturers, browsers, platforms, and legal institutions can build interoperable systems
for visual evidence verification in the post-AI era.</t>
    </section>
    <section anchor="terminology-and-conventions">
      <name>Terminology and Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"
in this document  are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.
The following terms are used throughout this specification:</t>
      <t>RHV (Real Human Verification):
The cryptographic standard defined in this document for establishing
a human-origin root of trust for visual digital evidence.</t>
      <t>Human-Origin Capture:
A capture process in which photons or sensor signals originate from
the physical environment and are acquired by a physically authenticated
sensor pipeline backed by a hardware root of trust.</t>
      <t>CAPTURED Asset:
A photo or video that has been directly acquired through a
Human-Origin Capture process and for which an RHV Proof has been
generated by a hardware-backed secure capture pipeline.</t>
      <t>DERIVED Asset:
Any photo or video that has been transformed, edited, re-encoded,
cropped, composited, or otherwise modified from a CAPTURED asset
or another DERIVED asset. DERIVED assets are not considered direct
human-origin captures, but MAY maintain cryptographically verifiable
provenance links to their originating assets.</t>
      <t>RHV Proof:
A cryptographic statement generated by a secure capture pipeline
that binds a media hash, capture time, and hardware-backed
human-origin attestation into a signed structure.</t>
      <t>Hardware Root of Trust (HRoT):
A tamper-resistant hardware security component (e.g., Secure Enclave,
Trusted Execution Environment (TEE), StrongBox, Trusted Platform
Module (TPM), Secure Element) capable of generating and protecting
cryptographic keys used to attest that media originated from a
physically authenticated sensor pipeline.</t>
      <t>Secure Capture Pipeline:
A hardware-backed data path from sensor to signing environment that
ensures authenticity, integrity, and temporal correctness of captured
visual data.</t>
      <t>Transparency Log:
A publicly verifiable, append-only, cryptographically auditable log
used to anchor RHV Proofs and provide public auditability and
immutability.</t>
      <t>Chain of Provenance:
A cryptographically verifiable sequence of links connecting a
DERIVED asset to its originating CAPTURED asset through signed
transformation statements.</t>
      <t>RHV Anchor ID:
The unique identifier assigned to an RHV Proof once it has been
anchored into a Transparency Log.</t>
    </section>
    <section anchor="problem-statement">
      <name>Problem Statement</name>
      <t>The trustworthiness of digital visual evidence is undergoing a systemic collapse.
Advances in generative artificial intelligence have enabled the creation of synthetic images
and videos that are visually indistinguishable from direct human-origin capture. As a result,
traditional methods for assessing the authenticity of visual media—based on visual
inspection, metadata analysis, or platform-level attestations—are no longer reliable
indicators of physical reality.
Judicial systems, insurers, journalists, scientific institutions, and digital platforms increasingly
face the inability to establish whether a given visual asset represents a physically captured
event or a synthetic fabrication. This erosion of visual evidentiary trust undermines legal due
process, public accountability, and the integrity of historical records.
Current provenance and authenticity frameworks primarily focus on recording
transformations, authorship, or platform-level content attestations. While these approaches
provide valuable context, they do not establish a universal, hardware-backed, publicly
auditable root of trust capable of proving that visual content originated from a physically
authenticated human capture pipeline.
Without such a root of trust, it is cryptographically impossible to distinguish direct
human-origin capture from synthetic generation in a universally verifiable manner. This
structural deficiency constitutes a fundamental gap in the trust architecture of the modern
digital ecosystem.
RHV is designed to address this gap by defining a constitutional cryptographic root of trust
for human-origin visual evidence.</t>
    </section>
    <section anchor="design-goals">
      <name>Design Goals</name>
      <t>RHV is designed as a constitutional trust layer for digital visual evidence. Its design is guided by the following foundational goals.</t>
      <section anchor="hardware-anchored-human-origin-proof">
        <name>Hardware-Anchored Human-Origin Proof</name>
        <t>RHV MUST anchor human-origin verification in hardware roots of trust. Proof of human-origin capture MUST be derived from physically authenticated sensor pipelines backed by tamper-resistant secure elements.</t>
      </section>
      <section anchor="public-verifiability">
        <name>Public Verifiability</name>
        <t>RHV MUST enable any third party to independently verify proofs without reliance on proprietary platforms, closed services, or vendor-specific trust anchors.</t>
      </section>
      <section anchor="chain-of-provenance">
        <name>Chain of Provenance</name>
        <t>RHV MUST support cryptographically verifiable provenance chains linking DERIVED assets to their originating CAPTURED assets, enabling full auditability of transformations.</t>
      </section>
      <section anchor="tamper-evidence">
        <name>Tamper Evidence</name>
        <t>Any modification to an RHV-protected asset MUST be detectable through cryptographic integrity verification.</t>
      </section>
      <section anchor="vendor-neutrality">
        <name>Vendor Neutrality</name>
        <t>RHV MUST NOT depend on any single platform vendor, operating system, or hardware manufacturer. The standard MUST be implementable across heterogeneous ecosystems.</t>
      </section>
      <section anchor="privacy-preservation">
        <name>Privacy Preservation</name>
        <t>RHV MUST minimize the exposure of personal data. Human-origin attestation MUST NOT require user identification, biometric data, or persistent personal identifiers.</t>
      </section>
      <section anchor="scalability">
        <name>Scalability</name>
        <t>RHV MUST be capable of supporting planetary-scale adoption with minimal storage, bandwidth, and computational overhead.</t>
      </section>
      <section anchor="forward-compatibility">
        <name>Forward Compatibility</name>
        <t>RHV MUST support extensibility to accommodate future cryptographic algorithms, hardware roots of trust, and capture device classes.</t>
      </section>
    </section>
    <section anchor="system-overview">
      <name>System Overview</name>
      <t>RHV defines a layered, hardware-anchored architecture for establishing and verifying human-origin visual evidence. The system is composed of three primary layers: Secure Capture, Public Anchoring, and Verification.</t>
      <section anchor="secure-capture-layer">
        <name>Secure Capture Layer</name>
        <t>The Secure Capture Layer operates within devices capable of Human-Origin Capture (e.g., smartphones, cameras, drones, and sensor-based capture hardware). It includes:</t>
        <t>A Secure Capture Pipeline that authenticates sensor-originated data.
A Hardware Root of Trust (HRoT) that generates and protects attestation keys.
A signing environment that produces RHV Proofs binding media hashes, capture time, and human-origin attestation.</t>
        <t>This layer is responsible for producing cryptographically verifiable statements asserting that an asset was directly captured by a physically authenticated sensor pipeline.</t>
      </section>
      <section anchor="public-anchoring-layer">
        <name>Public Anchoring Layer</name>
        <t>The Public Anchoring Layer provides Transparency Logs that:</t>
        <t>Are append-only and publicly auditable.
Anchor RHV Proofs to produce globally verifiable RHV Anchor IDs.
Enable third-party auditability, immutability, and independent verification.</t>
        <t>Transparency Logs form the public memory of RHV, ensuring that proofs cannot be retroactively altered or suppressed without detection.</t>
      </section>
      <section anchor="verification-layer">
        <name>Verification Layer</name>
        <t>The Verification Layer enables any third party to:</t>
        <t>Validate RHV Proof signatures.
Confirm anchoring in Transparency Logs.
Reconstruct Chains of Provenance linking DERIVED assets to their originating CAPTURED assets.
Assess tamper evidence and transformation history.</t>
        <t>This layer is intentionally vendor-neutral and does not require trusted platform intermediaries.</t>
      </section>
      <section anchor="storage-and-scalability-model">
        <name>Storage and Scalability Model</name>
        <t>RHV DOES NOT store visual content.<br/>
RHV stores only cryptographic proofs and transparency anchors.</t>
        <t>Each RHV Proof consists exclusively of cryptographic material, including:</t>
        <ul spacing="normal">
          <li>
            <t>Media Hash: 32 bytes</t>
          </li>
          <li>
            <t>Timestamp: 8 bytes</t>
          </li>
          <li>
            <t>Hardware Attestation Hash: 32 bytes</t>
          </li>
          <li>
            <t>Digital Signatures (dual-root): 128 bytes</t>
          </li>
          <li>
            <t>Log metadata and indexing: approximately 56 bytes</t>
          </li>
        </ul>
        <t>Total (rounded): <strong>256 bytes per proof</strong>.</t>
        <t>Thus, each RHV Proof occupies approximately 256 bytes (0.00025 MB).</t>
        <t>RHV Proofs bind cryptographic hashes to a specific canonical representation of the captured media. Any modification to the media bitstream, including accidental corruption or non-canonical metadata changes, SHALL invalidate the corresponding RHV Proof unless such modifications are explicitly recorded as a DERIVED asset with a signed derivation statement.</t>
        <t>RHV does not attempt to preserve proof validity across arbitrary or untracked modifications. This behavior is intentional and ensures strong tamper-evidence, forensic integrity, and unambiguous origin verification.</t>
        <t>Implementations MAY define canonicalization procedures for media hashing, such as excluding non-semantic metadata or normalizing container-level fields, provided that such procedures are explicitly specified, deterministic, and consistently applied during both proof generation and verification.</t>
        <section anchor="planetary-scale-feasibility">
          <name>Planetary-Scale Feasibility</name>
          <t>At a global adoption scale:</t>
          <ul spacing="normal">
            <li>
              <t><strong>100 million captures/day</strong> → 36.5 billion proofs/year → ~9.3 TB/year</t>
            </li>
            <li>
              <t><strong>1 billion captures/day</strong> → 365 billion proofs/year → ~93 TB/year</t>
            </li>
            <li>
              <t><strong>10 billion captures/day</strong> → 3.65 trillion proofs/year → ~930 TB/year</t>
            </li>
          </ul>
          <t>Using current commodity cloud storage pricing (approximately USD 20 per TB per month), the total annual storage cost for planetary-scale RHV operation remains under:</t>
          <t><strong>USD 300,000 per year for the entire world.</strong></t>
          <t>These estimates are order-of-magnitude approximations.</t>
        </section>
        <section anchor="economic-implication">
          <name>Economic Implication</name>
          <t>RHV storage requirements are several orders of magnitude smaller than conventional content storage and are economically trivial compared to:</t>
          <ul spacing="normal">
            <li>
              <t>social media video storage</t>
            </li>
            <li>
              <t>CDN image caches</t>
            </li>
            <li>
              <t>legal discovery archives</t>
            </li>
            <li>
              <t>surveillance and logging systems</t>
            </li>
          </ul>
          <t>RHV therefore introduces no material economic barrier to planetary-scale deployment.</t>
        </section>
        <section anchor="constitutional-implication">
          <name>Constitutional Implication</name>
          <t>Because RHV stores only cryptographic proofs and not visual content, RHV:</t>
          <ul spacing="normal">
            <li>
              <t>avoids data hoarding</t>
            </li>
            <li>
              <t>avoids privacy risk</t>
            </li>
            <li>
              <t>avoids censorship risk</t>
            </li>
            <li>
              <t>avoids cost centralization</t>
            </li>
            <li>
              <t>remains globally replicable</t>
            </li>
          </ul>
          <t>This ensures RHV can function as a permanent constitutional layer of Internet memory.</t>
        </section>
      </section>
    </section>
    <section anchor="core-cryptographic-primitive">
      <name>Core Cryptographic Primitive</name>
      <t>RHV defines a minimal cryptographic primitive that establishes the foundational proof of human-origin capture and enables public auditability and provenance tracking.</t>
      <t>For any visual media asset, the following primitive is defined:</t>
      <t>H  = HASH(media)
P  = SIGN(HASH_ID || SENSOR_CLASS_ID || H || CAPTURE_TIME || HUMAN_ORIGIN_ATTESTATION)
ID = ANCHOR(P)</t>
      <t>Where:</t>
      <t>HASH_ID is an identifier for the cryptographic hash algorithm used, as defined by the RHV Cryptographic Parameters registry.</t>
      <t>SENSOR_CLASS_ID identifies the class of capture sensor and secure capture pipeline (e.g., smartphone camera, drone camera, body-worn camera, industrial sensor), as asserted by the Hardware Root of Trust.</t>
      <t>Including HASH_ID and SENSOR_CLASS_ID in the signed payload cryptographically binds the proof to a specific cryptographic algorithm and physical capture class, preventing downgrade attacks, algorithm substitution, or sensor class ambiguity.</t>
      <t>The RHV Proof (P) is generated and cryptographically signed prior to anchoring.</t>
      <t>The RHV Anchor ID is generated exclusively by the Transparency Log as a result of the ANCHOR(P) operation. The Anchor ID is an externally assigned reference used for public lookup and auditability and SHALL NOT be considered part of the signed RHV Proof payload.</t>
      <t>The resulting Anchor ID uniquely and immutably references the RHV Proof within a publicly auditable Transparency Log, establishing a constitutional cryptographic root of trust for human-origin visual evidence.</t>
    </section>
    <section anchor="secure-capture-pipeline">
      <name>Secure Capture Pipeline</name>
      <t>The Secure Capture Pipeline defines the mandatory requirements for generating RHV
Proofs from direct human-origin capture.</t>
      <section anchor="pipeline-requirements">
        <name>Pipeline Requirements</name>
        <t>Implementations SHALL use a hardware-backed secure capture pipeline that ensures that
sensor-originated data cannot be injected, replayed, or modified prior to attestation.
A Secure Capture Pipeline MUST:
Authenticate sensor-originated data using hardware-enforced mechanisms (e.g.,
secure MIPI CSI channels, secure ISP validation).
Execute cryptographic operations within a Hardware Root of Trust (HRoT).
Generate cryptographically verifiable capture timestamps.
Prevent post-capture modification prior to RHV Proof generation.</t>
      </section>
      <section anchor="attestation-generation">
        <name>Attestation Generation</name>
        <t>For each CAPTURED asset, the Secure Capture Pipeline SHALL generate a
HUMAN
ORIGIN
ATTESTATION that asserts:
_
_
The asset was captured by a physically authenticated sensor pipeline.
The capture occurred within a secure hardware environment.
The capture timestamp was generated by a trusted time source.
The attestation SHALL be signed using hardware-protected keys that are non-exportable
and tamper-resistant.</t>
      </section>
      <section anchor="non-spoofability">
        <name>Non-Spoofability</name>
        <t>Implementations SHALL reject any media that cannot be cryptographically bound to an
authenticated sensor pipeline. Media injected, replayed, or synthesized outside the secure
capture pipeline MUST NOT produce valid RHV Proofs.</t>
      </section>
      <section anchor="physical-signal-integrity-and-analog-validation">
        <name>Physical Signal Integrity and Analog Validation</name>
        <t>To mitigate sensor injection and replay attacks, RHV-compliant
implementations SHOULD employ physical layer authentication mechanisms.
Secure Sensor Channel:
Raw sensor data MUST be authenticated and/or encrypted at the sensor
interface (e.g., MIPI CSI-2 secure modes) prior to transmission to the SoC.
Analog Noise and Jitter Analysis:
The Secure ISP SHALL perform statistical analysis of sensor-specific
physical noise characteristics (including fixed-pattern noise and thermal
noise) to detect synthetic or replayed signals.
Timing Attestation:
The TEE SHALL validate that frame timing and jitter correspond to
physical sensor behavior.
Signals failing physical consistency validation MUST be rejected.</t>
      </section>
    </section>
    <section anchor="secure-capture-pipeline-1">
      <name>Secure Capture Pipeline</name>
      <t>The Secure Capture Pipeline defines the mandatory requirements for generating RHV Proofs from direct human-origin capture.</t>
      <section anchor="pipeline-requirements-1">
        <name>Pipeline Requirements</name>
        <t>Implementations SHALL use a hardware-backed secure capture pipeline that ensures sensor-originated data cannot be injected, replayed, or modified prior to attestation.</t>
        <t>A Secure Capture Pipeline MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Authenticate sensor-originated data using hardware-enforced mechanisms (e.g., secure MIPI CSI channels, secure ISP validation).</t>
          </li>
          <li>
            <t>Execute cryptographic operations within a Hardware Root of Trust (HRoT).</t>
          </li>
          <li>
            <t>Generate cryptographically verifiable capture timestamps.</t>
          </li>
          <li>
            <t>Prevent post-capture modification prior to RHV Proof generation.</t>
          </li>
        </ul>
      </section>
      <section anchor="attestation-generation-1">
        <name>Attestation Generation</name>
        <t>For each CAPTURED asset, the Secure Capture Pipeline SHALL generate a <strong>HUMAN_ORIGIN_ATTESTATION</strong> asserting that:</t>
        <ul spacing="normal">
          <li>
            <t>The asset was captured by a physically authenticated sensor pipeline.</t>
          </li>
          <li>
            <t>The capture occurred within a secure hardware execution environment.</t>
          </li>
          <li>
            <t>The capture timestamp was generated by a trusted time source.</t>
          </li>
        </ul>
        <t>The attestation SHALL be signed using hardware-protected keys that are non-exportable and tamper-resistant.</t>
      </section>
      <section anchor="non-spoofability-1">
        <name>Non-Spoofability</name>
        <t>Implementations SHALL reject any media that cannot be cryptographically bound to an authenticated sensor pipeline.</t>
        <t>Media injected, replayed, or synthesized outside the secure capture pipeline MUST NOT produce valid RHV Proofs.</t>
      </section>
      <section anchor="physical-signal-integrity-and-analog-validation-1">
        <name>Physical Signal Integrity and Analog Validation</name>
        <t>To mitigate sensor injection and replay attacks, RHV-compliant implementations SHOULD employ physical layer authentication mechanisms.</t>
        <section anchor="secure-sensor-channel">
          <name>Secure Sensor Channel</name>
          <t>Raw sensor data MUST be authenticated and/or encrypted at the sensor interface (e.g., MIPI CSI-2 secure modes) prior to transmission to the System on Chip (SoC).</t>
        </section>
        <section anchor="analog-noise-and-jitter-analysis">
          <name>Analog Noise and Jitter Analysis</name>
          <t>The Secure Image Signal Processor (ISP) SHALL perform statistical analysis of sensor-specific physical noise characteristics, including fixed-pattern noise and thermal noise, to detect synthetic or replayed signals.</t>
        </section>
        <section anchor="timing-attestation">
          <name>Timing Attestation</name>
          <t>The Trusted Execution Environment (TEE) SHALL validate that frame timing and jitter correspond to physical sensor behavior.</t>
          <t>Signals failing physical consistency validation MUST be rejected.</t>
        </section>
      </section>
    </section>
    <section anchor="hardware-root-of-trust">
      <name>Hardware Root of Trust</name>
      <t>RHV relies on Hardware Roots of Trust (HRoT) to anchor human-origin attestation in tamper-resistant physical hardware.</t>
      <section anchor="root-of-trust-requirements">
        <name>Root of Trust Requirements</name>
        <t>An HRoT MUST:</t>
        <ul spacing="normal">
          <li>
            <t>Protect private attestation keys against extraction.</t>
          </li>
          <li>
            <t>Execute cryptographic operations in an isolated, tamper-resistant environment.</t>
          </li>
          <li>
            <t>Provide secure key storage and attestation services.</t>
          </li>
          <li>
            <t>Support secure boot and firmware integrity validation.</t>
          </li>
        </ul>
        <t>Examples of acceptable HRoT implementations include Secure Enclave, Trusted Execution Environments (TEE), StrongBox, Trusted Platform Modules (TPM), and dedicated Secure Elements.</t>
      </section>
      <section anchor="device-attestation-keys">
        <name>Device Attestation Keys</name>
        <t>Each compliant device SHALL possess one or more hardware-protected attestation keys used exclusively for RHV Proof generation.</t>
        <t>These keys:</t>
        <ul spacing="normal">
          <li>
            <t>MUST NOT be exportable.</t>
          </li>
          <li>
            <t>MUST be generated and stored within the HRoT.</t>
          </li>
          <li>
            <t>MUST support revocation and rotation mechanisms.</t>
          </li>
        </ul>
      </section>
      <section anchor="physical-capture-assertion">
        <name>Physical Capture Assertion</name>
        <t>The HRoT SHALL provide a cryptographic assertion that the signed media originated from a physically authenticated sensor pipeline and was not synthetically generated or externally injected.</t>
      </section>
      <section anchor="dual-public-root-attestation">
        <name>Dual Public Root Attestation</name>
        <t>RHV SHALL employ a dual-root attestation model.</t>
        <t>Each RHV Proof SHALL be signed by:</t>
        <ul spacing="normal">
          <li>
            <t>A device Hardware Root of Trust attesting physical capture.</t>
          </li>
          <li>
            <t>A public RHV network root attesting public anchoring.</t>
          </li>
        </ul>
        <t>This dual attestation prevents isolated device forgeries, private log suppression, and unverifiable local-only proofs.</t>
      </section>
    </section>
    <section anchor="transparency-log">
      <name>Transparency Log</name>
      <t>RHV defines a public Transparency Log as a foundational component for anchoring RHV Proofs and enabling independent auditability.</t>
      <section anchor="log-properties">
        <name>Log Properties</name>
        <t>A Transparency Log MUST be:</t>
        <ul spacing="normal">
          <li>
            <t>Append-only.</t>
          </li>
          <li>
            <t>Publicly readable.</t>
          </li>
          <li>
            <t>Cryptographically verifiable.</t>
          </li>
          <li>
            <t>Resistant to retroactive modification.</t>
          </li>
          <li>
            <t>Replicable across independent operators.</t>
          </li>
        </ul>
        <t>The log SHALL support inclusion proofs and consistency proofs to allow third parties to independently audit log integrity.</t>
      </section>
      <section anchor="anchoring-operation">
        <name>Anchoring Operation</name>
        <t>The <tt>ANCHOR(P)</tt> operation appends a previously generated and signed RHV Proof <tt>P</tt> into a Transparency Log and returns a globally unique RHV Anchor ID.</t>
        <t>The RHV Anchor ID is generated exclusively by the Transparency Log upon successful inclusion of the signed proof. The Anchor ID is an externally assigned reference used for public lookup and auditability and SHALL NOT be considered part of the RHV Proof signature or payload.</t>
      </section>
      <section anchor="public-auditability">
        <name>Public Auditability</name>
        <t>Any party MAY audit the Transparency Log to verify:</t>
        <t>That a given RHV Proof has been anchored.
That the log has not been modified, truncated, or forked.
That inclusion proofs and consistency proofs are valid.</t>
      </section>
    </section>
    <section anchor="capture-modes">
      <name>Capture Modes</name>
      <t>RHV defines two normative capture modes to distinguish direct physical capture from subsequent transformations.</t>
      <section anchor="captured">
        <name>CAPTURED</name>
        <t>A <strong>CAPTURED</strong> asset is a photo or video that originates from a Secure Capture Pipeline and has an RHV Proof anchored in a Transparency Log.</t>
        <t>CAPTURED assets represent the cryptographic root of a provenance chain and are considered direct human-origin captures.</t>
        <t>Only CAPTURED assets establish new human-origin roots.</t>
      </section>
      <section anchor="derived">
        <name>DERIVED</name>
        <t>A <strong>DERIVED</strong> asset is any asset that results from transformation of a CAPTURED asset or another DERIVED asset, including but not limited to:</t>
        <ul spacing="normal">
          <li>
            <t>Cropping</t>
          </li>
          <li>
            <t>Editing</t>
          </li>
          <li>
            <t>Compositing</t>
          </li>
          <li>
            <t>Re-encoding</t>
          </li>
          <li>
            <t>Resizing</t>
          </li>
          <li>
            <t>Color correction</t>
          </li>
          <li>
            <t>Montage</t>
          </li>
          <li>
            <t>Synthesis operations</t>
          </li>
        </ul>
        <t>DERIVED assets MUST NOT be treated as direct human-origin captures. However, they MAY maintain cryptographically verifiable provenance links to their originating assets.</t>
        <t>Each DERIVED asset SHALL produce a signed derivation statement linking it to its parent asset, forming a publicly auditable Chain of Provenance.</t>
      </section>
      <section anchor="human-derived-provenance-lineage">
        <name>Human-Derived Provenance Lineage</name>
        <t>RHV defines a <strong>Lineage Chain (LC)</strong> as a sequence of cryptographic assertions anchored to a <strong>Root Human Event (RHE)</strong>.</t>
        <section anchor="root-human-event-rhe">
          <name>Root Human Event (RHE)</name>
          <t>The initial CAPTURED asset signed within a Hardware Root of Trust.</t>
        </section>
        <section anchor="derived-assertions">
          <name>Derived Assertions</name>
          <t>Any subsequent modification (including but not limited to cropping, color grading, temporal editing, re-encoding, compositing, or synthesis) MUST be recorded as a new derivation statement referencing the parent asset hash.</t>
          <t>RHV DOES NOT evaluate the semantic intent or legitimacy of transformations. Instead, it provides a cryptographically verifiable traceability path.</t>
          <t>In judicial or institutional contexts, an auditor SHALL be able to reconstruct the full lineage of an asset.</t>
          <t>If the lineage chain is broken or contains unauthenticated synthetic generation steps, the asset MUST be classified as <strong>UNVERIFIED</strong>.</t>
        </section>
      </section>
    </section>
    <section anchor="verification-process">
      <name>Verification Process</name>
      <t>RHV defines a public verification process that allows any party to independently validate human-origin capture, integrity, and provenance of a visual asset.</t>
      <section anchor="proof-validation">
        <name>Proof Validation</name>
        <t>To verify an RHV-protected asset, a verifier SHALL perform the following steps:</t>
        <t>Validate the RHV Proof structure and digital signatures, including verification of the hardware-backed attestation and the public anchoring signature.</t>
        <t>Confirm anchoring of the RHV Proof in a Transparency Log using inclusion and consistency proofs.</t>
        <t>Upon successful validation of the RHV Proof, compute H = HASH(media).</t>
        <t>Verify that the computed media hash matches the hash bound within the validated RHV Proof.</t>
      </section>
      <section anchor="provenance-reconstruction">
        <name>Provenance Reconstruction</name>
        <t>For DERIVED assets, a verifier SHALL reconstruct the Chain of Provenance by:</t>
        <ul spacing="normal">
          <li>
            <t>Validating each signed derivation statement.</t>
          </li>
          <li>
            <t>Confirming that each link references a valid parent asset.</t>
          </li>
          <li>
            <t>Ensuring that the chain terminates in a CAPTURED asset.</t>
          </li>
        </ul>
      </section>
      <section anchor="determination-of-origin-class">
        <name>Determination of Origin Class</name>
        <t>Upon successful verification, an asset SHALL be classified as one of the following:</t>
        <t><strong>CAPTURED</strong> — Direct human-origin capture.
<strong>DERIVED-N</strong> — Nth-order derivation from a CAPTURED asset.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>RHV is designed to establish verifiable human-origin capture while preserving individual
privacy and minimizing personal data exposure.</t>
      <section anchor="data-minimization">
        <name>Data Minimization</name>
        <t>RHV MUST NOT require the collection, storage, or disclosure of:
Personally identifiable information (PII)
Biometric identifiers
User account identifiers
Persistent device identifiers
Location data beyond cryptographically necessary timing information
RHV Proofs SHALL contain only the minimum cryptographic material required to establish
origin, integrity, and provenance.</t>
      </section>
      <section anchor="pseudonymous-hardware-attestation">
        <name>Pseudonymous Hardware Attestation</name>
        <t>Hardware-backed attestation keys SHALL be pseudonymous and non-linkable across
independent capture events, except where explicitly required for revocation or security
maintenance. Implementations SHOULD support key rotation to prevent long-term device
correlation.</t>
      </section>
      <section anchor="no-behavioral-tracking">
        <name>No Behavioral Tracking</name>
        <t>RHV MUST NOT introduce behavioral tracking, profiling, or persistent surveillance
capabilities. Transparency Logs record cryptographic proofs only and do not store user
activity histories, content payloads, or personal metadata.</t>
      </section>
      <section anchor="selective-disclosure">
        <name>Selective Disclosure</name>
        <t>Implementations MAY support selective disclosure mechanisms allowing holders of
RHV-protected assets to disclose only those provenance elements necessary for verification
in specific legal, institutional, or contractual contexts.</t>
      </section>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <t>RHV defines a comprehensive threat model addressing adversarial attempts to forge, alter, suppress, or misrepresent human-origin visual evidence.</t>
      <section anchor="synthetic-media-injection">
        <name>Synthetic Media Injection</name>
        <t>An adversary may attempt to generate synthetic images or videos and falsely present them as human-origin captures.</t>
        <t><strong>Mitigation:</strong></t>
        <t>RHV relies on Hardware Roots of Trust (HRoT) to ensure that only media originating from physically authenticated sensor pipelines can generate valid RHV Proofs. Media generated outside a secure capture pipeline MUST NOT produce valid proofs.</t>
      </section>
      <section anchor="sensor-injection-attacks">
        <name>Sensor Injection Attacks</name>
        <t>An adversary may attempt to inject replayed or synthetic data directly into the sensor data path.</t>
        <t><strong>Mitigation:</strong></t>
        <t>Implementations SHALL use secure sensor channels, secure Image Signal Processors (ISPs), and hardware-backed attestation mechanisms to reject unauthenticated sensor-originated data.</t>
      </section>
      <section anchor="local-only-proof-forgery">
        <name>Local-Only Proof Forgery</name>
        <t>An adversary may attempt to create locally valid but publicly unverifiable proofs, bypassing public auditability.</t>
        <t><strong>Mitigation:</strong></t>
        <t>RHV SHALL employ a dual-root attestation model. Each RHV Proof SHALL be signed by:</t>
        <t>A device Hardware Root of Trust attesting physical capture
A public RHV Network Root attesting public anchoring</t>
        <t>This dual attestation model prevents isolated device forgeries and unverifiable local-only proofs.</t>
      </section>
      <section anchor="log-suppression-or-forking">
        <name>Log Suppression or Forking</name>
        <t>An adversary may attempt to suppress, truncate, or fork Transparency Logs.</t>
        <t><strong>Mitigation:</strong></t>
        <t>Transparency Logs SHALL support public replication, inclusion proofs, and consistency proofs, enabling independent detection of suppression, truncation, or divergence.</t>
      </section>
      <section anchor="replay-and-substitution-attacks">
        <name>Replay and Substitution Attacks</name>
        <t>An adversary may attempt to reuse valid RHV Proofs for different media assets.</t>
        <t><strong>Mitigation:</strong></t>
        <t>Each RHV Proof cryptographically binds the media hash, capture time, and hardware-backed attestation, preventing substitution, replay, or reassignment to different media.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>RHV establishes a constitutional cryptographic root of trust for human-origin visual evidence by combining hardware-backed attestation, public transparency anchoring, and cryptographically verifiable provenance chains.</t>
      <section anchor="hardware-integrity">
        <name>Hardware Integrity</name>
        <t>All cryptographic operations used to generate RHV Proofs MUST be executed within a Hardware Root of Trust (HRoT).
Private attestation keys MUST NOT be exportable and MUST be protected by tamper-resistant hardware.</t>
      </section>
      <section anchor="dual-root-trust-enforcement">
        <name>Dual-Root Trust Enforcement</name>
        <t>RHV Proofs MUST include dual-root attestation consisting of:
- A hardware root of trust attesting physical capture
- A public RHV network root attesting public anchoring
Both roots are REQUIRED for an RHV Proof to be considered valid.</t>
      </section>
      <section anchor="cryptographic-agility">
        <name>Cryptographic Agility</name>
        <t>Implementations SHALL support algorithm agility to allow migration to successor cryptographic primitives without invalidating existing proofs.</t>
      </section>
      <section anchor="log-replication-and-survivability">
        <name>Log Replication and Survivability</name>
        <t>Transparency Logs SHALL be replicable across independent operators to ensure survivability, censorship resistance, and global auditability.</t>
      </section>
      <section anchor="revocation">
        <name>Revocation</name>
        <t>RHV SHALL support revocation mechanisms for compromised devices, attestation keys, or Transparency Log operators.
Revocation events MUST be publicly auditable.
Revocation in RHV applies exclusively to cryptographic attestation keys or trust roots, not to users, personal identities, or persistent device identifiers.
RHV does not require globally persistent device identifiers. Revocation is achieved through the invalidation of compromised attestation keys, key epochs, or trust roots, consistent with established public-key infrastructure and hardware attestation models. This approach preserves privacy while enabling effective and publicly auditable revocation.</t>
      </section>
    </section>
    <section anchor="governance-neutrality">
      <name>Governance &amp; Neutrality</name>
      <t>RHV is maintained by a private neutral steward organization responsible for preserving the
integrity, neutrality, and continuity of the RHV specification.
The RHV specification is a public, vendor-neutral constitutional standard. No single vendor,
platform, government, or commercial entity has privileged control over the RHV protocol.
All changes to the RHV specification SHALL be subject to public technical review,
cryptographic scrutiny, and documented consensus processes.
Implementations of RHV MAY be open-source or proprietary. The RHV specification itself is
public and freely implementable by any party without licensing restrictions.
The RHV steward organization MAY provide commercial services, infrastructure, verification
endpoints, certification programs, and compliance tooling, provided such services do not
compromise the neutrality, openness, or auditability of the RHV protocol.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines an optional registry request.
The authors propose the creation of a new IANA registry:
Registry Name: RHV Cryptographic Parameters
Registration Procedure: Specification Required (RFC 8126)
Initial Entries:
0x01 — SHA-256 (Mandatory)
0x02 — BLAKE3 (Optional)
0x03 — Ed25519 (Digital Signature)</t>
    </section>
    <section anchor="references">
      <name>References</name>
      <t>Normative References
RFC 2119 — Key words for use in RFCs to Indicate Requirement Levels
RFC 6962 — Certificate Transparency
FIPS 186-4 — Digital Signature Standard
NIST SP 800-53 — Security and Privacy Controls
ISO/IEC 27001 — Information Security Management
WebAuthn (W3C)
C2PA Specification
Informative References
Secure Enclave Architecture (Apple)
Android StrongBox / TEE Architecture
MIPI CSI-2 Secure Channel Specification
TPM 2.0 Specification
Certificate Transparency Logs</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner">
            <organization/>
          </author>
          <date year="1997"/>
        </front>
        <seriesInfo name="RFC" value="2119"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
