Evidence Capture & Real-Time Tracking

Purpose: show how data becomes admissible evidence before it hits the PoV Gate.

What: commissioning, device identity, signed time windows, and calibration records.

Why: proof starts at the edge; unsigned or uncommissioned devices are not admissible.

What: signed payloads, TLS/mTLS, replay protection (nonces + window IDs), operator file digests.

Why: prevent tampering before evidence is hashed.

What: sorted/minified JSON, fixed units (Wh), fixed types → evidenceHash = SHA-256(blob).

Why: the same reality must hash to the same bytes; PoV equality checks rely on this.

What: duplicate detection, window overlap checks, per-device rate limits, sanity bounds.

Why: stop garbage and floods before attestations count.

What: local aggregation, retry queues, clock drift handling.

Why: reduce latency and data loss without weakening the evidence chain.

What: hashes on-chain; artifacts in S3/IPFS/partner vaults with signed URLs; access logs.

Why: keep PII off-chain while preserving auditability.

Last updated