SlideShare a Scribd company logo
1 of 15
Download to read offline
PoH
Consensus
page 2
PoH Consensus
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
Table of Contents
Table of Contents							 Page 3
PoH What is PoH? 							 Page 4
PoH a Simplified Explanation Diagram 				 Page 4
The Node Network							 Page 5
How Does It Work, Level 3 - Collection phase Page 6
Level 1 – Diagram 							 Page 6
Level 2 - Aggregation phase part 1 					 Page 7
Level 2 – Diagram 							 Page 7
Level 1 - Aggregation phase part 2					 Page 8
Level 1 – Diagram 							 Page 8
The Full PoH Explanatory Diagram Part 1 				 Page 9
Master Hash Phase
Level 1 - Signing phase round 1 					 Page 10
Signing phase 1 Diagram						 Page 10
Level 1 - Signing phase round 2 					 Page 11
Signing phase 2 Diagram 						 Page 11
Level 1 - Adding phase 						 Page 12
Adding phase Diagram 						 Page 12
The Full PoH Explanatory Diagram Part 2 Page 13
How does PoH provide trustable proof 				 Page 14
Glossary of Terms 							 Page 15
PoH consensus
What is PoH PoH stands for Proof of Hash, it is a network consensus protocol that provides trustable unalterable
proof of the existence of a data subset at a given moment in time.
The PoH consensus protocol is not used to validate any data, it is only used to provide proof of integrity and
existence of (any type of) data.
Average checkpoint
An average checkpoint gets lots of inputs from various users
and these inputs are inseparable from each other. So each
unique original input helps creating a more secure final hash.
These various data inputs are mixed and protecting each
other.
For example User 1 creates a data fingerprint using its own
digital signature. If User 2 does the same and uses these
two inputs, the system creates a third fingerprint and then
this third fingerprint makes it impossible for User 1 and User
2 to repeat the same process using other input.
User 1
Input 1
User n
Input n
User 4
Input 4 User 3
Input 3
User 2
Input 2
.
.
.
.
.
Simplified PoH explanation
User 1 User 2 User 3 User 4 User 5 User 6 User 7 User 8
User 1 User 2 User 3 User 4 User 5 User 6 User 7 User 8
L2 checkpoint 1 L2 checkpoint 1 L2 checkpoint 1
L3 checkpoint 1 L3 checkpoint 2 L3 checkpoint 3 L3 checkpoint 4
PoH
Result
Result
Result Result Result
page xy
page 4
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
The node network
PoH relies on a network of trusted nodes executing the various tasks that make up the consensus protocol. In the
AnuuTech network the nodes are divided in 3 different levels each responsible for a part of the consensus protocol.
In the AnuuTech network the third level of nodes is the collection layer, users that want to use the PoH service will
interact with the nodes on this layer. The second level of nodes is the aggregation layer where all the data collected
by the third layer is compressed into smaller packages. This layer also serves as a barrier between the third layer
which is accessible by the network users and the first layer where the eventual consensus is reached. This will help
prevent the possibility for network users to interfere with the consensus process. In the first layer the nodes will reach
a consensus on the data collected by the third layer and aggregated by the second layer, and the result of the
consensus will be made available for the rest of the network. The operations that need to be executed are done by
virtual “checkpoints”hostedonthenodenetwork.
The hosting of each checkpoints is assigned in a pseudo random fashion, partially based on the result of the previous
outcome of the consensus round and the certificates issued to the nodes, after each consensus round. Multiple
checkpoints can be assigned to the same physical nodes should there not be enough physical nodes for all the
checkpoints.
page xy
page 5
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
How does it work?
Consensus phase
Level 3 - Collection phase
When a user wants to use the PoH service, they will present a subset of data to the third node level. The checkpoint
selected to handle this request is directly related to the data. The checkpoint will create a time stamped data finger-
print for the data based on the checkpoints unique certificate and the current network time, add this time stamped
data fingerprint to its collection and the shared temporary storage for the current time period, and provide this
fingerprint to the network user. The user (1) will present this time stamped data fingerprint to a second checkpoint
(5), selected based on the fingerprint , on the third level which will verify if the time stamped data fingerprint was
created by the correct checkpoint (3) on the third level and if it exists in the shared storage. The number of secondary
checkpoints that will collect/verify the time stamped data fingerprint can vary depending on the consensus rules for
the network. All checkpoints on the third level will collect the timestamped data fingerprint (4) they either generated
or veried for the duration of the specic time period (n).
Once a user (1), receives a timestamped data fingerprint , they will have a temporary proof of data integrity, however,
to get full confirmation the master hash for the time period of the time stamped data fingerprint needs to be added
to the shared storage for the PoH consensus protocol and the time stamped data fingerprint needs to be used in the
calculation of the master hash. The time required for full confirmation is n x 4.
p
r
e
s
e
n
t
s
t
h
e
T
S
D
F
P
(
4
)
5. Checkpoint 2 (which verifies)
3. Checkpoint 1 adds TSDFP to
n
1. Users
Checkpoint 1 collection
Checkpoint 1 shared storage
4. TSDFP
2. LVL-3 Node
directly
related
s
h
a
r
e
data with checkpoint
s
e
l
e
c
t
e
d
crea
t
e
s
s
h
a
r
e
s
with
if the TSDFP (4) was created by the correct
checkpoint on the third level (3)
if the TSDFP (4) exists in the shared storage
to handle
r
e
q
u
e
s
t
based on the checkpoint’s unique certificate(3)
and the current network time
Nodes
Checkpoints
TSDFP
(Time Stamped Data FingerPprints)
Collection
Shared Storage
page xy
page 6
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
Level 2 - Aggregation phase part 1
All checkpoints on the third level will aggregate (6) the time stamped data fingerprints they collected during the time
period (n) and hash the collection. The checkpoints on the third level will send the collection hash (7) to a checkpoint
on the second level, selected based on the collection signature. The checkpoints on the second level will verify (8) the
consensus for the time stamped data fingerprints included in the collection and provide a collection fingerprint,
based on the unique certificate of the second level checkpoint and the current network time. The checkpoint on the
second level will add this collection (9) fingerprint to its collection for the current time period and the shared storage
and provide this collection fingerprint to the checkpoint on the third level that had sent the collection. The check-
point on the third level will send the collection fingerprint to a second checkpoint on the second level (10), selected
based on the created collection fingerprint, which will verify if the collection fingerprint was created by the correct
checkpoint on the second level and if it exists in the shared storage. The number of secondary checkpoints that will
collect/verify the collection fingerprint can vary depending on the consensus rules for the network.
All checkpoints of the second level will collect all the collection fingerprints (11) they either created or verified for the
duration of the specific time period (n).
all TSD
F
P
s
7.agg
r
e
g
a
t
e
hash
t
h
e
m
6. Checkpoints of LVL-3
verifies the consensus for the TSDFP
included in the collection
8. Checkpoint of LVL-2
and send
c
o
l
l
e
c
t
i
o
n
to a
L
V
L
-
2
10. Checkpoint 2 of LVL-2 which verifies
added to LVL-2 checkpoint
fingerprint collection
9. Collection fingerprint
if the Collection fingerprint (9) was created
by the correct checkpoint on the second level
if the Collection fingerprint (9) exists in the
shared storage
11. Checkpoints of LVL-2
collect/verify the collection fingerprint
Nodes
Checkpoints
TSDFP
(Time Stamped Data FingerPprints)
Collection
Shared Storage
page xy
page 7
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
Level 1 - Aggregation phase part 2
All checkpoints on the second level will aggregate the collections they collected during the time period (n) and hash
of the new collection (12). The checkpoints on the second level will send the new collection hash to a checkpoint on
the first level, selected based on the new collection signature. The checkpoints on the first level will verify the consen-
sus for the collections included in the new collection and the consensus for the digital fingerprints included in the
collection, (13) and provide a consensus fingerprint, based on the unique certificate of the first level checkpoint and
the current network time. The checkpoint on the first level will add this consensus fingerprint to its collection for the
current time period and the shared storage and provide this collection fingerprint to the checkpoint on the second
level (14 Page 9) that had sent the new collection. The checkpoint on the second level will send the consensus finger-
print to a second checkpoint on the first level, selected based on the created consensus fingerprint, which will verify if
the consensus fingerprint was created by the correct checkpoint on the first level and if it exists in the shared storage
(15). The number of secondary checkpoints that will collect/verify the consensus fingerprint can vary depending on
the consensus rules for the network.
All checkpoints of the first level will collect all the consensus fingerprints they either created or verified for the dura-
tion of the specific time period (n) (16).
Nodes
Checkpoints
TSDFP
(Time Stamped Data FingerPprints)
Collection
Shared Storage
p
r
o
v
i
d
e
verifies the consensus for the collections included in the new collection
and the consensus for the digital fingerprints included in the collection
12. Checkpoint of LVL-1
based on the unique certificate of the first level
checkpoint (12) and the current network time
based on the created consensus fingerprint (13)
13. Consensus fingerprint
16. Checkpoints of LVL-1
collect all the consensus fingerprints they either created
or verified for the duration of the specific time period (n).
15. Checkpoint 2 of LVL-1 which verifies
(added to LVL-1 checkpoint fingerprint collection)
if the consensus fingerprint (13) was created
by the correct checkpoint on the first level (12)
if the consensus fingerprint (13) exists
in the shared storage
page xy
page 8
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
Nodes
Checkpoints
1 2 3
TSDFP
(Time Stamped Data FingerPprints)
Collection
Shared Storage
Levels
PoH Full Explanatory Diagram Part 1
s
e
n
d
s
t
h
e
c
o
n
s
e
n
s
u
s
f
i
n
g
e
r
p
r
i
n
t
hash the
co
l
l
e
c
t
i
o
n
provide
thi
s
c
o
l
l
e
c
t
i
o
n
f
i
n
g
e
r
p
r
i
n
t
t
o
t
h
e
c
h
e
c
k
p
o
i
n
t
p
r
e
s
e
n
t
s
t
h
e
T
S
D
F
P
(
4
)
5. Checkpoint 2 (which verifies)
3. Checkpoint 1 adds TSDFP to
n
1. Users
Checkpoint 1 collection
Checkpoint 1 shared storage
4. TSDFP
2. LVL-3 Node
directly
related
s
h
a
r
e
data with checkpoint
s
e
l
e
c
t
e
d
crea
t
e
s
s
h
a
r
e
s
with
all TSD
F
P
s
7.agg
r
e
g
a
t
e
s
e
n
d
s
t
h
e
c
o
l
l
e
c
t
i
o
n
f
i
n
g
e
r
p
r
i
n
t
(
9
)
and send it to a checkpoi
n
t
o
n
t
h
e
f
i
r
s
t
l
e
v
e
l
hash
t
h
e
m
p
r
o
v
i
d
e
if the TSDFP (4) was created by the correct
checkpoint on the third level (3)
if the TSDFP (4) exists in the shared storage
6. Checkpoints of LVL-3
verifies the consensus for the TSDFP
included in the collection
8. Checkpoint of LVL-2
verifies the consensus for the collections included in the new collection
and the consensus for the digital fingerprints included in the collection
12. Checkpoint of LVL-1
and send
c
o
l
l
e
c
t
i
o
n
to a LVL-2
c
h
e
c
k
p
o
i
n
t
p
r
o
v
ides this collection fingerprint (9) to the checkpoint on LVL-3 that had s
e
n
t
t
h
e
c
o
l
l
e
c
t
i
o
n
10. Checkpoint 2 of LVL-2 which verifies
based on the unique certificate of the first level
checkpoint (12) and the current network time
based on the created consensus fingerprint (13)
13. Consensus fingerprint
16. Checkpoints of LVL-1
collect all the consensus fingerprints they either created
or verified for the duration of the specific time period (n).
on the sec
o
n
d
l
e
v
e
l
(
1
0
)
t
h
a
t
h
a
d
s
e
n
t
t
h
e
n
e
w
c
o
l
l
e
c
t
i
o
n
14.
15. Checkpoint 2 of LVL-1 which verifies
t
o
a
s
e
c
o
n
d
c
h
e
c
k
p
o
i
n
t
o
n
t
h
e
f
i
r
s
t
l
e
v
e
l
(
1
5
)
to handle
r
e
q
u
e
s
t
added to LVL-2 checkpoint
fingerprint collection
9. Collection fingerprint
if the Collection fingerprint (9) was created
by the correct checkpoint on the second level
if the Collection fingerprint (9) exists in the
shared storage
(added to LVL-1 checkpoint fingerprint collection)
11. Checkpoints of LVL-2
collect/verify the collection fingerprint
if the consensus fingerprint (13) was created
by the correct checkpoint on the first level (12)
if the consensus fingerprint (13) exists
in the shared storage
based on the checkpoint’s unique certificate(3)
and the current network time
page xy
page 9
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
Master hash phase
Level 1 - Signing phase round 1
All the checkpoints of the first level (17) are ordered in a pseudo random fashion, based on the previously generated
masterhash, in a number of groups with equal members.
Within each group all the checkpoints will have a specific order as well.
All the groups will work simultaneously to generate an aggregated collection of unique time stamped data finger-
prints included in all the new collections for which the checkpoints of the first level that are part of the group either
created a consensus fingerprint or verified a one during the previous phase. The first member of the groups will have
an allotted time frame to add all the unique time stamped data fingerprints included in the new collection for which
it created or verified a consensus fingerprint during the previous phase to the groups shared storage and sign the
entries. The other checkpoints of the groups will sync with the shared storage and add the entries to their collection if
they can confirm the consensus for each time stamped data fingerprint. After the allotted time frame for the first
checkpoint has expired, the second checkpoint of the group (18) will add all the unique time stamped data finger-
prints, included in the new collections for which the checkpoint either created or verified a consensus fingerprint, and
which have not yet been added to the group’s shared storage during its allotted time frame and sign the entries.
Again, the remaining checkpoints (19) of the groups will sync with the shared storage and add the entries to their
collection if they can confirm the consensus for each digital fingerprint. Next (20) the third checkpoint will do the
same followed by all other checkpoints in the group.
17. Checkpoints of LVL-1
. . . . .
group 1
. . .
checkpoint 1
checkpoint 2
checkpoint 3
checkpoint 4
checkpoint a
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
group 3
. . .
checkpoint b+1
checkpoint b+2
checkpoint b+3
checkpoint b+4
checkpoint c
group 5
. . .
checkpoint d+1
checkpoint d+2
checkpoint d+3
checkpoint e
group 7
. . .
checkpoint f+1
checkpoint g
group 4
. . .
checkpoint c+1
checkpoint c+2
checkpoint c+3
checkpoint c+4
checkpoint d
group x
. . .
checkpoint x+1
checkpoint x+2
checkpoint x+3
checkpoint x+4
checkpoint y
group y
. . .
checkpoint y+1
checkpoint y+2
checkpoint y+3
checkpoint y+4
checkpoint z
each group has an equal number of checkpoints and
all the checkpoints within each group have a specific order
group 6
. . .
checkpoint e+1
checkpoint e+2
checkpoint f
Groups
work simultaneously to generate an aggregated collection of unique TSDFPs included in
all the new collections for which the checkpoints of the first level that are part of the group
either created a consensus fingerprint or verified one during the previous phase (13)
20. Checkpoints’ collection
group 1
. . .
checkpoint 1
checkpoint 2
checkpoint 3
checkpoint 4
checkpoint a
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
group 3
. . .
checkpoint b+1
checkpoint b+2
checkpoint b+3
checkpoint b+4
checkpoint c
group 5
. . .
checkpoint d+1
checkpoint d+2
checkpoint d+3
checkpoint e
group 7
. . .
checkpoint f+1
checkpoint g
group 4
. . .
checkpoint c+1
checkpoint c+2
checkpoint c+3
checkpoint c+4
checkpoint d
group x
. . .
checkpoint x+1
checkpoint x+2
checkpoint x+3
checkpoint x+4
checkpoint y
group y
. . .
checkpoint y+1
checkpoint y+2
checkpoint y+3
checkpoint y+4
checkpoint z
group 6
. . .
checkpoint e+1
checkpoint e+2
checkpoint f
18. Aggregated collection of unique TSDFPs 19. Groups’ shared storage
it created or verified a consensus fingerprint during the previous phase to the groups shared storage
and sign the entries
First member of each group (chkpoint 1, chkpoint a+1, chkpoint b+1 ... chkpoint x+1, chkpoint y+1)
have an allotted time frame to add all the unique TSDFPs included in the new collection (18) for which
The other checkpoints of the groups
will sync with the shared storage (19) and add the entries to
their collection if they can confirm the consensus for each TSDFP
checkpoint 2 checkpoint a+2 checkpoint b+2 checkpoint c+2 checkpoint x+2 checkpoint y+2
checkpoint d+2 checkpoint e+2 checkpoint f+2
. . .
page xy
page 10
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
Level 1 - Signing phase round 2
When all checkpoints have added their digital fingerprints to the group’s shared storage, each member of the first
group (I) will send their collection of digital fingerprints to their counterpart in the second group (G1C1 -> G2C1;
G1C2->G2C2; …). The checkpoints of the second group (II) will compare the collection of digital fingerprints they
each received with the rest of the group. If they received the same, they will continue with the collection they
received, if not they will continue with the collection with most digital fingerprints for which they can confirm the
consensus. The checkpoint of the second group will verify the consensus for each digital fingerprint and add the
collection of digital fingerprints for the second group generated in the previous phase. The combination of digital
fingerprints collected by the first group and those by the second group is sent to the counterpart in the third group
(G2C1->G3C1; G2C2-G3C2; …). The checkpoints of the third group (III) will compare the collections they each received
with the rest of the group. If they received the same, they will continue with the collection they received, if not they
will continue with the collection with most digital fingerprints for which they can confirm the consensus. The check-
point of the second group will verify the consensus for each digital fingerprint and add the collection of digital
fingerprints for the third group generated in the previous phase. The combination of digital fingerprints collected by
the second group and those by the third group is sent to the counterpart in the fourth group (G3C1->G4C1;
G3C2-G4C2; …). Next the fourth group (IV) will do the same followed by the other groups.
21. Repetition of step 20
the remaining checkpoints of the groups will sync with the shared storage (19) and
add the entries to their collection if they can confirm the consensus for each TSDFP.
22. Repetition of step 20
the third checkpoint of each group will add the unique TSDFPs
collections (20) and sign the included in the new entries
the fourth checkpoint of each group will add the unique
collections (20) and sign the included in the new entries
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
I. Checkpoints of group 1
. . .
group 1
checkpoint 1
checkpoint 2
checkpoint 3
checkpoint 4
checkpoint a
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
each member of the first group will
send their collection of TSDFPs to
their counterpart in the second
group
II. Checkpoints of group 2
compare the collection of TSDFPs
(they each received) with the rest of
the group, verify the consensus for
each TSDFP and add the collection
IV. Checkpoints of group 3
compare the collection of TSDFPs
(they each received) with the rest of
the group, verify the consensus for
each TSDFP and add the collection
III. 1st and 2nd groups’ TSDFP combination
the combination of TSDFPs collected by the
first group and those by the second group is
sent to the counterpart in the third group
group 3
. . .
checkpoint b+1
checkpoint b+2
checkpoint b+3
checkpoint b+4
checkpoint c
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
. . .
group 1
checkpoint 1
checkpoint 2
checkpoint 3
checkpoint 4
checkpoint a
+
page xy
page 11
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
page xy
Level 1 - Adding phase
When the last group has finished adding the digital fingerprints for the last group. The checkpoint of the last group
will compare their collections with each other and the checkpoint with the highest priority will create a master hash
with all the digital fingerprints for which the consensus could be confirmed. This checkpoint will present the master
hash to the controllers of the location in the decentralized storage selected to store the master hash for that time
period. All the controllers verify if the checkpoint presenting the master hash has the highest priority in the last group
and verify the created master hash before the master hash is stored. If one of the controllers rejects the master hash,
new controllers will be selected pseudo-randomly. And the checkpoint with the highest priority will repeat the
process. If no master hash is added within the pre-defined time frame, an empty hash will be added.
group y
. . .
checkpoint y+1
checkpoint y+2
checkpoint y+3
checkpoint y+4
checkpoint z
Checkpoints of last group (y)
will compare their collections with
each other
creates a master hash with all the TSDFPs for
which the consensus could be confirmed.
It then presents it to the controllers of the
location in the decentralized storage selected
to store the master hash for that time period
highest priority Checkpoint
verify if the checkpoint presenting the master
hash has the highest priority in the last group
and verify the created master hash before the
master hash is stored
Shared Storage Controllers
#
presents the master hash
#
presents the master hash
if rejected
if approved
the master hash is stored
will be selected pseudo-randomly
new Shared Storage Controller
repeats the process. If no master
hash is added within the pre-
defined time frame, an empty
hash will be added.
highest priority Checkpoint
page xy
page 12
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
page xy
PoH Full Explanatory Diagram Part 2
17. Checkpoints of LVL-1
. . . . .
group 1
. . .
checkpoint 1
checkpoint 2
checkpoint 3
checkpoint 4
checkpoint a
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
group 3
. . .
checkpoint b+1
checkpoint b+2
checkpoint b+3
checkpoint b+4
checkpoint c
group 5
. . .
checkpoint d+1
checkpoint d+2
checkpoint d+3
checkpoint e
group 7
. . .
checkpoint f+1
checkpoint g
group 4
. . .
checkpoint c+1
checkpoint c+2
checkpoint c+3
checkpoint c+4
checkpoint d
group x
. . .
checkpoint x+1
checkpoint x+2
checkpoint x+3
checkpoint x+4
checkpoint y
group y
. . .
checkpoint y+1
checkpoint y+2
checkpoint y+3
checkpoint y+4
checkpoint z
each group has an equal number of checkpoints and
all the checkpoints within each group have a specific order
group 6
. . .
checkpoint e+1
checkpoint e+2
checkpoint f
Groups
work simultaneously to generate an aggregated collection of unique TSDFPs included in
all the new collections for which the checkpoints of the first level that are part of the group
either created a consensus fingerprint or verified one during the previous phase (13)
20. Checkpoints’ collection
group 1
. . .
checkpoint 1
checkpoint 2
checkpoint 3
checkpoint 4
checkpoint a
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
group 3
. . .
checkpoint b+1
checkpoint b+2
checkpoint b+3
checkpoint b+4
checkpoint c
group 5
. . .
checkpoint d+1
checkpoint d+2
checkpoint d+3
checkpoint e
group 7
. . .
checkpoint f+1
checkpoint g
group 4
. . .
checkpoint c+1
checkpoint c+2
checkpoint c+3
checkpoint c+4
checkpoint d
group x
. . .
checkpoint x+1
checkpoint x+2
checkpoint x+3
checkpoint x+4
checkpoint y
group y
. . .
checkpoint y+1
checkpoint y+2
checkpoint y+3
checkpoint y+4
checkpoint z
group 6
. . .
checkpoint e+1
checkpoint e+2
checkpoint f
18. Aggregated collection of unique TSDFPs 19. Groups’ shared storage
it created or verified a consensus fingerprint during the previous phase to the groups shared storage
and sign the entries
First member of each group (chkpoint 1, chkpoint a+1, chkpoint b+1 ... chkpoint x+1, chkpoint y+1)
have an allotted time frame to add all the unique TSDFPs included in the new collection (18) for which
The other checkpoints of the groups
will sync with the shared storage (19) and add the entries to
their collection if they can confirm the consensus for each TSDFP
21. Repetition of step 20
the remaining checkpoints of the groups will sync with the shared storage (19) and
add the entries to their collection if they can confirm the consensus for each TSDFP.
22. Repetition of step 20
checkpoint 2 checkpoint a+2 checkpoint b+2 checkpoint c+2 checkpoint x+2 checkpoint y+2
checkpoint d+2 checkpoint e+2 checkpoint f+2
. . .
the third checkpoint of each group will add the unique TSDFPs
collections (20) and sign the included in the new entries
. . . the fourth checkpoint of each group will add the unique
collections (20) and sign the included in the new entries
the second checkpoint of each group will add all the unique TSDF
P
s
included in the new collections (20) and sign the entries
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
I. Checkpoints of group 1
. . .
group 1
checkpoint 1
checkpoint 2
checkpoint 3
checkpoint 4
checkpoint a
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
each member of the first group will
send their collection of TSDFPs to
their counterpart in the second
group
II. Checkpoints of group 2
compare the collection of TSDFPs
(they each received) with the rest of
the group, verify the consensus for
each TSDFP and add the collection
IV. Checkpoints of group 3
compare the collection of TSDFPs
(they each received) with the rest of
the group, verify the consensus for
each TSDFP and add the collection
III. 1st and 2nd groups’ TSDFP combination
the combination of TSDFPs collected by the
first group and those by the second group is
sent to the counterpart in the third group
checkpoints have now finished adding their digital fingerprints
to the group’s shared storage
group 3
. . .
checkpoint b+1
checkpoint b+2
checkpoint b+3
checkpoint b+4
checkpoint c
group 2
. . .
checkpoint a+1
checkpoint a+2
checkpoint a+3
checkpoint a+4
checkpoint b
. . .
group 1
checkpoint 1
checkpoint 2
checkpoint 3
checkpoint 4
checkpoint a
+ . . .
group y
. . .
checkpoint y+1
checkpoint y+2
checkpoint y+3
checkpoint y+4
checkpoint z
Checkpoints of last group (y)
. . .
will compare their collections with
each other
creates a master hash with all the TSDFPs for
which the consensus could be confirmed.
It then presents it to the controllers of the
location in the decentralized storage selected
to store the master hash for that time period
highest priority Checkpoint
verify if the checkpoint presenting the master
hash has the highest priority in the last group
and verify the created master hash before the
master hash is stored
Shared Storage Controllers
#
presents the master hash
#
presents the master hash
if rejected
if approved
the master hash is stored
will be selected pseudo-randomly
new Shared Storage Controller
repeats the process. If no master
hash is added within the pre-
defined time frame, an empty
hash will be added.
highest priority Checkpoint
page 13
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
How does PoH provide trustable proof
The digital fingerprint created by the level 3 checkpoints uses the hashed value of the data requesting the PoH
integrity protection, the current network time and the unique certificate of the level 3 checkpoint for that time
period. This way the digital fingerprint provides 3rd party verification of the data content for the data at the moment
the digital fingerprint was requested. The master hash is a hash value created from all the digital fingerprints for that
time period and provides proof for the digital signature's existence in that time period. Only 1 master hash can exist
for each time period and the master hashes are also linked to each other much like the blocks in a regular block
blockchain.
Every user will sync with the network the moment they connect to the network adding all the master hashes to their
chain.
It will be impossible for a user to change the data protected by a digital fingerprint after the master hash for that time
period has been created.
page 14
page xy
page 14
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
page xy
Glossary
Aggregated Collection:
Collection Fingerprint:
Collection Signature:
Consensus Protocol:
Controller:
Data Fingerprint:
Digital Fingerprint:
Master Hash:
Collection of everything from the previous nodes.
Fingerprint made from in the level 2 checkpoint from the collection
hash received from the second node and its own unique certificate
and cur
the ren net
t wor time
k .
The hash of all the current node level collections.
A specific algorithm that ensures how and according to which rules
transactions on a blockchain ar appr
e oved.
The Entity that will verify if the master hash is coming from the correct
check point and will eventually store it.
Something that is created for a specific piece of data with extra
unique parameters to make it possible to identify a piece of data.
A unique identifier for the checkpoints.
The Master hash is the result of running true all phases of the PoH
consensus before being stored.
Node: The collection of nodes (dedicated computers) forms the infrastruc-
ture of a blockchain. AnuuTech has 3 levels of 3584 nodes.
PoH:
TSDFP:
Virtual Checkpoints:
Proof of Hash, it is a network consensus protocol that provides
trustable unalterable proof of the existence of a data subset at a
given moment time
in .
Time Stamped Data FingerPrint based on the checkpoints unique
certificate and current network time.
Part of nodes that execute the operations from the collection of the
previous level of nodes.
All documents, reports and other incidental or derivative work or materials furnished here in remains the sole property
of AnuuTech. None of the documents, reports and other incidental or derivative work or furnished materials shall be
used by the reader without the express written consent of AnuuTech.
page 15
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM

More Related Content

Similar to AnuuTech PoH.pdf

COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfhabtex1230
 
Design Presentation Distributed Monitoring tool
Design Presentation Distributed Monitoring toolDesign Presentation Distributed Monitoring tool
Design Presentation Distributed Monitoring toolanuj_rakheja
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer ProtocolsZahouAmel1
 
Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...eSAT Journals
 
Ccna 1 chapter 5 v4.0 answers 2011
Ccna 1 chapter 5 v4.0 answers 2011Ccna 1 chapter 5 v4.0 answers 2011
Ccna 1 chapter 5 v4.0 answers 2011Dân Chơi
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxAnkitKumar891632
 
raim-2015-paper31
raim-2015-paper31raim-2015-paper31
raim-2015-paper31John Wu
 
Traffic Engineering in Software Defined Networking SDN
Traffic Engineering in Software Defined Networking SDNTraffic Engineering in Software Defined Networking SDN
Traffic Engineering in Software Defined Networking SDNijtsrd
 
MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...
MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...
MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...VLSICS Design
 
Adaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management PlatformAdaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management PlatformAmir Krifa
 
the transport layer
the transport layerthe transport layer
the transport layertumetr1
 
Air pollution monitoring system
Air pollution monitoring systemAir pollution monitoring system
Air pollution monitoring systemSuraksha Sanghavi
 
Transport_Layer (1).pptx
Transport_Layer (1).pptxTransport_Layer (1).pptx
Transport_Layer (1).pptxSAICHARANREDDYN
 
Chapter 2B-Communication.ppt
Chapter 2B-Communication.pptChapter 2B-Communication.ppt
Chapter 2B-Communication.pptsirajmohammed35
 
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...IJNSA Journal
 
Towards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfTowards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfCarlosRodrigues517978
 
E032028030
E032028030E032028030
E032028030inventy
 

Similar to AnuuTech PoH.pdf (20)

TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdf
 
Design Presentation Distributed Monitoring tool
Design Presentation Distributed Monitoring toolDesign Presentation Distributed Monitoring tool
Design Presentation Distributed Monitoring tool
 
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols5-LEC- 5.pptxTransport Layer.  Transport Layer Protocols
5-LEC- 5.pptxTransport Layer. Transport Layer Protocols
 
Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...Modification of l3 learning switch code for firewall functionality in pox con...
Modification of l3 learning switch code for firewall functionality in pox con...
 
Ccna 1 chapter 5 v4.0 answers 2011
Ccna 1 chapter 5 v4.0 answers 2011Ccna 1 chapter 5 v4.0 answers 2011
Ccna 1 chapter 5 v4.0 answers 2011
 
Transport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptxTransport_Layer_Protocols.pptx
Transport_Layer_Protocols.pptx
 
raim-2015-paper31
raim-2015-paper31raim-2015-paper31
raim-2015-paper31
 
Traffic Engineering in Software Defined Networking SDN
Traffic Engineering in Software Defined Networking SDNTraffic Engineering in Software Defined Networking SDN
Traffic Engineering in Software Defined Networking SDN
 
MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...
MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...
MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER ...
 
Adaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management PlatformAdaptive Traffic Sampling and Management Platform
Adaptive Traffic Sampling and Management Platform
 
Attackboard slides dac12-0605
Attackboard slides dac12-0605Attackboard slides dac12-0605
Attackboard slides dac12-0605
 
the transport layer
the transport layerthe transport layer
the transport layer
 
Air pollution monitoring system
Air pollution monitoring systemAir pollution monitoring system
Air pollution monitoring system
 
Transport_Layer (1).pptx
Transport_Layer (1).pptxTransport_Layer (1).pptx
Transport_Layer (1).pptx
 
Chapter 2B-Communication.ppt
Chapter 2B-Communication.pptChapter 2B-Communication.ppt
Chapter 2B-Communication.ppt
 
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
 
Towards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfTowards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdf
 
Ergo Hong Kong meetup
Ergo Hong Kong meetupErgo Hong Kong meetup
Ergo Hong Kong meetup
 
E032028030
E032028030E032028030
E032028030
 

Recently uploaded

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 

Recently uploaded (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

AnuuTech PoH.pdf

  • 3. Table of Contents Table of Contents Page 3 PoH What is PoH? Page 4 PoH a Simplified Explanation Diagram Page 4 The Node Network Page 5 How Does It Work, Level 3 - Collection phase Page 6 Level 1 – Diagram Page 6 Level 2 - Aggregation phase part 1 Page 7 Level 2 – Diagram Page 7 Level 1 - Aggregation phase part 2 Page 8 Level 1 – Diagram Page 8 The Full PoH Explanatory Diagram Part 1 Page 9 Master Hash Phase Level 1 - Signing phase round 1 Page 10 Signing phase 1 Diagram Page 10 Level 1 - Signing phase round 2 Page 11 Signing phase 2 Diagram Page 11 Level 1 - Adding phase Page 12 Adding phase Diagram Page 12 The Full PoH Explanatory Diagram Part 2 Page 13 How does PoH provide trustable proof Page 14 Glossary of Terms Page 15
  • 4. PoH consensus What is PoH PoH stands for Proof of Hash, it is a network consensus protocol that provides trustable unalterable proof of the existence of a data subset at a given moment in time. The PoH consensus protocol is not used to validate any data, it is only used to provide proof of integrity and existence of (any type of) data. Average checkpoint An average checkpoint gets lots of inputs from various users and these inputs are inseparable from each other. So each unique original input helps creating a more secure final hash. These various data inputs are mixed and protecting each other. For example User 1 creates a data fingerprint using its own digital signature. If User 2 does the same and uses these two inputs, the system creates a third fingerprint and then this third fingerprint makes it impossible for User 1 and User 2 to repeat the same process using other input. User 1 Input 1 User n Input n User 4 Input 4 User 3 Input 3 User 2 Input 2 . . . . . Simplified PoH explanation User 1 User 2 User 3 User 4 User 5 User 6 User 7 User 8 User 1 User 2 User 3 User 4 User 5 User 6 User 7 User 8 L2 checkpoint 1 L2 checkpoint 1 L2 checkpoint 1 L3 checkpoint 1 L3 checkpoint 2 L3 checkpoint 3 L3 checkpoint 4 PoH Result Result Result Result Result page xy page 4 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 5. The node network PoH relies on a network of trusted nodes executing the various tasks that make up the consensus protocol. In the AnuuTech network the nodes are divided in 3 different levels each responsible for a part of the consensus protocol. In the AnuuTech network the third level of nodes is the collection layer, users that want to use the PoH service will interact with the nodes on this layer. The second level of nodes is the aggregation layer where all the data collected by the third layer is compressed into smaller packages. This layer also serves as a barrier between the third layer which is accessible by the network users and the first layer where the eventual consensus is reached. This will help prevent the possibility for network users to interfere with the consensus process. In the first layer the nodes will reach a consensus on the data collected by the third layer and aggregated by the second layer, and the result of the consensus will be made available for the rest of the network. The operations that need to be executed are done by virtual “checkpoints”hostedonthenodenetwork. The hosting of each checkpoints is assigned in a pseudo random fashion, partially based on the result of the previous outcome of the consensus round and the certificates issued to the nodes, after each consensus round. Multiple checkpoints can be assigned to the same physical nodes should there not be enough physical nodes for all the checkpoints. page xy page 5 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 6. How does it work? Consensus phase Level 3 - Collection phase When a user wants to use the PoH service, they will present a subset of data to the third node level. The checkpoint selected to handle this request is directly related to the data. The checkpoint will create a time stamped data finger- print for the data based on the checkpoints unique certificate and the current network time, add this time stamped data fingerprint to its collection and the shared temporary storage for the current time period, and provide this fingerprint to the network user. The user (1) will present this time stamped data fingerprint to a second checkpoint (5), selected based on the fingerprint , on the third level which will verify if the time stamped data fingerprint was created by the correct checkpoint (3) on the third level and if it exists in the shared storage. The number of secondary checkpoints that will collect/verify the time stamped data fingerprint can vary depending on the consensus rules for the network. All checkpoints on the third level will collect the timestamped data fingerprint (4) they either generated or veried for the duration of the specic time period (n). Once a user (1), receives a timestamped data fingerprint , they will have a temporary proof of data integrity, however, to get full confirmation the master hash for the time period of the time stamped data fingerprint needs to be added to the shared storage for the PoH consensus protocol and the time stamped data fingerprint needs to be used in the calculation of the master hash. The time required for full confirmation is n x 4. p r e s e n t s t h e T S D F P ( 4 ) 5. Checkpoint 2 (which verifies) 3. Checkpoint 1 adds TSDFP to n 1. Users Checkpoint 1 collection Checkpoint 1 shared storage 4. TSDFP 2. LVL-3 Node directly related s h a r e data with checkpoint s e l e c t e d crea t e s s h a r e s with if the TSDFP (4) was created by the correct checkpoint on the third level (3) if the TSDFP (4) exists in the shared storage to handle r e q u e s t based on the checkpoint’s unique certificate(3) and the current network time Nodes Checkpoints TSDFP (Time Stamped Data FingerPprints) Collection Shared Storage page xy page 6 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 7. Level 2 - Aggregation phase part 1 All checkpoints on the third level will aggregate (6) the time stamped data fingerprints they collected during the time period (n) and hash the collection. The checkpoints on the third level will send the collection hash (7) to a checkpoint on the second level, selected based on the collection signature. The checkpoints on the second level will verify (8) the consensus for the time stamped data fingerprints included in the collection and provide a collection fingerprint, based on the unique certificate of the second level checkpoint and the current network time. The checkpoint on the second level will add this collection (9) fingerprint to its collection for the current time period and the shared storage and provide this collection fingerprint to the checkpoint on the third level that had sent the collection. The check- point on the third level will send the collection fingerprint to a second checkpoint on the second level (10), selected based on the created collection fingerprint, which will verify if the collection fingerprint was created by the correct checkpoint on the second level and if it exists in the shared storage. The number of secondary checkpoints that will collect/verify the collection fingerprint can vary depending on the consensus rules for the network. All checkpoints of the second level will collect all the collection fingerprints (11) they either created or verified for the duration of the specific time period (n). all TSD F P s 7.agg r e g a t e hash t h e m 6. Checkpoints of LVL-3 verifies the consensus for the TSDFP included in the collection 8. Checkpoint of LVL-2 and send c o l l e c t i o n to a L V L - 2 10. Checkpoint 2 of LVL-2 which verifies added to LVL-2 checkpoint fingerprint collection 9. Collection fingerprint if the Collection fingerprint (9) was created by the correct checkpoint on the second level if the Collection fingerprint (9) exists in the shared storage 11. Checkpoints of LVL-2 collect/verify the collection fingerprint Nodes Checkpoints TSDFP (Time Stamped Data FingerPprints) Collection Shared Storage page xy page 7 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 8. Level 1 - Aggregation phase part 2 All checkpoints on the second level will aggregate the collections they collected during the time period (n) and hash of the new collection (12). The checkpoints on the second level will send the new collection hash to a checkpoint on the first level, selected based on the new collection signature. The checkpoints on the first level will verify the consen- sus for the collections included in the new collection and the consensus for the digital fingerprints included in the collection, (13) and provide a consensus fingerprint, based on the unique certificate of the first level checkpoint and the current network time. The checkpoint on the first level will add this consensus fingerprint to its collection for the current time period and the shared storage and provide this collection fingerprint to the checkpoint on the second level (14 Page 9) that had sent the new collection. The checkpoint on the second level will send the consensus finger- print to a second checkpoint on the first level, selected based on the created consensus fingerprint, which will verify if the consensus fingerprint was created by the correct checkpoint on the first level and if it exists in the shared storage (15). The number of secondary checkpoints that will collect/verify the consensus fingerprint can vary depending on the consensus rules for the network. All checkpoints of the first level will collect all the consensus fingerprints they either created or verified for the dura- tion of the specific time period (n) (16). Nodes Checkpoints TSDFP (Time Stamped Data FingerPprints) Collection Shared Storage p r o v i d e verifies the consensus for the collections included in the new collection and the consensus for the digital fingerprints included in the collection 12. Checkpoint of LVL-1 based on the unique certificate of the first level checkpoint (12) and the current network time based on the created consensus fingerprint (13) 13. Consensus fingerprint 16. Checkpoints of LVL-1 collect all the consensus fingerprints they either created or verified for the duration of the specific time period (n). 15. Checkpoint 2 of LVL-1 which verifies (added to LVL-1 checkpoint fingerprint collection) if the consensus fingerprint (13) was created by the correct checkpoint on the first level (12) if the consensus fingerprint (13) exists in the shared storage page xy page 8 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 9. Nodes Checkpoints 1 2 3 TSDFP (Time Stamped Data FingerPprints) Collection Shared Storage Levels PoH Full Explanatory Diagram Part 1 s e n d s t h e c o n s e n s u s f i n g e r p r i n t hash the co l l e c t i o n provide thi s c o l l e c t i o n f i n g e r p r i n t t o t h e c h e c k p o i n t p r e s e n t s t h e T S D F P ( 4 ) 5. Checkpoint 2 (which verifies) 3. Checkpoint 1 adds TSDFP to n 1. Users Checkpoint 1 collection Checkpoint 1 shared storage 4. TSDFP 2. LVL-3 Node directly related s h a r e data with checkpoint s e l e c t e d crea t e s s h a r e s with all TSD F P s 7.agg r e g a t e s e n d s t h e c o l l e c t i o n f i n g e r p r i n t ( 9 ) and send it to a checkpoi n t o n t h e f i r s t l e v e l hash t h e m p r o v i d e if the TSDFP (4) was created by the correct checkpoint on the third level (3) if the TSDFP (4) exists in the shared storage 6. Checkpoints of LVL-3 verifies the consensus for the TSDFP included in the collection 8. Checkpoint of LVL-2 verifies the consensus for the collections included in the new collection and the consensus for the digital fingerprints included in the collection 12. Checkpoint of LVL-1 and send c o l l e c t i o n to a LVL-2 c h e c k p o i n t p r o v ides this collection fingerprint (9) to the checkpoint on LVL-3 that had s e n t t h e c o l l e c t i o n 10. Checkpoint 2 of LVL-2 which verifies based on the unique certificate of the first level checkpoint (12) and the current network time based on the created consensus fingerprint (13) 13. Consensus fingerprint 16. Checkpoints of LVL-1 collect all the consensus fingerprints they either created or verified for the duration of the specific time period (n). on the sec o n d l e v e l ( 1 0 ) t h a t h a d s e n t t h e n e w c o l l e c t i o n 14. 15. Checkpoint 2 of LVL-1 which verifies t o a s e c o n d c h e c k p o i n t o n t h e f i r s t l e v e l ( 1 5 ) to handle r e q u e s t added to LVL-2 checkpoint fingerprint collection 9. Collection fingerprint if the Collection fingerprint (9) was created by the correct checkpoint on the second level if the Collection fingerprint (9) exists in the shared storage (added to LVL-1 checkpoint fingerprint collection) 11. Checkpoints of LVL-2 collect/verify the collection fingerprint if the consensus fingerprint (13) was created by the correct checkpoint on the first level (12) if the consensus fingerprint (13) exists in the shared storage based on the checkpoint’s unique certificate(3) and the current network time page xy page 9 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 10. Master hash phase Level 1 - Signing phase round 1 All the checkpoints of the first level (17) are ordered in a pseudo random fashion, based on the previously generated masterhash, in a number of groups with equal members. Within each group all the checkpoints will have a specific order as well. All the groups will work simultaneously to generate an aggregated collection of unique time stamped data finger- prints included in all the new collections for which the checkpoints of the first level that are part of the group either created a consensus fingerprint or verified a one during the previous phase. The first member of the groups will have an allotted time frame to add all the unique time stamped data fingerprints included in the new collection for which it created or verified a consensus fingerprint during the previous phase to the groups shared storage and sign the entries. The other checkpoints of the groups will sync with the shared storage and add the entries to their collection if they can confirm the consensus for each time stamped data fingerprint. After the allotted time frame for the first checkpoint has expired, the second checkpoint of the group (18) will add all the unique time stamped data finger- prints, included in the new collections for which the checkpoint either created or verified a consensus fingerprint, and which have not yet been added to the group’s shared storage during its allotted time frame and sign the entries. Again, the remaining checkpoints (19) of the groups will sync with the shared storage and add the entries to their collection if they can confirm the consensus for each digital fingerprint. Next (20) the third checkpoint will do the same followed by all other checkpoints in the group. 17. Checkpoints of LVL-1 . . . . . group 1 . . . checkpoint 1 checkpoint 2 checkpoint 3 checkpoint 4 checkpoint a group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b group 3 . . . checkpoint b+1 checkpoint b+2 checkpoint b+3 checkpoint b+4 checkpoint c group 5 . . . checkpoint d+1 checkpoint d+2 checkpoint d+3 checkpoint e group 7 . . . checkpoint f+1 checkpoint g group 4 . . . checkpoint c+1 checkpoint c+2 checkpoint c+3 checkpoint c+4 checkpoint d group x . . . checkpoint x+1 checkpoint x+2 checkpoint x+3 checkpoint x+4 checkpoint y group y . . . checkpoint y+1 checkpoint y+2 checkpoint y+3 checkpoint y+4 checkpoint z each group has an equal number of checkpoints and all the checkpoints within each group have a specific order group 6 . . . checkpoint e+1 checkpoint e+2 checkpoint f Groups work simultaneously to generate an aggregated collection of unique TSDFPs included in all the new collections for which the checkpoints of the first level that are part of the group either created a consensus fingerprint or verified one during the previous phase (13) 20. Checkpoints’ collection group 1 . . . checkpoint 1 checkpoint 2 checkpoint 3 checkpoint 4 checkpoint a group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b group 3 . . . checkpoint b+1 checkpoint b+2 checkpoint b+3 checkpoint b+4 checkpoint c group 5 . . . checkpoint d+1 checkpoint d+2 checkpoint d+3 checkpoint e group 7 . . . checkpoint f+1 checkpoint g group 4 . . . checkpoint c+1 checkpoint c+2 checkpoint c+3 checkpoint c+4 checkpoint d group x . . . checkpoint x+1 checkpoint x+2 checkpoint x+3 checkpoint x+4 checkpoint y group y . . . checkpoint y+1 checkpoint y+2 checkpoint y+3 checkpoint y+4 checkpoint z group 6 . . . checkpoint e+1 checkpoint e+2 checkpoint f 18. Aggregated collection of unique TSDFPs 19. Groups’ shared storage it created or verified a consensus fingerprint during the previous phase to the groups shared storage and sign the entries First member of each group (chkpoint 1, chkpoint a+1, chkpoint b+1 ... chkpoint x+1, chkpoint y+1) have an allotted time frame to add all the unique TSDFPs included in the new collection (18) for which The other checkpoints of the groups will sync with the shared storage (19) and add the entries to their collection if they can confirm the consensus for each TSDFP checkpoint 2 checkpoint a+2 checkpoint b+2 checkpoint c+2 checkpoint x+2 checkpoint y+2 checkpoint d+2 checkpoint e+2 checkpoint f+2 . . . page xy page 10 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 11. Level 1 - Signing phase round 2 When all checkpoints have added their digital fingerprints to the group’s shared storage, each member of the first group (I) will send their collection of digital fingerprints to their counterpart in the second group (G1C1 -> G2C1; G1C2->G2C2; …). The checkpoints of the second group (II) will compare the collection of digital fingerprints they each received with the rest of the group. If they received the same, they will continue with the collection they received, if not they will continue with the collection with most digital fingerprints for which they can confirm the consensus. The checkpoint of the second group will verify the consensus for each digital fingerprint and add the collection of digital fingerprints for the second group generated in the previous phase. The combination of digital fingerprints collected by the first group and those by the second group is sent to the counterpart in the third group (G2C1->G3C1; G2C2-G3C2; …). The checkpoints of the third group (III) will compare the collections they each received with the rest of the group. If they received the same, they will continue with the collection they received, if not they will continue with the collection with most digital fingerprints for which they can confirm the consensus. The check- point of the second group will verify the consensus for each digital fingerprint and add the collection of digital fingerprints for the third group generated in the previous phase. The combination of digital fingerprints collected by the second group and those by the third group is sent to the counterpart in the fourth group (G3C1->G4C1; G3C2-G4C2; …). Next the fourth group (IV) will do the same followed by the other groups. 21. Repetition of step 20 the remaining checkpoints of the groups will sync with the shared storage (19) and add the entries to their collection if they can confirm the consensus for each TSDFP. 22. Repetition of step 20 the third checkpoint of each group will add the unique TSDFPs collections (20) and sign the included in the new entries the fourth checkpoint of each group will add the unique collections (20) and sign the included in the new entries group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b I. Checkpoints of group 1 . . . group 1 checkpoint 1 checkpoint 2 checkpoint 3 checkpoint 4 checkpoint a group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b each member of the first group will send their collection of TSDFPs to their counterpart in the second group II. Checkpoints of group 2 compare the collection of TSDFPs (they each received) with the rest of the group, verify the consensus for each TSDFP and add the collection IV. Checkpoints of group 3 compare the collection of TSDFPs (they each received) with the rest of the group, verify the consensus for each TSDFP and add the collection III. 1st and 2nd groups’ TSDFP combination the combination of TSDFPs collected by the first group and those by the second group is sent to the counterpart in the third group group 3 . . . checkpoint b+1 checkpoint b+2 checkpoint b+3 checkpoint b+4 checkpoint c group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b . . . group 1 checkpoint 1 checkpoint 2 checkpoint 3 checkpoint 4 checkpoint a + page xy page 11 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 12. page xy Level 1 - Adding phase When the last group has finished adding the digital fingerprints for the last group. The checkpoint of the last group will compare their collections with each other and the checkpoint with the highest priority will create a master hash with all the digital fingerprints for which the consensus could be confirmed. This checkpoint will present the master hash to the controllers of the location in the decentralized storage selected to store the master hash for that time period. All the controllers verify if the checkpoint presenting the master hash has the highest priority in the last group and verify the created master hash before the master hash is stored. If one of the controllers rejects the master hash, new controllers will be selected pseudo-randomly. And the checkpoint with the highest priority will repeat the process. If no master hash is added within the pre-defined time frame, an empty hash will be added. group y . . . checkpoint y+1 checkpoint y+2 checkpoint y+3 checkpoint y+4 checkpoint z Checkpoints of last group (y) will compare their collections with each other creates a master hash with all the TSDFPs for which the consensus could be confirmed. It then presents it to the controllers of the location in the decentralized storage selected to store the master hash for that time period highest priority Checkpoint verify if the checkpoint presenting the master hash has the highest priority in the last group and verify the created master hash before the master hash is stored Shared Storage Controllers # presents the master hash # presents the master hash if rejected if approved the master hash is stored will be selected pseudo-randomly new Shared Storage Controller repeats the process. If no master hash is added within the pre- defined time frame, an empty hash will be added. highest priority Checkpoint page xy page 12 WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 13. page xy PoH Full Explanatory Diagram Part 2 17. Checkpoints of LVL-1 . . . . . group 1 . . . checkpoint 1 checkpoint 2 checkpoint 3 checkpoint 4 checkpoint a group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b group 3 . . . checkpoint b+1 checkpoint b+2 checkpoint b+3 checkpoint b+4 checkpoint c group 5 . . . checkpoint d+1 checkpoint d+2 checkpoint d+3 checkpoint e group 7 . . . checkpoint f+1 checkpoint g group 4 . . . checkpoint c+1 checkpoint c+2 checkpoint c+3 checkpoint c+4 checkpoint d group x . . . checkpoint x+1 checkpoint x+2 checkpoint x+3 checkpoint x+4 checkpoint y group y . . . checkpoint y+1 checkpoint y+2 checkpoint y+3 checkpoint y+4 checkpoint z each group has an equal number of checkpoints and all the checkpoints within each group have a specific order group 6 . . . checkpoint e+1 checkpoint e+2 checkpoint f Groups work simultaneously to generate an aggregated collection of unique TSDFPs included in all the new collections for which the checkpoints of the first level that are part of the group either created a consensus fingerprint or verified one during the previous phase (13) 20. Checkpoints’ collection group 1 . . . checkpoint 1 checkpoint 2 checkpoint 3 checkpoint 4 checkpoint a group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b group 3 . . . checkpoint b+1 checkpoint b+2 checkpoint b+3 checkpoint b+4 checkpoint c group 5 . . . checkpoint d+1 checkpoint d+2 checkpoint d+3 checkpoint e group 7 . . . checkpoint f+1 checkpoint g group 4 . . . checkpoint c+1 checkpoint c+2 checkpoint c+3 checkpoint c+4 checkpoint d group x . . . checkpoint x+1 checkpoint x+2 checkpoint x+3 checkpoint x+4 checkpoint y group y . . . checkpoint y+1 checkpoint y+2 checkpoint y+3 checkpoint y+4 checkpoint z group 6 . . . checkpoint e+1 checkpoint e+2 checkpoint f 18. Aggregated collection of unique TSDFPs 19. Groups’ shared storage it created or verified a consensus fingerprint during the previous phase to the groups shared storage and sign the entries First member of each group (chkpoint 1, chkpoint a+1, chkpoint b+1 ... chkpoint x+1, chkpoint y+1) have an allotted time frame to add all the unique TSDFPs included in the new collection (18) for which The other checkpoints of the groups will sync with the shared storage (19) and add the entries to their collection if they can confirm the consensus for each TSDFP 21. Repetition of step 20 the remaining checkpoints of the groups will sync with the shared storage (19) and add the entries to their collection if they can confirm the consensus for each TSDFP. 22. Repetition of step 20 checkpoint 2 checkpoint a+2 checkpoint b+2 checkpoint c+2 checkpoint x+2 checkpoint y+2 checkpoint d+2 checkpoint e+2 checkpoint f+2 . . . the third checkpoint of each group will add the unique TSDFPs collections (20) and sign the included in the new entries . . . the fourth checkpoint of each group will add the unique collections (20) and sign the included in the new entries the second checkpoint of each group will add all the unique TSDF P s included in the new collections (20) and sign the entries group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b I. Checkpoints of group 1 . . . group 1 checkpoint 1 checkpoint 2 checkpoint 3 checkpoint 4 checkpoint a group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b each member of the first group will send their collection of TSDFPs to their counterpart in the second group II. Checkpoints of group 2 compare the collection of TSDFPs (they each received) with the rest of the group, verify the consensus for each TSDFP and add the collection IV. Checkpoints of group 3 compare the collection of TSDFPs (they each received) with the rest of the group, verify the consensus for each TSDFP and add the collection III. 1st and 2nd groups’ TSDFP combination the combination of TSDFPs collected by the first group and those by the second group is sent to the counterpart in the third group checkpoints have now finished adding their digital fingerprints to the group’s shared storage group 3 . . . checkpoint b+1 checkpoint b+2 checkpoint b+3 checkpoint b+4 checkpoint c group 2 . . . checkpoint a+1 checkpoint a+2 checkpoint a+3 checkpoint a+4 checkpoint b . . . group 1 checkpoint 1 checkpoint 2 checkpoint 3 checkpoint 4 checkpoint a + . . . group y . . . checkpoint y+1 checkpoint y+2 checkpoint y+3 checkpoint y+4 checkpoint z Checkpoints of last group (y) . . . will compare their collections with each other creates a master hash with all the TSDFPs for which the consensus could be confirmed. It then presents it to the controllers of the location in the decentralized storage selected to store the master hash for that time period highest priority Checkpoint verify if the checkpoint presenting the master hash has the highest priority in the last group and verify the created master hash before the master hash is stored Shared Storage Controllers # presents the master hash # presents the master hash if rejected if approved the master hash is stored will be selected pseudo-randomly new Shared Storage Controller repeats the process. If no master hash is added within the pre- defined time frame, an empty hash will be added. highest priority Checkpoint page 13 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 14. How does PoH provide trustable proof The digital fingerprint created by the level 3 checkpoints uses the hashed value of the data requesting the PoH integrity protection, the current network time and the unique certificate of the level 3 checkpoint for that time period. This way the digital fingerprint provides 3rd party verification of the data content for the data at the moment the digital fingerprint was requested. The master hash is a hash value created from all the digital fingerprints for that time period and provides proof for the digital signature's existence in that time period. Only 1 master hash can exist for each time period and the master hashes are also linked to each other much like the blocks in a regular block blockchain. Every user will sync with the network the moment they connect to the network adding all the master hashes to their chain. It will be impossible for a user to change the data protected by a digital fingerprint after the master hash for that time period has been created. page 14 page xy page 14 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 15. page xy Glossary Aggregated Collection: Collection Fingerprint: Collection Signature: Consensus Protocol: Controller: Data Fingerprint: Digital Fingerprint: Master Hash: Collection of everything from the previous nodes. Fingerprint made from in the level 2 checkpoint from the collection hash received from the second node and its own unique certificate and cur the ren net t wor time k . The hash of all the current node level collections. A specific algorithm that ensures how and according to which rules transactions on a blockchain ar appr e oved. The Entity that will verify if the master hash is coming from the correct check point and will eventually store it. Something that is created for a specific piece of data with extra unique parameters to make it possible to identify a piece of data. A unique identifier for the checkpoints. The Master hash is the result of running true all phases of the PoH consensus before being stored. Node: The collection of nodes (dedicated computers) forms the infrastruc- ture of a blockchain. AnuuTech has 3 levels of 3584 nodes. PoH: TSDFP: Virtual Checkpoints: Proof of Hash, it is a network consensus protocol that provides trustable unalterable proof of the existence of a data subset at a given moment time in . Time Stamped Data FingerPrint based on the checkpoints unique certificate and current network time. Part of nodes that execute the operations from the collection of the previous level of nodes. All documents, reports and other incidental or derivative work or materials furnished here in remains the sole property of AnuuTech. None of the documents, reports and other incidental or derivative work or furnished materials shall be used by the reader without the express written consent of AnuuTech. page 15 WWW.ANUUTECH.COM WWW.ANUUTECH.COM WWW.ANUUTECH.COM