Abstract: This disclosure relates to a blockchain driven informer ecosystem for public safety and crime prevention. The present disclosure resolves the problem of legalizing anonymous information by making intelligence information testifiable, protecting anonymity of the informers using blockchain and making payment to anonymous auditable in an informer ecosystem. In the present disclosure, a plurality of data is obtained in a public blockchain implemented in Ethereum with a smart contract from a plurality of users associated with an informer ecosystem, transmitted to a public blockchain by creating a bridge between them and one or more payment transactions are performed to the plurality of users which are recorded in the private blockchain as reward transaction IDs preserving the anonymity of identities of the plurality of users. A specific blockchain ID and an incidence code is provided to the plurality of users as a proof of source. [To be published with FIG. 2]
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION (See Section 10 and Rule 13)
Title of invention:
BLOCKCHAIN DRIVEN INFORMER ECOSYSTEM FOR PUBLIC SAFETY AND CRIME PREVENTION
Applicant
Tata Consultancy Services Limited A company Incorporated in India under the Companies Act, 1956
Having address:
Nirmal Building, 9th floor,
Nariman point, Mumbai 400021,
Maharashtra, India
Preamble to the description
The following specification particularly describes the invention and the manner in which it is to be performed.
TECHNICAL FIELD [001] The disclosure herein generally relates blockchain technology, and, more particularly, to blockchain driven informer ecosystem for public safety and crime prevention.
BACKGROUND [002] With the advancement of internet of things, blockchain is emerging as a rapidly developing technology. Blockchain is a technology which leverages resources of a global peer-to-peer network to ensure integrity of data exchanged among multiple devices without going through a trusted third party. Further, the blockchain technology, by enabling cryptocurrencies like bitcoin, hyperledger and Ethereum, is utilized in numerous applications such as artificial intelligence (AI), machine learning, internet of things (IoT), robotics, finance, and the like. In present scenario, most of the blockchain-based applications rely on blockchain to ensure safety and feasibility. However, with existing systems, keeping privacy of information exposed on the blockchain is a challenge.
SUMMARY
[003] Embodiments of the present disclosure present technological improvements as solutions to one or more of the above-mentioned technical problems recognized by the inventors in conventional systems.
[004] In an aspect, there is provided a processor implemented method, the method comprising: obtaining, a plurality of data pertaining to one or more criminal activities in a public blockchain from a plurality of users associated with an informer ecosystem, wherein the public blockchain is implemented in Ethereum with a smart contract, and wherein a specific blockchain ID and an incidence code is provided to the plurality of users as a proof of source; creating a bridge between the public blockchain and a private blockchain to allow the plurality of obtained data stored in the public blockchain for transmission to the private blockchain; and performing, based on the plurality of obtained data being transmitted to the private blockchain and the proof of source, one or more payment transactions to the
plurality of users associated with the informer ecosystem, wherein the one or more payment transactions are recorded in the private blockchain as reward transaction IDs preserving the anonymity of identities of the plurality of users.
[005] In another aspect, there is provided a system, the system comprising: one or more data storage devices operatively coupled to one or more hardware processors and configured to store instructions configured for execution via the one or more hardware processors to: obtain, a plurality of data pertaining to one or more criminal activities in a public blockchain from a plurality of users associated with an informer ecosystem, wherein the public blockchain is implemented in Ethereum with a smart contract, and wherein a specific blockchain ID and an incidence code is provided to the plurality of users as a proof of source; create a bridge between the public blockchain and a private blockchain to allow the plurality of obtained data stored in the public blockchain for transmission to the private blockchain; and perform, based on the plurality of obtained data being transmitted to the private blockchain and the proof of source, one or more payment transactions to the plurality of users associated with the informer ecosystem, wherein the one or more payment transactions are recorded in the private blockchain as reward transaction IDs preserving the anonymity of identities of the plurality of users.
[006] In yet another aspect, there is provided a computer program product comprising a non-transitory computer readable medium having a computer readable program embodied therein, wherein the computer readable program, when executed on a computing device, causes the computing device to: obtain, a plurality of data pertaining to one or more criminal activities in a public blockchain from a plurality of users associated with an informer ecosystem, wherein the public blockchain is implemented in Ethereum with a smart contract, and wherein a specific blockchain ID and an incidence code is provided to the plurality of users as a proof of source; create a bridge between the public blockchain and a private blockchain to allow the plurality of obtained data stored in the public blockchain for transmission to the private blockchain; and perform, based on the plurality of obtained data being transmitted to the private blockchain and the proof of source, one or more payment transactions to the plurality of users associated with the informer ecosystem,
wherein the one or more payment transactions are recorded in the private blockchain as reward transaction IDs preserving the anonymity of identities of the plurality of users.
[007] In accordance with an embodiment of the present disclosure, the Ethereum with the smart contract hashes the plurality of obtained data to be converted as a hashcode.
[008] In accordance with an embodiment of the present disclosure, the specific blockchain ID and the hashcode is considered as proof of incidence.
[009] In accordance with an embodiment of the present disclosure, the reward transaction ID is taken proof of payment in financial accounting systems for financial audit with zero knowledge about the payee.
[010] In accordance with an embodiment of the present disclosure, a chain of entities across whom the plurality of obtained data is shared in the blockchain network, is kept with logical trace without physical identification of the entities.
[011] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
[012] The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles:
[013] FIG. 1 illustrates a block diagram of a system for blockchain driven informer ecosystem for public safety and crime prevention, in accordance with some embodiments of the present disclosure.
[014] FIG. 2 is a flow diagram illustrating a processor implemented method for blockchain driven informer ecosystem for public safety and crime prevention, in accordance with some embodiments of the present disclosure.
[015] FIG. 3 illustrates an example of performing payment transactions while preserving the anonymity of identities of the plurality of users, in accordance with some embodiments of the present disclosure.
DETAILED DESCRIPTION OF EMBODIMENTS [016] Exemplary embodiments are described with reference to the accompanying drawings. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. Wherever convenient, the same reference numbers are used throughout the drawings to refer to the same or like parts. While examples and features of disclosed principles are described herein, modifications, adaptations, and other implementations are possible without departing from the scope of the disclosed embodiments. It is intended that the following detailed description be considered as exemplary only, with the true scope being indicated by the following embodiments described herein. [017] The embodiments herein provide a blockchain driven informer ecosystem for public safety and crime prevention. A primary defense system for vigilance and law enforcement group includes an informer ecosystem that gives prior information about potential crime or unwanted activities. In the informer ecosystem, informers could be a part of suspect groups. However, they usually remain loyal to police and intelligence teams in a covert way. Further, identities of informers are kept secret for their safety and preservation of vital information system. Also, these informers are compensated in kind and cash which is not accounted in government records in usual way. However, from perspective of democratic tenets and litigation procedures, information gathered from such informers need concrete citation. But, citation of the information received from informers is difficult without disclosure of source, which would break condition of anonymity. The method of proposed disclosure resolves the problem of making intelligence information testifiable and protecting anonymity of the informers at the same time by using the Blockchain and zero knowledge proof arrangements. In other words, concept of zero knowledge proof and a public-private blockchain network are used for crime and informer ecosystem, where incidences can be used as valid citations for litigation. This combination also serves as auditable but anonymous reward mechanism to propel the information machinery. The system of the present disclosure comprises a plurality of components including but not limited
to a plurality of Blockchain servers, a plurality of channels representing each trust domain with anchors across those Handheld, a plurality of mobile application devices, a plurality of terminals to interact with blockchain protocols, a plurality of encode trace algorithms which are specialized, a plurality of frameworks for deciphers, legal, identity, and intelligence community in chaincodes, a plurality of cipher notification systems with a plurality of verification protocols, an information validation consensus or a plurality of testimony protocol frameworks, specialized structure of public and private keys, and salts for encrypting and hashing data and identities of the plurality of users. This is further illustrated with the help of a non-limiting example. For example, it is assumed that one person X is part of criminal gang and also covertly an informer to police. Further, information provided by X to police personal about any imminent crime has to be kept anonymous in security interest of the informer. At the same time, explicit testimony help is needed litigation for lawful investigation and interrogation. This contradiction is resolved by the proposed technology arrangement. The informer that report the incidence that can be posted in code on a public blockchain implemented in Ethereum with a smart contract. Since the post only discloses blockchain ID and not physical ID, the testimony is taken as evidence when there have been similar reports made from the same blockchain ID in past ensuring that the past report had been legally vindicated. In that way, genuineness of source is established without physical testimony.
[018] Referring now to the drawings, and more particularly to FIG. 1 through FIG.3, where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments and these embodiments are described in the context of the following exemplary system and/or method.
[019] FIG. 1 illustrates a block diagram of a system for blockchain driven informer ecosystem for public safety and crime prevention, in accordance with an example embodiment of the present subject. In an embodiment, the system 100 includes one or more processors 106, communication interface device(s) or input/output (I/O) interface(s) 104, and one or more data storage devices or memory 102 operatively coupled to the one or more processors 106. The one or more
processors 106 that are hardware processors can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, graphics controllers, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the processor(s) are configured to fetch and execute computer-readable instructions stored in the memory. In the context of the present disclosure, the expressions ‘processors’ and ‘hardware processors’ may be used interchangeably. In an embodiment, the system 100 can be implemented in a variety of computing systems, such as laptop computers, notebooks, hand-held devices, workstations, mainframe computers, servers, a network cloud and the like. In an embodiment, the processor 106, the I/O interface 104, and the memory 102, may be coupled by a system bus.
[020] The I/O interface 104 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like. The interfaces 104 may include a variety of software and hardware interfaces, for example, interfaces for peripheral device(s), such as a keyboard, a mouse, an external memory, a camera device, and a printer. The interfaces 104 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, local area network (LAN), cable, etc., and wireless networks, such as Wireless LAN (WLAN), cellular, or satellite. For the purpose, the interfaces 104 may include one or more ports for connecting a number of computing systems with one another or to another server computer. The I/O interface 104 may include one or more ports for connecting a number of devices to one another or to another server.
[021] The memory 102 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes. In an embodiment, one or more modules (not shown) of the system 100 can be stored in the memory 102. The one or more modules (not shown) of the system 100 stored
in the memory 102 may include routines, programs, objects, components, data structures, and so on, which perform particular tasks or implement particular (abstract) data types. In an embodiment, the memory 102 includes a data repository 108 for storing data processed, received, and generated by the one or more hardware processors 106.
[022] The data repository 108, amongst other things, includes a system database and other data. In an embodiment, the data repository 108 may be external (not shown) to the system 100 and accessed through the I/O interfaces 104. The memory 102 may further comprise information pertaining to input(s)/output(s) of each step performed by the processor 106 of the system 100 and methods of the present disclosure. In an embodiment, the system database stores information being processed at each step of the proposed methodology. Further, the system database may store a public blockchain maintained as smart contract(s), a private blockchain, one or more attributes related to the public blockchain and private blockchain. The other data may include, data generated as a result of the execution of the one or more hardware processors 106 and the one or more modules (not shown) of the system 100 stored in the memory 102.
[023] In an embodiment, the system 100 of the present disclosure can be configured to reduce the manual intervention. A detailed description of the above-described blockchain driven informer ecosystem for public safety and crime prevention is shown with respect to illustrations represented with reference to FIG. 1 through FIG. 3 and use case examples.
[024] FIG. 2, with reference to FIG. 1, is an exemplary flow diagram of a processor implemented method for blockchain driven informer ecosystem for public safety and crime prevention, using the system 100 of FIG. 1, in accordance with some embodiments of the present disclosure. In an embodiment, the system 100 includes one or more data storage devices or memory 102 operatively coupled to the one or more processors 106 and is configured to store instructions configured for execution of steps of the method 200 by the one or more processors 106. The steps of the method 200 will now be explained in detail with reference to the components of the system 100 of FIG.1. Although process steps, method steps,
techniques or the like may be described in a sequential order, such processes, methods and techniques may be configured to work in alternate orders. In other words, any sequence or order of steps that may be described does not necessarily indicate a requirement that the steps be performed in that order. The steps of processes described herein may be performed in any order practical. Further, some steps may be performed simultaneously.
[025] Referring to FIG. 2, at step 202, the one or more hardware processors 106 are configured to obtain, a plurality of data pertaining to one or more criminal activities in a public blockchain from a plurality of users associated with an informer ecosystem. Here, the plurality of users may include but not limited to the informer, criminal, and the like who can further post crime information in the public blockchain. In an embodiment, a specific blockchain ID and an incidence code is provided to the plurality of users as a proof of source. Here, the incidence code may include a suspect code, a cluster code, a category of incidence, imminence and impact. Further, the user posting the crime information in the public blockchain remains anonymous in record. In an embodiment, the public blockchain is implemented in Ethereum with a smart contract, wherein the smart contract represents a public post box-based format to store information. In an embodiment, the information posted by the plurality of users for an investigation/litigation case may comprise one or more parameters which are further represented by a classified set of structured information that uniquely define the investigation/litigation case. For example, the classified set of structured information for a particular case could be represented as below:
Territory>> Riverie Illinois
Name> Dang>>
Date and Time> 2nd Dec 2019
Crime Category>Drug Trafficking
Imminence> Week In an embodiment, the Ethereum with the smart contract hashes the plurality of obtained data to be converted as a hashcode. In an embodiment, the hashcode generated for above-mentioned classified set of structured information could be
aba540c6336e1278b36df170d90e95900bc99afeed1006b5eaaf223d3e027401, which
is generated using SHA256 algorithm. The SHA256 is one of cryptographic standards for hashing. It invokes use libraries, such as hashlib in python and ensures that hash of a content is practically unique, with chance of collision being 1077. The SHA256 algorithm is a work of well-established mathematical routine in cryptography. The hashing can be introduced as an extended text which is kept secret (alternatively referred as salt) so that hashing validation can be done only by information owners. For example, the above classified set of structured information is extended with the salt “sunny” and hashed as follows:
Territory>> Riverie Illinois
Name> Dang>>
Date and Time> 2nd Dec 2019
Crime Category>Drug Trafficking
Imminence> Week
Salt> sunny
and hashcode generated for the extended information is
a0dff933890004060d9e37c8c249c6f194dc9029422276385840dc6fc0a2c71f.
[026] In other words, the crime information posted by the plurality of users in the public blockchain are encoded as an unique code and structure which is referred as hashcode. The hashcode cannot be decoded back and represents coding of an information into unreadable content that results uniquely from the information. In an embodiment, the specific blockchain ID and the hashcode are considered as proof of incidence. For example, a crime prevention ecosystem is considered in which a first person named as Harry is a criminal who is part of a gang but secretly cooperates with police as an informer, a second person named as Dick is a criminal in the same gang as Harry who is about to perform a crime, a third person named as John is a local police officer who is secretly connected with Harry, a fourth person named as Mary is an investigation officer in crime prevention, and a fifth person named as Jim is a public prosecutor who is an assigned attorney by a crime department. Thus, in accordance with step 202 of the
FIG. 2, John shares a publicly available blockchain address with Harry. The publicly available blockchain is in public Ethereum with a smart contract where anyone can post information in a given structure and code. Harry attains a specific blockchain ID (Alternatively referred as unique Ethereum ID) and informs John his ID that John should follow. A non-limiting illustrative example of the specific blockchain ID is 0x3061cC3C0Cf8ECeC17cE5ec927f0293CC6552086. Further, Harry posts the crime information on the smart contract in a specific structure using his ID. However, physical identity of Harry is not known to anyone who reads the blockchain record. The post of Harry is granted an incidence code by the Ethereum which is considered as proof of incidence. Further, as depicted in step 204 of FIG. 2, the one or more hardware processors 106 are configured to create a bridge between the public blockchain and a private blockchain to allow the plurality of obtained data stored in the public blockchain for transmission to the private blockchain. In an embodiment, the private blockchain is built in hyperledger fabric and record information of crime department and only visible to authorities of the crime department including police officers. The private blockchain can be used to assign tasks like investigation and prosecution using anonymous source IDs. Further, the private blockchain can perform incidence routing, incidence enhancement, incidence citation, and incidence testification records (alternatively referred as oracalization). In an embodiment, the bridge is created using a standard ‘Geth’ function which allows an Ethereum Client connected with a known Web3 Nodejs Framework to push data into the hyperledger fabric through a known grpc api. The incidence information which is encoded is further pushed through Kafka messages to ensure tolerance to temporary transaction failure. Referring back to previous example, the crime information posted by Harry is grabbed by John and passed to Mary. Mary knows Blockchain ID of Harry without knowing his physical identity. Further, Jim cites the unique incidence code and blockchain ID of Harry as proof of source. However, Jim does not know Harry but only the ID. In such a case, at prosecution stage, court accepts the incidence as a valid proof which using the conventional methods was not possible. In some scenarios, John may be called to testify his knowledge about source of information without revealing the source.
In challenged cases, appointed agencies can testify by auditing the source against the ID. Such agencies are called Oracalizers in Ethereum blockchain.
[027] Further, as depicted in step 206 of FIG. 2, the one or more hardware processors 106 are configured to perform, based on the plurality of obtained data being transmitted to the private blockchain and the proof of source, one or more payment transactions to the plurality of users associated with the informer ecosystem, wherein the one or more payment transactions are recorded in the private blockchain as reward transaction IDs preserving the anonymity of identities of the plurality of users. FIG. 3 illustrates an example of performing payment transactions while preserving the anonymity of identities of the plurality of users, in accordance with some embodiments of the present disclosure. As can be seen in FIG. 3, it is dpecited how a reward of an amount (e.g., 100 Ethers) has been credited to the anonymous person whose ID is displayed there in.
[028] In other words, the plurality of users are paid off for providing the information if the information is validated to be correct and financial accounting of payment is recorded in the private blockchain preserving the privacy of the identities of the plurality of users. In an embodiment, the plurality of users are paid by looping back the bridge between crypto payment in Ethereum. With reference to the previous example, John initiate crypto payment to Harry’s Ethereum ID as his reward. While Harry gets the currencies in Ethereum, his identity is not known in John’s accounting system. Further, reward transaction ID is taken as proof of payment in financial accounting systems for financial audit with zero knowledge about the payee. In an embodiment, a chain of entities across whom the plurality of obtained data is shared in the blockchain network, is kept with logical trace without physical identification of the entities. In other words, whole chain of entities across whom the information is shared, from informer to different intelligence and public department, is kept with logical trace without physical identification of the entities. This serves as vital communication engine with secrecy maintained. This means that original data transmitted from different entities in public blockchain such as informer, criminal to private blockchain such as police officials and further to other entities such as investigators, court, legal counselors, and the like remains
unchanged and physical identities of the entities remain undisclosed. In an embodiment, the created bridge using the known technology Web3 pushes payment incidence information to an ERP financial accounting for auditability. In other words, the records of the financial accounting of payment are used as citation with accounting systems for financial audit.
[029] The written description describes the subject matter herein to enable any person skilled in the art to make and use the embodiments. The scope of the subject matter embodiments is defined herein and may include other modifications that occur to those skilled in the art. Such other modifications are intended to be within the scope of the present disclosure if they have similar elements that do not differ from the literal language of the embodiments or if they include equivalent elements with insubstantial differences from the literal language of the embodiments described herein.
[030] The embodiments of present disclosure herein address an unresolved problem of legalizing anonymous information, making payment to anonymous auditable in an informer ecosystem for public safety and crime prevention. The embodiments, thus provide a framework in which a network of crime prevention intelligence is built with security and incentives to the informers, a new mechanism of citation in crime litigation process is created by allowing public Ethereum, representing informers network which allows providing information without any disclosure and regulation and bridging the public Ethereum with crime department’s private network. The bridging step allows departmental processes and workflows such as prosecution or investigation to be performed with federal secured network. This informal information system that leads to public action can be converted to a structured system of records in Blockchain, preserving anonymity of the informer and connected ecosystem people. At the same time, the blockchain ensures genuine incidence of the information and logical existence of verified source. It becomes a plausible basis for public action, litigation and needed citations while preserving human rights. The same system of records also serves as a vehicle for compensation to the informers, either with use cryptocurrency or kind, but keeping accountable journal of public expense. The anonymity of the beneficiary is
still preserved. It also mitigates threats and exposure risks to public workers. Even the information can be codified in the way that it can be legally cited on legitimate demand and remain ciphered otherwise.
[031] It is to be understood that the scope of the protection is extended to such a program and in addition to a computer-readable means having a message therein; such computer-readable storage means contain program-code means for implementation of one or more steps of the method, when the program runs on a server or mobile device or any suitable programmable device. The hardware device can be any kind of device which can be programmed including e.g. any kind of computer like a server or a personal computer, or the like, or any combination thereof. The device may also include means which could be e.g. hardware means like e.g. an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or a combination of hardware and software means, e.g. an ASIC and an FPGA, or at least one microprocessor and at least one memory with software processing components located therein. Thus, the means can include both hardware means and software means. The method embodiments described herein could be implemented in hardware and software. The device may also include software means. Alternatively, the embodiments may be implemented on different hardware devices, e.g. using a plurality of CPUs.
[032] The embodiments herein can comprise hardware and software elements. The embodiments that are implemented in software include but are not limited to, firmware, resident software, microcode, etc. The functions performed by various components described herein may be implemented in other components or combinations of other components. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can comprise, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
[033] The illustrated steps are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation.
Further, the boundaries of the functional building blocks have been arbitrarily
defined herein for the convenience of the description. Alternative boundaries can
be defined so long as the specified functions and relationships thereof are
appropriately performed. Alternatives (including equivalents, extensions,
variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope of the disclosed embodiments. Also, the words “comprising,” “having,” “containing,” and “including,” and other similar forms are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise.
[034] Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.
[035] It is intended that the disclosure and examples be considered as exemplary only, with a true scope of disclosed embodiments being indicated herein.
We Claim:
1. A processor implemented method, comprising:
obtaining (202), a plurality of data pertaining to one or more criminal activities in a public blockchain from a plurality of users associated with an informer ecosystem, wherein the public blockchain is implemented in Ethereum with a smart contract, and wherein a specific blockchain ID and an incidence code is provided to the plurality of users as a proof of source;
creating (204) a bridge between the public blockchain and a private blockchain to allow the plurality of obtained data stored in the public blockchain for transmission to the private blockchain; and
performing (206), based on the plurality of obtained data being transmitted to the private blockchain and the proof of source, one or more payment transactions to the plurality of users associated with the informer ecosystem, wherein the one or more payment transactions are recorded in the private blockchain as reward transaction IDs preserving the anonymity of identities of the plurality of users.
2. The method as claimed in claim 1, wherein the Ethereum with the smart contract hashes the plurality of obtained data to be converted as a hashcode.
3. The method as claimed in claim 1, wherein the specific blockchain ID and the hashcode is considered as proof of incidence.
4. The method as claimed in claim 1, wherein the reward transaction ID is taken proof of payment in financial accounting systems for financial audit with zero knowledge about the payee.
5. The method as claimed in claim 1, wherein a chain of entities across whom the plurality of obtained data is shared in the blockchain network, is kept with logical trace without physical identification of the entities.
6. A system (100), comprising:
one or more data storage devices (102) operatively coupled to one or more hardware processors (106) and configured to store instructions configured for execution via the one or more hardware processors to:
obtain, a plurality of data pertaining to one or more criminal activities in a public blockchain from a plurality of users associated with an informer ecosystem, wherein the public blockchain is implemented in Ethereum with a smart contract, and wherein a specific blockchain ID and an incidence code is provided to the plurality of users as a proof of source;
create a bridge between the public blockchain and a private blockchain to allow the plurality of obtained data stored in the public blockchain for transmission to the private blockchain; and
perform, based on the plurality of obtained data being transmitted to the private blockchain and the proof of source, one or more payment transactions to the plurality of users associated with the informer ecosystem, wherein the one or more payment transactions are recorded in the private blockchain as reward transaction IDs preserving the anonymity of identities of the plurality of users.
7. The system as claimed in claim 6, wherein the Ethereum with the smart contract hashes the plurality of obtained data to be converted as a hashcode.
8. The system as claimed in claim 6, wherein the specific blockchain ID and the hashcode is considered as proof of incidence.
9. The system as claimed in claim 6, wherein the reward transaction ID is taken proof of payment in financial accounting systems for financial audit with zero knowledge about the payee.
10. The system as claimed in claim 6, wherein a chain of entities across whom
the plurality of obtained data is shared in the blockchain network, is kept with logical trace without physical identification of the entities.
| # | Name | Date |
|---|---|---|
| 1 | 202021027218-IntimationOfGrant28-03-2025.pdf | 2025-03-28 |
| 1 | 202021027218-STATEMENT OF UNDERTAKING (FORM 3) [26-06-2020(online)].pdf | 2020-06-26 |
| 1 | 202021027218-Written submissions and relevant documents [19-04-2024(online)].pdf | 2024-04-19 |
| 2 | 202021027218-Correspondence to notify the Controller [08-04-2024(online)].pdf | 2024-04-08 |
| 2 | 202021027218-PatentCertificate28-03-2025.pdf | 2025-03-28 |
| 2 | 202021027218-REQUEST FOR EXAMINATION (FORM-18) [26-06-2020(online)].pdf | 2020-06-26 |
| 3 | 202021027218-FORM 18 [26-06-2020(online)].pdf | 2020-06-26 |
| 3 | 202021027218-US(14)-ExtendedHearingNotice-(HearingDate-10-04-2024).pdf | 2024-04-08 |
| 3 | 202021027218-Written submissions and relevant documents [19-04-2024(online)].pdf | 2024-04-19 |
| 4 | 202021027218-FORM 1 [26-06-2020(online)].pdf | 2020-06-26 |
| 4 | 202021027218-Correspondence to notify the Controller [19-03-2024(online)].pdf | 2024-03-19 |
| 4 | 202021027218-Correspondence to notify the Controller [08-04-2024(online)].pdf | 2024-04-08 |
| 5 | 202021027218-US(14)-ExtendedHearingNotice-(HearingDate-10-04-2024).pdf | 2024-04-08 |
| 5 | 202021027218-FORM-26 [19-03-2024(online)].pdf | 2024-03-19 |
| 5 | 202021027218-FIGURE OF ABSTRACT [26-06-2020(online)].jpg | 2020-06-26 |
| 6 | 202021027218-US(14)-HearingNotice-(HearingDate-08-04-2024).pdf | 2024-02-28 |
| 6 | 202021027218-DRAWINGS [26-06-2020(online)].pdf | 2020-06-26 |
| 6 | 202021027218-Correspondence to notify the Controller [19-03-2024(online)].pdf | 2024-03-19 |
| 7 | 202021027218-FORM-26 [19-03-2024(online)].pdf | 2024-03-19 |
| 7 | 202021027218-DECLARATION OF INVENTORSHIP (FORM 5) [26-06-2020(online)].pdf | 2020-06-26 |
| 7 | 202021027218-CLAIMS [24-06-2022(online)].pdf | 2022-06-24 |
| 8 | 202021027218-COMPLETE SPECIFICATION [26-06-2020(online)].pdf | 2020-06-26 |
| 8 | 202021027218-FER_SER_REPLY [24-06-2022(online)].pdf | 2022-06-24 |
| 8 | 202021027218-US(14)-HearingNotice-(HearingDate-08-04-2024).pdf | 2024-02-28 |
| 9 | 202021027218-CLAIMS [24-06-2022(online)].pdf | 2022-06-24 |
| 9 | 202021027218-FER.pdf | 2022-02-16 |
| 9 | 202021027218-FORM-26 [23-10-2020(online)].pdf | 2020-10-23 |
| 10 | 202021027218-FER_SER_REPLY [24-06-2022(online)].pdf | 2022-06-24 |
| 10 | 202021027218-Proof of Right [23-12-2020(online)].pdf | 2020-12-23 |
| 10 | Abstract1.jpg | 2021-10-19 |
| 11 | 202021027218-FER.pdf | 2022-02-16 |
| 11 | 202021027218-Proof of Right [23-12-2020(online)].pdf | 2020-12-23 |
| 11 | Abstract1.jpg | 2021-10-19 |
| 12 | 202021027218-FER.pdf | 2022-02-16 |
| 12 | 202021027218-FORM-26 [23-10-2020(online)].pdf | 2020-10-23 |
| 12 | Abstract1.jpg | 2021-10-19 |
| 13 | 202021027218-Proof of Right [23-12-2020(online)].pdf | 2020-12-23 |
| 13 | 202021027218-FER_SER_REPLY [24-06-2022(online)].pdf | 2022-06-24 |
| 13 | 202021027218-COMPLETE SPECIFICATION [26-06-2020(online)].pdf | 2020-06-26 |
| 14 | 202021027218-CLAIMS [24-06-2022(online)].pdf | 2022-06-24 |
| 14 | 202021027218-DECLARATION OF INVENTORSHIP (FORM 5) [26-06-2020(online)].pdf | 2020-06-26 |
| 14 | 202021027218-FORM-26 [23-10-2020(online)].pdf | 2020-10-23 |
| 15 | 202021027218-COMPLETE SPECIFICATION [26-06-2020(online)].pdf | 2020-06-26 |
| 15 | 202021027218-DRAWINGS [26-06-2020(online)].pdf | 2020-06-26 |
| 15 | 202021027218-US(14)-HearingNotice-(HearingDate-08-04-2024).pdf | 2024-02-28 |
| 16 | 202021027218-DECLARATION OF INVENTORSHIP (FORM 5) [26-06-2020(online)].pdf | 2020-06-26 |
| 16 | 202021027218-FIGURE OF ABSTRACT [26-06-2020(online)].jpg | 2020-06-26 |
| 16 | 202021027218-FORM-26 [19-03-2024(online)].pdf | 2024-03-19 |
| 17 | 202021027218-FORM 1 [26-06-2020(online)].pdf | 2020-06-26 |
| 17 | 202021027218-DRAWINGS [26-06-2020(online)].pdf | 2020-06-26 |
| 17 | 202021027218-Correspondence to notify the Controller [19-03-2024(online)].pdf | 2024-03-19 |
| 18 | 202021027218-FIGURE OF ABSTRACT [26-06-2020(online)].jpg | 2020-06-26 |
| 18 | 202021027218-FORM 18 [26-06-2020(online)].pdf | 2020-06-26 |
| 18 | 202021027218-US(14)-ExtendedHearingNotice-(HearingDate-10-04-2024).pdf | 2024-04-08 |
| 19 | 202021027218-REQUEST FOR EXAMINATION (FORM-18) [26-06-2020(online)].pdf | 2020-06-26 |
| 19 | 202021027218-FORM 1 [26-06-2020(online)].pdf | 2020-06-26 |
| 19 | 202021027218-Correspondence to notify the Controller [08-04-2024(online)].pdf | 2024-04-08 |
| 20 | 202021027218-FORM 18 [26-06-2020(online)].pdf | 2020-06-26 |
| 20 | 202021027218-STATEMENT OF UNDERTAKING (FORM 3) [26-06-2020(online)].pdf | 2020-06-26 |
| 20 | 202021027218-Written submissions and relevant documents [19-04-2024(online)].pdf | 2024-04-19 |
| 21 | 202021027218-PatentCertificate28-03-2025.pdf | 2025-03-28 |
| 21 | 202021027218-REQUEST FOR EXAMINATION (FORM-18) [26-06-2020(online)].pdf | 2020-06-26 |
| 22 | 202021027218-IntimationOfGrant28-03-2025.pdf | 2025-03-28 |
| 22 | 202021027218-STATEMENT OF UNDERTAKING (FORM 3) [26-06-2020(online)].pdf | 2020-06-26 |
| 1 | 202021027218E_15-02-2022.pdf |