// IBR-TECH
C.A.P.
Catch A Predator — Child Safety Platform
Doc ID IBR-CAP-ARCH
Classification IBR-TECH CONFIDENTIAL
// Section 01 — System Architecture

C.A.P. System Architecture

The C.A.P. (Catch A Predator) platform is a hardware-based child safety appliance operating at the network infrastructure layer. Unlike device-level parental controls, C.A.P. inspects all traffic traversing the home network regardless of endpoint, making it resistant to child-initiated bypass and invisible to the devices being monitored.

Network Topology & Placement
INTERNET WAN ISP ISP MODEM Gateway / DOCSIS / Fiber ALL TRAFFIC C.A.P. IBR-CAP Transparent Bridge / Inline DPI · Pattern Match · Log ROUTER Wi-Fi / Switch CHILD PHONE Mobile iOS/Android TABLET iPad / Fire Kid Profile GAME CONSOLE Xbox / PS / Switch Voice + Chat PC / LAPTOP Windows / Mac Chromebook SMART TV / IOT Roku / FireTV Voice Assistants SECURE MGMT CHANNEL TLS 1.3 · mTLS IBR-TECH CLOUD Signature Updates Evidence Vault · Alerts PARENT APP iOS / Android Push Alerts · Review ENCRYPTED ALERTS FIG 1.1 — C.A.P. INLINE DEPLOYMENT TOPOLOGY
Fig 1.1 · Inline transparent-bridge placement between ISP modem and home router
// Design Intent
Placement between the ISP modem and the home router ensures every packet entering or leaving the household passes through C.A.P.'s inspection pipeline. Children cannot bypass inspection by changing device settings, using incognito mode, or switching to cellular data — the device operates at a layer below operating-system control.
Layered Module Architecture
L5 · CLOUD SERVICES LAYER IBR-TECH MANAGED INFRASTRUCTURE Signature Feed Evidence Vault Alert Dispatch Device Mgmt · OTA Parent App Backend L4 · APPLICATION LAYER ON-DEVICE BUSINESS LOGIC Risk Scorer Policy Engine Alert Generator Evidence Sealer Local Admin Web UI (LAN only) L3 · DETECTION ENGINE CORE IP — PATENT PENDING Signature Matcher Behavioral Analyzer Flow Correlator Content Classifier Whitelist Filter L2 · DEEP PACKET INSPECTION & PROTOCOL DECODER TLS/SNI Inspector DNS Monitor HTTP Parser App Proto Decoder Flow State Tracker (conntrack) L1 · HARDWARE & DATA PLANE PHYSICAL INFRASTRUCTURE Dual GbE MAC/PHY WAN · LAN SoC · Quad-Core ARM w/ Crypto Accelerator DDR4 RAM · 4GB Flow Tables · Buffers eMMC · 32GB OS · Signatures · Logs Secure Element · TPM 2.0 Evidence Signing Keys FIG 1.2 — FIVE-LAYER ARCHITECTURE STACK
Fig 1.2 · Five-layer architecture stack, hardware (L1) to cloud (L5)
Layer Responsibilities
L1 · Hardware / Data Plane

Dual gigabit Ethernet interfaces operate in transparent bridge mode. Traffic is mirrored to the detection pipeline in parallel with forwarding, minimizing added latency (<1ms target).

A dedicated secure element (TPM 2.0) holds cryptographic keys used for evidence signing and secure boot attestation. The SoC's crypto accelerator handles TLS metadata inspection (SNI extraction, ClientHello fingerprinting) and signature matching at line rate. C.A.P. does not perform TLS interception or payload decryption.

L2 · DPI & Protocol Decoder

Classifies flows by protocol — HTTPS (via SNI and ClientHello fingerprinting), DNS, HTTP, and protocol identification for messaging and game/voice services where possible.

Maintains per-flow state via connection tracking. Encrypted payloads are not decrypted under any circumstances; banking, health, and financial domains are categorically excluded from any inspection at the protocol level. For inspectable traffic (cleartext only) and for metadata across all flows, the relevant signals are passed to L3.

L3 · Detection Engine (Patent Core)

The heart of the C.A.P. patent claim. Four parallel detectors — signature, behavioral, flow-correlation, and content-classification — feed a unified risk score.

Signatures target known predator-communication patterns (grooming phrases, credential- exfiltration patterns, indicator domains). Behavioral analysis flags timing, contact asymmetry, and platform-hopping indicative of grooming.

L4 · Application Layer

Converts detection events into actionable outputs. The risk scorer aggregates signals across time windows; the policy engine applies household-specific rules (age of child, quiet hours, allowed platforms).

When thresholds are crossed, the evidence sealer cryptographically signs the relevant packet captures and metadata, and the alert generator dispatches a parent notification via the secure management channel.

L5 · Cloud Services

IBR-Tech operates a managed signature-distribution feed (updated continuously from curated threat intelligence, public threat feeds where licensing permits, and the C.A.P. deployed-fleet telemetry).

A tamper-evident evidence vault provides redundant offsite storage of sealed evidence packages. The parent app backend handles push notifications, review, parental acknowledgment, and parent-initiated NCMEC CyberTipline reporting.

Data Flow Summary

PACKET L1→L2 DECODE L2→L3 SCORE L3→L4 SEAL L4→L5 ALERT

Typical detection-to-parent-alert latency: 2–6 seconds under normal load. All pipeline stages are instrumented for observability and auditability.

Key Architectural Properties
  1. Bypass resistance — By operating below the OS layer on every device, C.A.P. cannot be disabled by children through device settings, VPN apps, or browser incognito modes. The only way around it is to take the device off the home network entirely.
  2. Zero user configuration — Plug between modem and router; device auto-configures bridge mode, auto-discovers devices, and begins monitoring. No router reconfiguration required.
  3. Privacy-preserving whitelist — Banking, medical, tax, and government domains are categorically excluded from deep inspection at the protocol level, not just the policy level.
  4. Fail-open by design — C.A.P. is engineered to never become a single point of failure for the household's internet connectivity. A hardware fail-open relay and an independent watchdog ensure that if the device loses power, hangs, or experiences a firmware fault, traffic continues to flow between the modem and router unimpeded. See the Failsafe Subsystem section below.
  5. Offline-capable — Core detection and alerting continue functioning during cloud connectivity loss. Evidence queues locally on encrypted storage until the secure channel is restored.
  6. Chain-of-custody integrity — Every alert is tied to a cryptographically signed evidence package with timestamped hash chain, TPM-attested device provenance, and tamper-evident sealing suitable for introduction as evidence (see Section 03).
  7. Firmware integrity — Secure boot is verified by the TPM on every power-on. OTA updates require Ed25519 signature verification from the IBR-Tech signing authority.
Failsafe Subsystem
Design Principle

An inline network appliance carries an inherent risk: if the appliance fails, every downstream device loses internet connectivity. A child-safety product that takes a household offline is a worse outcome than one that briefly stops monitoring. C.A.P.'s failsafe subsystem ensures the device cannot become a single point of failure for household connectivity.

Hardware Fail-Open Relay

A normally-closed bypass relay is wired in parallel with C.A.P.'s inline data path. During healthy operation, the relay is held open by an active control signal from the SoC — traffic flows through C.A.P.'s inspection pipeline as designed.

If the SoC's control signal drops for any reason (loss of DC power, firmware panic, watchdog reset, deliberate user-initiated bypass), the relay closes within milliseconds and creates a direct copper bypass between the WAN and LAN ports. The household's internet connection continues to function, with C.A.P. transparently out of the path.

The relay is electromechanical, requires no firmware to operate in its bypass state, and defaults to bypass-closed at power-up until the SoC explicitly takes inspection control.

Independent Hardware Watchdog

A discrete watchdog timer runs on its own clock domain, independent of the SoC. The firmware must service the watchdog at fixed intervals; if it fails to do so (kernel hang, driver fault, firmware loop), the watchdog asserts a reset signal that both reboots the SoC and drops the relay control signal — engaging the fail-open bypass.

The watchdog is socketed into the BOM as a hardware element, not a firmware feature, so a firmware compromise cannot disable it.

Status Indication & Cloud Notification

A dedicated front-panel LED reflects the failsafe state: steady cyan = healthy and inspecting; amber = degraded but inspecting; red = bypass engaged, traffic uninspected. The parent mobile application also receives a push notification within seconds of any fail-open event so the household is aware inspection is not currently active.

Bypass events are logged locally and reported to the IBR-Tech management cloud for fleet-level reliability monitoring.

User-Initiated Bypass

A physical pair button on the device, held for five seconds, triggers a deliberate fail-open bypass. This is for households who want to temporarily take C.A.P. out of the path (e.g., for diagnosing an unrelated network issue) without unplugging cables. The parent app surfaces the event in the same way as a fault-driven bypass.

// Honest Trade-off
Fail-open is a deliberate choice. The alternative — fail-closed, which would maintain "security" by blocking all internet during a fault — was rejected because the C.A.P. threat model is parental awareness, not active enforcement. Taking a household offline because a child-safety appliance encountered a fault is the wrong failure mode. If inspection becomes unavailable, the household receives a notification and can investigate; meanwhile, internet continues to work.
// Section 02 — Detection Engine

Detection Engine Design

The Detection Engine (L3) is the patent-core innovation of C.A.P. It is a parallel multi-detector system that evaluates every inspectable flow against four independent signals, then fuses those signals into a unified risk score via a weighted ensemble with household-tunable thresholds.

Detection Pipeline
L2 INPUT Decoded Flows Metadata + Hashes WHITELIST Privacy Gate Bank/Med/Gov Skip SIGNATURE MATCHER Aho-Corasick · Vectorscan BEHAVIORAL ANALYZER Timing · Asymmetry · Tempo FLOW CORRELATOR Cross-Platform Linking CONTENT CLASSIFIER URL Reputation · Image Hash FUSION Weighted Ensemble Risk Score 0–100 + Confidence Band THRESHOLD GATE Policy · Age · Profile → Alert or Log FIG 2.1 — PARALLEL DETECTION PIPELINE WITH WEIGHTED FUSION
Fig 2.1 · Parallel multi-detector pipeline feeding weighted-ensemble fusion
Detector Specifications
01 · Signature Matcher

High-throughput multi-pattern string matcher built on the Aho-Corasick algorithm, with SIMD acceleration on supported targets (Vectorscan on ARM, equivalents elsewhere). Matches cleartext-inspectable traffic (HTTP headers, DNS names, unencrypted chat, SNI values) against curated signature sets.

AttributeSpecification
Signature CategoriesGrooming language patterns · Credential-phishing patterns targeting minors · Known bad domains · SNI fingerprints of platforms commonly used for predatory contact
Signature SourceCurated IBR-Tech threat-intelligence feed · Community-vetted submissions · Public threat feeds where licensing permits
Update CadenceIncremental feed every 15 min · Full roll every 24 h
Match ThroughputUp to 1 Gbps aggregate with tuned rule sets on target SoC; benchmarking ongoing
Signature Count (target)~250,000 rules at GA on current 4 GB hardware; ~750K growth envelope on current platform; 2M+ on next-generation appliance
Reporting PathwayParent-initiated NCMEC CyberTipline reporting; no vendor-claimed law-enforcement integrations
False-Positive MitigationContext-scoped rules; no rule fires standalone — always feeds the fusion layer with a confidence weight
02 · Behavioral Analyzer

Operates on flow metadata (who talks to whom, when, how often, how much). Grooming has well-documented behavioral fingerprints — rapid escalation of contact frequency from a new contact, off-hours messaging bursts, and platform-hopping from public to private. These signals are heuristic by nature and feed the fusion layer with confidence weights rather than firing alerts independently. Several indicators (off-hours clustering in particular) can be defeated by VPN or cellular use; the fusion model is designed not to depend on any single behavioral signal.

IndicatorDescription
Contact VelocitySudden rise in message frequency with a new external party relative to baseline
Reciprocity AsymmetryOne-sided initiation pattern — adult-initiation dominance
Off-Hours ClusteringDisproportionate activity between 22:00–06:00 local; weak signal in isolation, useful in fusion
Platform HoppingContact initiated on public platform then migrates to private/encrypted channel within 72 h; behavioral heuristic, not deterministic identity correlation
Session Duration SpikesExtended late-night sessions with a single endpoint
ModelGradient-boosted ensemble + rule overlay; runs entirely on-device
03 · Flow Correlator

Links flows across platforms that appear, on a behavioral-heuristic basis, to represent the same external adult contact. This addresses the common grooming pattern of moving a child from an initial platform (game chat, public social) to a more private channel.

Correlation is performed on metadata only — temporal proximity, traffic volume correlation, and platform-transition patterns learned from known grooming case studies. No content cross-platform correlation is performed. Cross-platform identity correlation under encryption is an inherent heuristic, not a deterministic identification, and is scored accordingly in the fusion layer.

04 · Content Classifier

For inspectable (cleartext) traffic only. Primary workloads are (a) URL and domain reputation matching against publicly available threat-intelligence feeds, and (b) image perceptual-hash comparison against IBR-Tech's curated indicator set of known-bad content fingerprints, where licensing permits.

// Important Legal Boundary
C.A.P. never stores, displays, transmits, or analyzes child sexual abuse material in any form. The system operates exclusively on cryptographic hashes and perceptual fingerprints — never on underlying content. IBR-Tech does not hold, and does not claim to hold, access to NCMEC PhotoDNA or DHS HERO databases, which are gated behind formal MOUs typically granted only to large platforms or federal law enforcement. C.A.P.'s reporting pathway is parent-initiated through the public NCMEC CyberTipline; no automated vendor reporting occurs.
Risk Score Fusion

Each detector outputs a per-event tuple: (category, raw_score ∈ [0,1], confidence ∈ [0,1]). The fusion layer combines them into a single risk score R ∈ [0, 100] with an attached confidence band.

DetectorDefault WeightRationale
Signature Matcher0.35High precision for known-bad patterns; directly actionable
Behavioral Analyzer0.30Strong grooming-pattern indicator; detects novel cases
Flow Correlator0.15Corroborating signal; low standalone precision
Content Classifier0.20Corroborating signal on URL/domain reputation and image-hash matches against IBR-Tech indicator sets

Thresholds (default, household-adjustable):

  • R < 25 Log only; no parent notification
  • 25 ≤ R < 60 Daily digest notification to parent app
  • 60 ≤ R < 85 Immediate push alert
  • R ≥ 85 Immediate push + evidence seal + optional law-enforcement export flow
// Parent in the Loop
C.A.P. does not take autonomous action against devices (no blocking, no disconnection, no messaging to the child, no messaging to the external contact). It surfaces risk to the parent. All response decisions are human-in-the-loop, with evidence review built into the parent app.
// Section 03 — Evidence Chain-of-Custody

Evidence Preservation & Chain-of-Custody

For C.A.P. to meaningfully support law-enforcement action, evidence it preserves must be forensically sound — authenticated at origin, unaltered in transit, time-verifiable, and tamper-evident. This section defines the cryptographic and procedural design for the evidence chain.

Evidence Sealing Flow
CAPTURE Trigger Event Relevant Flows PACKAGE PCAP + Metadata Manifest.json HASH SHA-256 · Merkle Root Hash SIGN TPM Ed25519 Device Key TIMESTAMP RFC 3161 TSA Trusted 3rd-Party LOCAL SEAL Encrypted eMMC WORM Partition CLOUD REPLICA Evidence Vault Object-Lock · Multi-Region PARENT NOTIFY Alert + Evidence ID Review Required LE EXPORT Parent-Initiated Signed Package Export NCMEC / LE CyberTipline Chain Preserved FIG 3.1 — EVIDENCE SEALING & CHAIN-OF-CUSTODY FLOW
Fig 3.1 · End-to-end evidence sealing, replication, and export flow
Evidence Package Structure

Each sealed evidence package is a self-contained archive containing everything required to verify authenticity and integrity independently of the C.A.P. device or IBR-Tech cloud.

ArtifactContents
pcap.binPacket capture of the triggering flow(s), filtered to the event window
manifest.jsonDetector outputs, risk score, fusion weights, policy state, ruleset version
device_attest.jsonTPM quote: firmware hash, secure-boot state, device serial, public key fingerprint
merkle_root.binSHA-256 Merkle root over all artifacts; binds the package
device_sig.binEd25519 signature over merkle_root by device's TPM-resident key
tsa_token.tsrRFC 3161 timestamp from an external Trusted Timestamp Authority
chain.pemFull certificate chain from device key → IBR-Tech intermediate CA → root
Chain-of-Custody Properties
  1. Origin authentication — The device-resident Ed25519 signing key is generated inside the TPM at provisioning and never exits the secure element. Signatures therefore bind each package to the specific C.A.P. unit that produced it.
  2. Integrity — Merkle-root binding means altering any artifact invalidates the device signature. Downstream systems (parent app, cloud vault, LE portal) verify before accepting.
  3. Independent time verification — An external RFC 3161 Trusted Timestamp Authority countersigns the merkle root. This establishes "package existed at or before time T" without requiring trust in the device's own clock.
  4. Tamper evidence — Local storage uses an encrypted write-once partition; the cloud replica uses object-lock (immutable for the retention period). Any attempt to modify or delete is logged and detectable.
  5. Provenance attestation — Every package includes a TPM quote proving the device was running signed, unmodified IBR-Tech firmware at the moment of capture. This defeats "rogue firmware" defenses in court.
  6. Privacy-preserving export — Law-enforcement export is strictly parent-initiated. No automatic LE forwarding occurs. NCMEC CyberTipline pathways are available but opt-in per event.
  7. Verifiable chain — IBR-Tech publishes the intermediate CA public key and revocation list. Independent verifiers (defense counsel, courts, NCMEC) can validate any package without contacting IBR-Tech.
// Legal Disclaimer (for patent filing and product docs)
Forensic-admissibility of digital evidence is jurisdiction-dependent and ultimately determined by courts on a case-by-case basis. C.A.P.'s design provides the technical properties commonly required for admissibility (authentication, integrity, chain-of-custody), but IBR-Tech makes no legal guarantee of admissibility in any specific jurisdiction. Legal review by counsel is required before any courtroom claims are made in marketing materials.
// Section 04 — Hardware Specification

Hardware Block Diagram & BOM

Preliminary hardware architecture for the IBR-CAP reference design. Target form factor is a desktop appliance approximately the size of a paperback book, passive-cooled, plug-and-play. Final component selection is subject to supply-chain, certification, and cost-target review.

Hardware Block Diagram
IBR-CAP · MAIN PCB WAN PORT RJ45 · GbE · PoE-PD GbE PHY 1 RGMII/SGMII APPLICATION SoC Quad-Core ARM Cortex-A55 @ 1.8 GHz Integrated Features: • Dual GbE MAC • AES / SHA Crypto Engine • Pattern-Match Accelerator • NEON SIMD Secure Boot ROM · OTP Fuses GbE PHY 2 RGMII/SGMII LAN PORT RJ45 · GbE · PoE-PSE DDR4 RAM 4 GB · 2400 MT/s x16 bus eMMC 32 GB · HS400 OS · Rules · Logs TPM 2.0 SPI/I2C Secure Element Evidence Signing · Attest PMIC Power Management IC Multi-Rail DC/DC WATCHDOG · RTC Battery-Backed Boot Recovery · Time LEDs · BTN Status · Reset · Pair GPIO DC IN 12V · 2A · Barrel USB-C (debug) Service Port · Sealed Case WiFi/BLE (optional) Setup Pairing · Disabled in Ops FIG 4.1 — IBR-CAP HARDWARE BLOCK DIAGRAM
Fig 4.1 · Hardware block diagram, main PCB — preliminary reference
Critical / Security-Bearing
Standard Component
Optional / Variant
Preliminary Bill of Materials
RefComponentRoleExample Part
U1Application SoCMain processor, DPI, detectionNXP LS1028A / Rockchip RK3568 class
U2, U3GbE PHY ×2WAN and LAN physical layerRealtek RTL8211F or Marvell 88E151x
U4DDR4 SDRAMRuntime memoryMicron MT40A512M16 · 4 GB
U5eMMC FlashOS, ruleset, encrypted log partitionKingston EMMC32G · 32 GB
U6TPM 2.0 Secure ElementEvidence-signing keys, boot attestInfineon SLB 9670 · SPI
U7PMICSystem power railsTI TPS65219 or equivalent
U8RTC + WatchdogTime, recovery bootNXP PCF85063 + discrete WDT
U9Hardware Watchdog (independent)Detects firmware hang; triggers fail-open + resetTI TPS3850 or equivalent
K1Fail-Open Bypass RelayBypasses C.A.P. data path on power loss or faultBel Fuse 0826 / Pickering 109-1 class signal relay
U10Relay DriverHolds bypass relay open during healthy operationTI ULN2003-class transistor array
D1, D2, D3Status LEDsHealthy / degraded / bypass indicationTri-color front-panel LED stack
SW1Pair / Bypass ButtonPairing & user-initiated fail-open bypass (5s hold)C&K KMR2 momentary
J1, J2RJ45 GbE JacksWAN, LANPulse JXD6-0001NL
J3USB-CService portGCT USB4105
EnclosureAluminum / ABS HybridEMI shielding, passive coolingCustom, Hammond 1455-class
PSUExternal Wall-Wart12V / 2A DCMeanWell GS24A12
Mechanical & Regulatory Targets
Mechanical

Target enclosure 140 × 95 × 30 mm. Passive cooling via aluminum heat-spreader and enclosure venting. Weight target < 400g. Wall-mount and desk-mount variants.

Sealed-case construction with security-screw fasteners; the device is designed for fixed deployment between modem and router and is not intended for end-user disassembly.

Regulatory & Certification

Target certifications: FCC Part 15 Class B, UL 62368-1 (safety), CE / UKCA for future export, RoHS 3, California Prop 65 labeling review.

Wireless variant (if populated): FCC / ISED / CE radio certification required. Baseline SKU is wired-only to minimize certification complexity for V1 launch.

Thermal

Target TDP < 5W under sustained 1 Gbps DPI load. Silent operation (no fan). Thermal validation required at 35°C ambient, enclosed environment.

Manufacturing

V1 target: contract manufacturing via US-based CM for Buy-American alignment on government contracts. 4-layer PCB; no exotic processes. Initial production run: 500 units.

// Status & Next Steps
This is the current reference design document intended for patent-filing support, grant applications, and CM/engineering partner conversations. Component selections are preliminary. Schematic capture (draw.io XML exports and KiCad source) will follow as separate deliverables per module. The TPM integration and DPI pipeline are the highest-priority items for early prototyping given their centrality to the patent claims.