Abstract: A crime reporting system that lets victims or witnesses submit encrypted reports anonymously, and that searches for repeat offenders without decrypting submitted data. Perpetrator information is transformed into cryptographic hashes that are used to match repeat offenders while preserving anonymity. Reporting users may be informed when their report matches others on the same perpetrator, so that they may consider joint action against the perpetrator. Users may also be informed of law firms that represent other victims of the same perpetrator or similar cases; they may select a law firm and may choose to share the unencrypted data with a selected firm. Reports and attached evidence are escrowed securely in the system's database; unencrypted data is never stored. Hashes may include variations of the submitted data; for example, name variations such as “Tom”, “Thomas”, and “Tommy” may be detected as being the same perpetrator.
Abstract: A crime reporting system that lets victims or witnesses submit encrypted reports anonymously, and that searches for repeat offenders without decrypting submitted data. Perpetrator information is transformed into cryptographic hashes that are used to match repeat offenders while preserving anonymity. Reporting users may be informed when their report matches others on the same perpetrator, so that they may consider joint action against the perpetrator. Users may also be informed of law firms that represent other victims of the same perpetrator or similar cases; they may select a law firm and may choose to share the unencrypted data with a selected firm. Reports and attached evidence are escrowed securely in the system's database; unencrypted data is never stored. Hashes may include variations of the submitted data; for example, name variations such as “Tom”, “Thomas”, and “Tommy” may be detected as being the same perpetrator.