Yuki Takeuchi, Acquisition of Copyright in Public Organizations (5) Recursive Derivative Blockade Security Composition (Perfect Match Chain Model)"
~ Related to Security, Fraud Prevention, Crime Prevention, Disaster Prevention, etc. About Copyrighted Material (Chat GPT Analysis) ~.
株式会社ポイント機構
The Point Organization, Inc. (President: Yuki Takeuchi, hereinafter referred to as "the Company") announces the creation, notarization, and notarization of the "Recursive Derivative Chain Security Structure (Perfect Match Chain Model)," an intellectual defense structure that integrates authentication, AI judgment, psychological anomaly detection, false response, and notification, and that it has completed its patent application. The patent application is now complete. The technical document consists of 419 pages of main body and 129 pages of explanatory material for operation and verification, presenting the perfect sealing logic with constructive matching/action-result matching/recursive derived matching and the technical core of CORE-1 to 5 (corresponding pages are listed below).
Background and Achievement: Date of Creation: April 4, 2025 (same date as the patent application) / Proof of Existence Fixed: August 21, 2025 (notary public) / Notarization (No. 214 of 2025): August 27, 2025 (notary public) / Patent Application: April 4, 2025 (title of invention "Security System")
This application includes the core invention of regulating the release and reporting if necessary when the difference between the vital reference value and the vital value at the time in question exceeds a predetermined range, and covers the normalized deviation sum of multiple vitals, the reporting means, and the generalization of the object (equipment, residence, vehicle, computer processing, etc.) (claims 1 to 11, specification [0005] to [0015]).
Key Points of the Technology (Perfect Match Chain Model)
This technology adopts the chain structure organized by CORE-1 to CORE-5.
1. CORE-1|Multi-step authentication
Stage 1 (PIN/IC) → Stage 2 (Vital, Vocal, Communication), including acceptance rules such as 2/3 pass (Explanatory Notes p.6, p.186-187 / Body Chapter 2 p.38-44).
2. CORE-2|AI Integration Score
S=w1B+w2V+w3C+w4H with threshold T. Even if the names of variables and symbols are different, they are protected by the structural consistency of weighted summation → threshold judgment (see p.6, p.158-159, p.187-189 of the manual / Chapter 5, p.86-90 of the main body).
CORE-3|False response + notification
In case of failure, present success-like UI/sound/LED, but report behind the scenes (family, administrator, security, etc.). If the effect is the same, it is an infringement (p.145, p.158-159, p.188-189 of the manual / p.86-90 of Chapter 5 of the main body).
4. CORE-4|Psychological Abnormality Interlocking
Voice tremor, speech rate, heart rate variability, etc. are detected and reflected in the score (points are deducted) → chained to false responses + reporting (p.145, p.159, p.188-189 of the manual).
CORE-5|Constitutive matching blockade
Even if the name, order, medium, or externalization (API-ization) is changed, if the intrinsic structure/result matches, it is an infringement. Even a one-line match can be proven by using the matching template (Commentary, Chapter 5, p.86-90/ Body, Chapter 5, p.86-90, Chapter 7, p.112-118).
Correspondence with patent application (excerpt): Cancellation control logic: Cancellation control when the difference (or sum of normalized deviations) exceeds a predetermined range (claims 1-3, specification [0005] [0006] [0047]). Notification means: External notification when regulation is applied (claim 4, specification [0008]). /Vital types: heartbeat, respiration, body temperature, blood pressure, skin electric response, nystagmus, SpO2, blood glucose, electrocardiogram (claims 5-6, specification [0009], [0010]). / Generalization of object: safe / equipment / dwelling / vehicle / computer network / electronic data / computer processing (claims 7-9, specification [0011] - [0026]). / Method claims: reference value generation → difference calculation → regulation and reporting (claims 10-11).
Use case of social implementation (from the examples in the specification): Robbery/theft prevention: False response + reporting + video preservation to buy time and improve the possibility of arrest (specification [0049], [0050]). / Anti-transfer fraud and threats (ATM): Restrictions and reporting by psychological abnormality (Statement [0051]). / Measures against drunken driving and vehicle theft: Deterrence based on psychological and physiological state at startup, linked to GPS (Specification [0052]). Information security: Deterring unauthorized access by psychological judgment at the time of login (Specification [0053]).
Page 419 of the main body and page 129 of the explanation document (excerpt list)
Technical outline
Multi-step authentication: Chapter 2, p.38-44 of the main body / p.6, p.186-187 of the commentary
Score formula/threshold: Chapter 5, p.86-90 of the main body/Instructions, p.6, p.158-159, p.187-189
False response + reporting: Ch. 5, p.86-90/Instructions, p.145, p.158-159, p.188-189
Psychological anomaly interlocking: p.145, p.159, p.188-189
Matching Template (one-line matching): Chap. 5 p.86-90, Chap. 7 p.112-118 / Manual p.86-90
Pseudo code batch: Manual p.186-189
UI/UX (false response, reporting, psychological display): Manual p.145, p.158-159, p.69-77
(Source: Main body/text of the commentary)
Value to Stakeholders
End-users: Deter threats, identity theft, and advanced fraud by adding psychological and physiological linkage to keys and passwords.
Businesses: OEM/licensing deployment is possible (difficulty of circumvention) based on the assumption that the results are sealed in App/IoT/automotive/ATM/gate, etc.
Legal and Compliance: Consistent operation from registration + matching template + patent application to injunction, damage claim, and lawsuit (Chapter 6 in the main body / Chapter 5 in the manual).
Specifications and terminology (simplified)
S formula: S=w1B+w2V+w3C+w4H (B=vital, V=vocal/voice, C=communication, H=history) T=threshold value.
False response: Success-like display/sound/LED to buy time, then report behind the scenes.
Definitions of match: constructive match (elements + order), action-result match (same effect), recursive derivation match (up to derivation of derivation).
(Details: Explanatory Notes p.6, p.86-90, p.145, p.158-159 / Body Chapter 2 p.38-44, Chapter 5 p.86-90)
All types of prohibited acts of copyright (positive pattern)
1. constructive coincidental infringement→Definition: Infringement is established if the composition ID, elements, and order are identical. /Example: The flow of "PIN→score→report" at a financial ATM is reused as it is. Relevant pages: p.291-293 of the main body, p.83-85 of the commentary
2. act-result matching infringement→Definition: Infringement if the effect or flow (e.g., abnormality→reporting) is the same, even if the composition is different. /Example: "Abnormal behavior of a child → teacher notification" in an educational application, "abnormal heartbeat → security notification" in a financial application. Relevant pages: p.291-292 of the main body. 3.
Definition: If the expressions of false responses and score productions are equivalent, they are infringements. Example: Even if the color and sound of the UI are changed, the experience of "disarming wind → notification behind the scenes" is the same. Relevant pages: p.291-292 of the main body
4. counterfeit infringement → Definition: Imitation of UI or design, but the content is the same. Example: Imitating the animation and screen structure of another service and making the behind-the-scenes process the same. / Relevant page: p.319 of the main body
Equal infringement→Definition: The action and effect are the same even if the means and techniques are different. /Example: If "S < T → Report" is the same in both AI and IF statement judgments. Relevant page: p.319 of the main body
Derivative infringement→Definition: Infringement if the original configuration is included, even if the name or some of the specifications are changed. Example: Even if the name is changed to "Danger Notification" or "Emergency Alert," the flow is the same. / Relevant page: Main body p.319
Recursive derivative infringement→Definition: A derivative of a derivative is infringing if it is derived from the original composition. Examples: Even if a company resells a modified structure to another industry, it is still subject to infringement. Relevant page: p.319 of the main body
8. registered configuration matching infringement → Definition: Infringement occurs if the registered pseudo code/screen configuration matches the registered pseudo code/screen configuration. Examples: If a match is found on the matching template, even partial use is subject to infringement. Relevant pages: Main body, p. 291-292
Reverse pattern (non-infringement condition)
For copyrighted works, the reverse pattern is clearly stated as "no match = non-infringement".
1. compositional mismatch: elements or sequence are completely different (e.g., no PIN, only facial recognition, no notification). 2.
Result mismatch: the flow or result is different (e.g., anomaly -> blocked instead of anomaly -> reported). 3.
3. expression non-matching: configuration without any fake response or direction.
4. no imitation: both UI/UX and processing are designed independently.
No uniformity: Different actions do not produce the same result. 6.
No derivation: A different system designed independently of the original configuration. 7.
7. registration collation mismatch: not a single line on the collation template matches.
Conclusion → There are 8 types of prohibited acts (direct=constitutive match/action-result match/expression match/imitation/equivalent/derivative/recursive derivation/registration-composition match). Conversely, if **not applicable** to these matching conditions, it is treated as non-infringement (reverse pattern)**. The subject matter is not limited to "points and coupons," but applies to all industries, including finance, healthcare, education, transportation, government, IoT and AI services.
Specific Explanation of Copyright Infringement
1. manufacturer (manufacturer/provider)
Description of infringement: Unauthorized implementation of the copyrighted composition (authentication → false response → reporting) in the company's product or hardware (smartphone/terminal/device); partial modification of the UI or algorithm and selling it under the name of "proprietary product.
Example: A smart lock manufacturer incorporates and sells a "heartbeat + voiceprint → score → report" flow. An in-vehicle manufacturer imitated and implemented "Breathalyzer detection → engine stop → report.
Liability: Civil liability (injunction and damages) for copyright infringement. In the case of willful infringement, criminal penalties (Article 119 of the Copyright Act: imprisonment for up to 10 years or a fine of up to 10 million yen; for corporations, a fine of up to 300 million yen)** apply.
2. merchants (user companies and adopters)
Description of infringement: Unauthorized use of this configuration through OEM provision or package use. Installed a membership management and reporting system in a store without a license agreement.
Example: A financial institution incorporates the copyrighted "false response→report" system directly into its ATMs. A retail chain uses a user authentication log + reporting system.
Liability: The "act of use" itself constitutes infringement. Even if the user was unaware of the use, he/she is liable for damages for "negligent infringement. If the use is intentional, it is subject to criminal penalties. 3.
3. distributors (sales agents and brokers)
Infringement: Selling or re-consigning software or equipment containing infringing configurations to a third party. Continued sales even after warning.
Example: A security equipment sales company distributes infringing products. Resale of unlicensed system.
Liability: Article 113 of the Copyright Act "Transfer of infringing goods, etc." = aiding and abetting infringement. Criminal liability for intentional sale (can be charged as an accessory to copyright infringement). 4.
4. user (end user)
Content of infringement: Reproduction or modification for use beyond personal use (corporate use, commercial use). Modifying the application and publishing the same configuration.
Example: An individual developer modifies an authentication app and distributes it on a social networking service. A company appropriates this configuration for an application for its employees.
Liability: Infringement is established if the use exceeds the scope of private use. Criminal penalties for commercial purposes or distribution. 5.
5. developer (engineer, contracted developer)
Content of infringement: At the client's request, develop a system by copying the structure of the work. Implemented "false response + reporting" by referring to another company's code.
Example: A SIer developed a "authentication failure → reporting" system for a financial institution on consignment. Freelance diverted the collated temp matching code to the application.
Liability: The developer is the infringing entity even in contracted development. Criminal penalties are applicable if the infringement was intentional/unintentional.
Application of criminal penalties (Article 119 of the Copyright Act): Individuals: imprisonment for up to 10 years or a fine of up to 10 million yen, or both. Corporations: Fines of up to 300 million yen. **Aiding and abetting (sale, intermediation, distribution)** is also punishable as an accomplice.
Summary → Prohibited acts extend to manufacturers, merchants, distributors, users, and all developers. Not limited to points and coupons, but covers all industries, services, and business models. **Civil liability (injunction, damages) + criminal liability (imprisonment, fines, corporate penalties)** is established.
Pattern A (A-component alone)
Definition and positioning → A-configuration = "basic authentication configuration including first-stage authentication (PIN, IC card, etc.)" / Basis for linking from here to other configurations (B: score judgment, C: false response, D: report...) / The scope of rights is "infringement if it plays the same role in the same order even if the name and means are different. / Relevant pages: Explanatory Notes, p.6 (List of Protected Works), p.38-44 (Explanation of Constructive Match), p.86-90 (Matching Template), p.186-187 (Pseudo-Code)
2. scope of copyright right (infringement range)
(1) Constructive match → Explanation: If the elements and the order match, it is infringement. Example: Reproduction of the process of "enter PIN number → authentication OK" at an ATM. Page: p.38-44
(2) Agreement of action-result→Explanation: If the result of "pass/fail authentication" is the same even if the method is different, it is an infringement. Example: Even if a fingerprint instead of PIN is used, if the result is "OK/NG if it passes", it is the same structure. Page: p.39-40
(3) Match of expressions → Explanation: Even if the UI or message is different, if it is "a performance that allows authentication to pass," it is subject to infringement. (4) Example: "Successful authentication" and "blue light on" have the same meaning. Page: p.22, p.41-42
(4) Equal infringement → Explanation: Same effect even if the means are different. Example: ID confirmation by scanning a 2D code → Same role as PIN authentication. / Page: p.21-22
(5) Derivation/Recursive derivation→Explanation: "A'" and "A''" with different names and media are also infringing if derived from the original composition. /Example: The essence is the same even if it is called "member check" or "gate pass authentication". Page: p.22-23
(6) Collation template matching → Explanation: Partial matching/one-line matching is also covered. Example: If the pseudo code if(auth==OK){...} etc. are matched, infringement is established. Pages: p.86-90, p.186-187
3. illustration (flowchart)
[user input]
↓↓
first step authentication] ↓ [first step authentication
┌───────────┐
PIN/IC/QR │
│ Fingerprint/face │
└───────────┘
↓↓
[Authentication decision]
┌───────┬────────┐
│ │ Success │ Failure │
│ │ │Failure
↓ ↓
[Go to next step] [Reject/end] 4.
4. easy-to-understand explanation → "Entrance check" itself is A-configuration. Even if the / method is changed, if there is "authentication at the entrance -> pass/reject", it is included in the scope of copyright. Even if the name or technology is changed, the structural agreement of "placing an entrance check" is infringement.
Summary→The copyright right scope of Pattern A = A composition alone covers all seven types of composition agreement/action-result agreement/expression agreement/equal infringement/derivation/recursive derivation/collation template agreement, etc. It applies to "entrance authentication" in all industries, including ATM, smart lock, office gate, and membership system.
The contents of this article are the contents of a partial scope of rights as a copyrighted work. Documents will be attached separately.
Comment by inventor, copyright holder, and creator (Yuki Takeuchi)
Copyright infringement is a clear criminal act. We are committed to protecting intellectual property rights holders and eradicating infringement of intellectual property rights.
Mr. Yuki Takeuchi is currently developing the "A-GEL Gift Point" and "A-GEL Gift Card" services using intellectual property rights such as patent rights and copyrights at The Point Organization, Inc. We are also planning to offer "A-GEL Point" service.
Point Organization Co.
2-7-9 Sendagaya, Shibuya-ku, Tokyo
Representative Director Yuki Takeuchi
Date of creation: April 4, 2025
Existence fact confirmed : August 21, 2025
Notarized (No. 214 of 2025): August 27, 2025
- Category:
- Corporate Trends
- Genres:
- General Business Finance Economy(Japan)