Press Relase / News Release Distribution Service [@Press]

Note: This page is a machine translation of the Japanese original and is provided for reference only.
In the event of any discrepancy between this page and the original, the original shall prevail. Click here for the original text.

The World's Strongest Security ~The Theory of Multiple Time-Variant Formation Points with Multiple Keys (Comprehensive Edition) Including Ransomware Server Attacks Physics-based structural design security

株式会社ポイント機構

The Point Organization, Inc. (Head office: Shibuya-ku, Tokyo; Representative Director: Yuki Takeuchi; hereafter, "Point Organization"), which operates the point redemption system "A-GEL Gift Point," has applied for a patent for a new theory called "Myriad Key Multiple Time-Variant Formation Point Theory," which reviews the structure itself, together with K-Trust Corporation (Head office: Moriyama-ku, Nagoya City, Aichi Prefecture; Representative Directors: Tomoko Hirakawa and Kazunori Hirakawa; hereafter, "K-Trust"). (headquartered in Moriyama-ku, Nagoya, Aichi Prefecture; Tomoko Hirakawa and Kazunori Hirakawa, President; hereinafter "K Trust") have applied for a patent for a new theory, the "infinite key multiple time-varying fixed point theory," which reviews this structure itself. Some parts of this theory have already been patented. We will explain the weaknesses of conventional methods of security and the social implementation and national application of the new design concept.


Cyber-attacks against companies and local governments are becoming more sophisticated every year. Behind this is the structure of repeated trial-and-learning attacks.


従来とゼロトラストと無数鍵多重時変成立点理論との比較

Comparison of conventional, zero-trust, and infinite-key multiple time-varying formation point theory


The theory of multiple time-variant fixed points is composed of the fixed point security shown on the right side of the image above.


▼First view the explanatory video

https://youtu.be/IkQZSjOUpOQ?si=EqWjExx3hztd6iCJ

The amazing video of the myriad-key multiple time-variant fixed point theory.

https://youtu.be/7k7DGSXJbiw?si=dpXxBCTYFI6dltap

▼Explanatory video of some of the patented multiple composite patent rights

https://youtu.be/hxV3rdUfklY?si=cvV4BIYRDmiFwaAT



Fundamental Structure of Conventional Security

Conventional security was designed to protect "fixed correct answers (PIN, ID, etc.)". For example

ID

Passwords

Fixed tokens

Fixed session

for example, ● ID ● Password ● Fixed token ● Fixed session. In this structure,

Leakage

Reuse

Cross-deployment

AI attack

This structure facilitates ● Leakage ● Reuse ● Cross-deployment ● AI attack In other words, it is a structure in which attacks "pile up.



Change of conception of the theory of multiple time-varying formation points with infinite number of keys

This theory has shifted the target of protection from secret information to the state of formation. Specifically,

Formation is an instantaneous exception

The space is randomly generated each time.

After the formation, the space disappears.

The structure of this theory is as follows.

The structure is as follows. In other words, it is not to protect the correct answer, but to control the formation itself.



Unified control of entrance, relay, and exit

In this theory

1. entrance (login) 2. relay (operation)

Relay (operation)

3. exit (termination)

3. exit (exit) are controlled by the same theory. Conventional security is,

Only the entrance is reinforced.

However, actual attacks are not as severe as those in the past. However, actual attacks are

lateral expansion

Internal manipulation

Authorization abuse

Internal manipulation ● Authorization abuse This theory controls entrance, relay, and exit at the point of establishment.



No need to memorize passwords or IDs

In this theory, there is no need to memorize

ID

Passwords

PIN

is not assumed. Instead,

Natural human reactions

Rhythm of operation

Environmental information

Terminal information

Time of day

The system automatically determines the conditions of operation by combining the following information. In other words, the design does not assume secrets to be memorized by humans.



Multiple login structure for a single login

Conventional → 1 login = 1 session

This theory → Within a single login, the following conditions are used

Browsing is established

Remittance completed

Downloading established

Downloading is completed

There are multiple approval points such as ● Browsing approval ● Remittance approval ● Download approval ● Privileged operation approval In addition, each of them is controlled by a different encryption key.



Infinite-key multiple time-varying structure

The name of this theory comes from

Infinite-key

Multiple

Time-varying

Time-varying

The features of this theory are Features,

No key is fixed.

Drawing every time

The key changes every hour.

Expires after the lottery is completed

The structure is as follows. This allows for the following

Guessing

Reuse

Reuse

AI learning

AI learning is less likely to be established.


全体構成図

Overall Configuration Chart


Comparison of 73 attack models

In this theory

Phishing

Deep Fakes

AI fraud

Ransomware

Server Intrusion

Internal Fraud

The comparison is based on 73 different attack models, including Most attacks are designed to be blocked before they are established.



Numerical Model (Theoretical Design)

In the design model

Prevention rate: 99% or more

Damage probability: 0.3% or less

Improvement factor: more than several hundred million times

The design model shows the following design indexes. These are theoretical design models, not actual measured values.


システム内のセキュリティー最強へ

To the strongest security in the system


Cooperation with Integration Patents

This theory is in conjunction with

Vital Security Patent

Sound Analysis and Emergency Alert Patents

By integrating this theory with patents such as

Extortion crimes

Unauthorized money transfers

Vehicle theft

Lone death prevention

Disaster notification

Disaster notification ● Social safety applications are also envisioned.



Potential for Social Implementation

This theory can be applied to

Finance

Public administration

Medical care

Corporate systems

Critical infrastructure

Critical infrastructure, etc.



Final Summary

The theory of multiple time-varying fixed points is a physics-based structural design theory that presents a conceptual shift from "security that protects a fixed correct answer" to "security that controls the formation of a fixed answer as a momentary exception.



About Point Organization, Inc.

The Point Organization, Inc.

株式会社ポイント機構

The Point Organization, Inc.

Company name: The Point Organization, Inc.

Representative: Yuki Takeuchi, President

Head office: Room 301, HOUSE 2717, 2-7-9 Sendagaya, Shibuya-ku, Tokyo

Date of establishment: December 24, 2021

Fiscal year end: March

URL : https://point-kikou.co.jp/


Official website of the FSA Supervisory Public Search (Edinet) URL:

https://disclosure2.edinet-fsa.go.jp/WEEE0030.aspx?bXVsPeODneOCpOODs+ODiOapn+aniyZjdGY9b24mZmxzPW9uJmxwcj1vbiZycHI9b24mb3RoPW9 uJnBmcz03Jnllcj0mbW9uPQ==



About K Trust Co.

K Trust Co.

株式会社Kトラスト

K Trust Co.

Company name: K Trust Co.

Representative: Tomoko Hirakawa and Kazunori Hirakawa, Representative Directors

Headquarters : 1-3313 Shimo-Shidami, Moriyama-ku, Nagoya-shi, Aichi, Japan

URL : https://www.ktrust.info


Relationship with Point Organization: Sole agent for A-GEL gift points & A-GEL gift cards

Logo Image