The World's Strongest Security ~The Theory of Multiple Time-Variant Formation Points with Multiple Keys (Comprehensive Edition) Including Ransomware Server Attacks Physics-based structural design security
株式会社ポイント機構
The Point Organization, Inc. (Head office: Shibuya-ku, Tokyo; Representative Director: Yuki Takeuchi; hereafter, "Point Organization"), which operates the point redemption system "A-GEL Gift Point," has applied for a patent for a new theory called "Myriad Key Multiple Time-Variant Formation Point Theory," which reviews the structure itself, together with K-Trust Corporation (Head office: Moriyama-ku, Nagoya City, Aichi Prefecture; Representative Directors: Tomoko Hirakawa and Kazunori Hirakawa; hereafter, "K-Trust"). (headquartered in Moriyama-ku, Nagoya, Aichi Prefecture; Tomoko Hirakawa and Kazunori Hirakawa, President; hereinafter "K Trust") have applied for a patent for a new theory, the "infinite key multiple time-varying fixed point theory," which reviews this structure itself. Some parts of this theory have already been patented. We will explain the weaknesses of conventional methods of security and the social implementation and national application of the new design concept.
Cyber-attacks against companies and local governments are becoming more sophisticated every year. Behind this is the structure of repeated trial-and-learning attacks.

Comparison of conventional, zero-trust, and infinite-key multiple time-varying formation point theory
The theory of multiple time-variant fixed points is composed of the fixed point security shown on the right side of the image above.
▼First view the explanatory video
https://youtu.be/IkQZSjOUpOQ?si=EqWjExx3hztd6iCJ
The amazing video of the myriad-key multiple time-variant fixed point theory.
https://youtu.be/7k7DGSXJbiw?si=dpXxBCTYFI6dltap
▼Explanatory video of some of the patented multiple composite patent rights
https://youtu.be/hxV3rdUfklY?si=cvV4BIYRDmiFwaAT
Fundamental Structure of Conventional Security
Conventional security was designed to protect "fixed correct answers (PIN, ID, etc.)". For example
ID
Passwords
Fixed tokens
Fixed session
for example, ● ID ● Password ● Fixed token ● Fixed session. In this structure,
Leakage
Reuse
Cross-deployment
AI attack
This structure facilitates ● Leakage ● Reuse ● Cross-deployment ● AI attack In other words, it is a structure in which attacks "pile up.
Change of conception of the theory of multiple time-varying formation points with infinite number of keys
This theory has shifted the target of protection from secret information to the state of formation. Specifically,
Formation is an instantaneous exception
The space is randomly generated each time.
After the formation, the space disappears.
The structure of this theory is as follows.
The structure is as follows. In other words, it is not to protect the correct answer, but to control the formation itself.
Unified control of entrance, relay, and exit
In this theory
1. entrance (login) 2. relay (operation)
Relay (operation)
3. exit (termination)
3. exit (exit) are controlled by the same theory. Conventional security is,
Only the entrance is reinforced.
However, actual attacks are not as severe as those in the past. However, actual attacks are
lateral expansion
Internal manipulation
Authorization abuse
Internal manipulation ● Authorization abuse This theory controls entrance, relay, and exit at the point of establishment.
No need to memorize passwords or IDs
In this theory, there is no need to memorize
ID
Passwords
PIN
is not assumed. Instead,
Natural human reactions
Rhythm of operation
Environmental information
Terminal information
Time of day
The system automatically determines the conditions of operation by combining the following information. In other words, the design does not assume secrets to be memorized by humans.
Multiple login structure for a single login
Conventional → 1 login = 1 session
This theory → Within a single login, the following conditions are used
Browsing is established
Remittance completed
Downloading established
Downloading is completed
There are multiple approval points such as ● Browsing approval ● Remittance approval ● Download approval ● Privileged operation approval In addition, each of them is controlled by a different encryption key.
Infinite-key multiple time-varying structure
The name of this theory comes from
Infinite-key
Multiple
Time-varying
Time-varying
The features of this theory are Features,
No key is fixed.
Drawing every time
The key changes every hour.
Expires after the lottery is completed
The structure is as follows. This allows for the following
Guessing
Reuse
Reuse
AI learning
AI learning is less likely to be established.

Overall Configuration Chart
Comparison of 73 attack models
In this theory
Phishing
Deep Fakes
AI fraud
Ransomware
Server Intrusion
Internal Fraud
The comparison is based on 73 different attack models, including Most attacks are designed to be blocked before they are established.
Numerical Model (Theoretical Design)
In the design model
Prevention rate: 99% or more
Damage probability: 0.3% or less
Improvement factor: more than several hundred million times
The design model shows the following design indexes. These are theoretical design models, not actual measured values.

To the strongest security in the system
Cooperation with Integration Patents
This theory is in conjunction with
Vital Security Patent
Sound Analysis and Emergency Alert Patents
By integrating this theory with patents such as
Extortion crimes
Unauthorized money transfers
Vehicle theft
Lone death prevention
Disaster notification
Disaster notification ● Social safety applications are also envisioned.
Potential for Social Implementation
This theory can be applied to
Finance
Public administration
Medical care
Corporate systems
Critical infrastructure
Critical infrastructure, etc.
Final Summary
The theory of multiple time-varying fixed points is a physics-based structural design theory that presents a conceptual shift from "security that protects a fixed correct answer" to "security that controls the formation of a fixed answer as a momentary exception.
About Point Organization, Inc.
The Point Organization, Inc.

The Point Organization, Inc.
Company name: The Point Organization, Inc.
Representative: Yuki Takeuchi, President
Head office: Room 301, HOUSE 2717, 2-7-9 Sendagaya, Shibuya-ku, Tokyo
Date of establishment: December 24, 2021
Fiscal year end: March
URL : https://point-kikou.co.jp/
Official website of the FSA Supervisory Public Search (Edinet) URL:
https://disclosure2.edinet-fsa.go.jp/WEEE0030.aspx?bXVsPeODneOCpOODs+ODiOapn+aniyZjdGY9b24mZmxzPW9uJmxwcj1vbiZycHI9b24mb3RoPW9 uJnBmcz03Jnllcj0mbW9uPQ==
About K Trust Co.
K Trust Co.

K Trust Co.
Company name: K Trust Co.
Representative: Tomoko Hirakawa and Kazunori Hirakawa, Representative Directors
Headquarters : 1-3313 Shimo-Shidami, Moriyama-ku, Nagoya-shi, Aichi, Japan
URL : https://www.ktrust.info
Relationship with Point Organization: Sole agent for A-GEL gift points & A-GEL gift cards
- Category:
- Corporate Trends
- Genres:
- Technology General Business Economy(Japan)