Press Relase / News Release Distribution Service [@Press]

Note: This page is a machine translation of the Japanese original and is provided for reference only.
In the event of any discrepancy between this page and the original, the original shall prevail. Click here for the original text.

Infinite Key Multiple Time-Variant Formation Point Theory The Possibility of the World's Strongest Security "X views (impressions) exceeded 260,000 within one day of media release. (X has been viewed more than 260,000 times in the first day of its media release. Next-generation, PIN-free security, an evolution of Zero Trust Cutting-edge security

~Disclosing the critical difference between Zero Trust and Zero Trust: about after logging in.

株式会社ポイント機構

The Point Organization, Inc. is pleased to announce that X posts related to the media release "The Possibility of the World's Strongest Security, An Evolution of Zero Trust, The Next Generation of Cutting-Edge Security without the Need for PINs," published on March 24, 2026 with K Trust Corporation, recorded 261,000 views in the first 24 hours after publication. X impressions in one day.


1日間にてXのインプレッション26万回突破

X impressions exceeded 260,000 in one day

従来との比較のチャットフロー

Comparison of chat flow with the previous version


X

Possibility of the World's Strongest Security from Japan Theory of Multiple Time-Variant Number of Keys that Eliminates the Need to Memorize and Input PINs, IDs, etc.

X Link

https://x.com/Press__official/status/2036246629569773586?s=20

Description

https://share.google/gSR48ltOZAzjLyiAW



YouTube video explanation list

[About Zero Trust vs. Establishment Point Security

https://youtu.be/rOjugXCmKz0?si=nRVailF1Wmx3E0LL

About the contents after logging in with Formation Point Security]

https://youtu.be/ba-lk05dABo?si=CS8uEJujQxfHg6Y6

About the contents of the login]

https://youtu.be/W09Wwy6bEVU?si=tBhqtHaB8Mmoif4-

[About eliminating the need for a PIN or ID]

https://youtu.be/IkQZSjOUpOQ?si=nH2jdQcj4sDVJ562

[Regarding multiple combined patent rights]

https://youtu.be/hxV3rdUfklY?si=Wf-Q675fr-tTfnjM



■ Summary of Presentation

This submission transmits a new security theory "Infinite-Key Multiple-Time-Variant Formation Point Theory," which has generated a high level of interest in next-generation security. Yuki Takeuchi of Point Organization, Inc. and K Trust Corporation have published a new security theory, "Myriad Key Multiple Time-Variant Establishment Point Theory" security. This theory is positioned as a next-generation state-of-the-art security structure that goes beyond conventional and zero-trust, and is a multiple layer of defense against viruses in the system,


No password is required.

No fixed keys

Automatic virus checks on multiple layers

Instantaneous control of the status of establishment.


This is a new security concept characterized by the following features



Limitations of Conventional Security

Conventional security is


Fixed IDs

Fixed passwords

Fixed passwords ● Fixed keys

Fixed passwords ● Fixed keys ● Fixed session continuity


The structure of conventional security is as follows Therefore, it is possible for a user to


Once the authentication is breached, it can be deployed horizontally.

Encryption can be performed after authentication

AI has the advantage of trial


AI has the advantage of trial by trial.



Positioning of Zero Trust

Zero Trust is based on the concept of "trusting no one.


Always authenticated

Continuous monitoring


Continuous monitoring. However, in essence, since there is a fixed correct answer (ID/token),


Attacks after authentication is breached

lateral expansion

Abuse of execution rights

However, the new theory is not a perfect solution.


New Theory

Establishment point security → This theory is fundamentally different from the conventional one.

The core of this theory is that "formation itself is limited to a single moment.



Formation space model

Normal: Does not exist

Conditional matching: Instantaneous generation

After operation: Instantaneous disappearance

In case of an anomaly: Immediate interruption

In other words, formation is a "time event" and cannot be reused.



Multi-Layered High-Level Structure (L1-L5) → This theory is controlled by a 5-layered structure.

L1: Entrance (login) → Check user, terminal, and environment

L2: Side effect check → virus and abnormal behavior detection

L3: Key draw → random generation of multiple encryption keys each time

L4:Status of establishment→Only when conditions match, permission is granted for a moment

L5:Disappearance of space→Disappearance of passage after operation is completed


多重高層と3重AIによる強化

Enhanced by Multiple High Layers and Triple AI


The biggest features

(1) Key is not fixed: encryption keys are


Temporary

Random

Random ● Multi-layer generation

Random ● Non-reusable


全てをチェックにて安心

All checks are secure.


In other words, the structure has no fixed ciphers.


(2) Multi-layered automatic virus check: At each layer

Behavior verification

Operation validation

Authorization abuse validation

● Operation validity verification ● Authorization abuse verification If an abnormality is detected, the key for the next tier is not issued → Operation is not validated


(3) Structure that does not issue execution rights until the end

Conventional → Operation is possible after successful login

This theory → Execution is not possible without passing through to the final layer



Difference from attack model

Conventional

Penetration → Breakthrough of authentication → Horizontal expansion → Encryption

This theory

Penetration → L1 passage → Side-effect check → L2 key → Side-effect check → L3 key → Fulfillment point → Execution

Abnormality detection during execution → Immediate blocking




Effect on ransomware

Ransomware requires the right to execute encryption

In this theory


Control by privileged key (L3)

Blocked by side-effect detection

Space extinction and cannot be reused.


As a result, encryption is difficult to be established.



Numerical model (design value): ransomware

Conventional defense ratio: approx. 55.9

This theory: 99.7% or higher

● Damage probability: approx. 0.3% or less

Improvement factor: Approx. 176 times



Comparison of 73 attacks

Phishing

AI fraud

Malware

API abuse

Cross-platform

The theory has been proven to significantly improve the effectiveness of 73 types of attacks, including



Technical essence: This theory

No fixed secret

Establishment is a time event

The number of attempts is not advantageous.

The more the attacker tries, the less favorable the result.

This is a physics-based formation control model.



In a nutshell

Conventional → Protect the correct answer

Zero Trust → Do not trust

This theory → do not allow it to be established



Conclusion

The theory of infinite-key multiple time-varying fixed points is


Next generation of Zero Trust

No password required

No password required

Multilayer, high-layer security

Instantaneous control of execution rights


This is a next-generation, state-of-the-art security infrastructure that realizes

This technology is a new security theory that structurally prevents conventional "damage after authentication breakthrough" by not fixing encryption keys and allowing operations to be executed only when security is confirmed through automatic virus checks using a multi-high-layer structure.



About Point Organization, Inc.


ポイント機構

The Point Organization, Inc.


Company name: Point Organization, Inc.

Representative: Yuki Takeuchi, Representative Director

Head office: Room 301, HOUSE 2717, 2-7-9 Sendagaya, Shibuya-ku, Tokyo

Date of establishment: December 24, 2021

Fiscal year end: March

URL : https://point-kikou.co.jp/


Official website (edinet) URL for the FSA Supervisory Public Search:

https://disclosure2.edinet-fsa.go.jp/WEEE0030.aspx?bXVsPeODneOCpOODs+ODiOapn+aniyZjdGY9b24mZmxzPW9uJmxwcj1vbiZycHI9b24mb3RoPW9 uJnBmcz03Jnllcj0mbW9uPQ==




■About K Trust Co.


Kトラスト

K Trust


Company Name : K Trust Co.

Representative : Tomoko Hirakawa and Kazunori Hirakawa, Representative Directors

Headquarters : 1-3313 Shimoshidami, Moriyama-ku, Nagoya-shi, Aichi, Japan

URL : https://www.ktrust.info

Relationship with Point Organization: Sole agent for A-GEL gift points & A-GEL gift cards