QUANTUM  QUOTIENT
Code know : not personal. How know : individual.

       











THE BASIC PRINCIPLES OF DIFFER

                                                     

Differ : authentic differentiation instead of identification.
100% IT security : anything less is acceptable when it comes to our values?
Security Profile Protection Profile. (Common Criteria)

Limes-IT : no fixed ID-data, no recorded procedure required.
LimIT : the attack is limited and eliminated from the outset.
Subject-center : the Differ-User itself is the code, password.
Differentiate thyself! Know thyself : Γνῶθι σεαυτόν! (Delphoi)

Total Intelligence : for quantum resistance and instead of AI.
Base-0 numeral system : this is the basis of logic. Base-2 is the basis of computing.
Everything is possible in the 0-dimension πάντα δυνατὰ (MRK9:23,10:27)

Pseudo-Input : a button press or mouse click is not data entry, but rather a confirmation of real-time presence.
ID-GUI : Information for Authorised Insider / Disinformation for Attackers Outsider.
Metacommunication : IT resources are only tools just media.
No man ever steps into the same river once.
Δὶς ἐς τὸν αὐτὸν ποταμὸν οὐκ ἂν ἐμβαίης (Herakleitos) , inertial frame (Einstein)






    DIFFER IN PRACTICE

    Mutual initiation, initialisation
When the User is authorised, they become a so-called Differ-User in an environment isolated by the Differ ACM Module.
Differ-User and Differ-Module create a unique meta-communication protocol.
It’s not personal confidential data (passwords, codes, etc.) that are being recorded, but rather an information flow agreement is.
Info-Unit : Differ-User recognises the data substitute objects, the Info-Unit (aptly: data-in-form).
   Differ-User can choose from the options or generate a new Info-Unit.
Limes-IT functions : Differ-User learns to recognise the Info-Unit on the GUI.
   This is also a method of limiting the attack potential (LimIT)..
Determinants : requirements arising from ad hoc events that must be fulfilled in a later differ phase.
    Due to the delayed and random role, the Attacker's sampling is limited (eliminated)..
Navigation : Differ-User megismeri, hogy miként irányíthatja, befolyásolhatja a differációt.
    These data entry forms are no different from other input operations.
Communication protocol : a set of agreed rules for signalling, confirmation and information.
    appearance does not differ from other output signals or image noise.
Subject calibration : Application of signs, images, icons, etc. associated with the Differ-User on the GUI.
    For the attacker, this is disinformation, misinformation, and the essence evaporates (sublimates/”sublimITs”).
Other options depending on the expected special security requirements and product development:
   Pre-authentication procedure instead of non-variable identification (data-type, user name).
   Multi-step authentication, door handle function, foolproof measures...
   A tutorial programme is available to Differ Users for training and practice.


    The Differ Access Control Management (ACM) process
A differentiation process (in the basic case) has the following phases:

The figure doesn't reveal much about the essence of the process, does it? Well, that's good news.
The goal is to prevent outsiders from gaining insight into the process, through knowledge of I/O data and the process
   An initiated Differ User sees more on the ID-GUI than an attacker, who sees no pattern for penetration
Is data entry visible? Public?! Of course. There is no password entry, but real-time relevant communication.
   Differ-Users understand what the change is, where the process is at, and can even control the flow..
Differ-ACM mixes signals into the image noise on the ID-GUI, thereby informing Differ-User and misinforming the Attacker.
    However, Differ-User can override ACM because it is differentiated, and it can even commit mistakes because it is different in this respect, as well.







    ID-GUI PERFORMANCES

    BASIC MODEL : information, disinformation, misinformation
    COMPLEX MODEL : disinformation scissors
    CHAOTIC DISPLAY : misinformation scissors
    SUBJECT-CENTRALIZED DISPLAY : privat scissors

    NORMAL VERSION
    AD HOC VERSION (unusual, unexpected GUI modification for test)

    TOTAL PLAN & PREMIER PLAN VIEW

    SEPARETED I/O (independent input)







Possible applications
Truly individual Identification (IT, ITC)
Absolute Authentification (IT, ITC, Encryption)
Encryption (Subject-centralized), Cloud technology

Access to assets (wall safe, tresor, safety vault...)
Acces to object (car, phone/tablet, installation...)
Term access control (building, office, smart home...)
Geographical access (police, migration management...)
Military (own weapon, armoury, tactical object access...)
Cyberwarfare
Research and development of Total Intelligence




© Differ & Tutorial program Y2501008 / 014415 (HIPO 2025.10.08)   Certificate   Apostille   Envelope
© Quantum resistence Y2300529 (HIPO 2023.07.04)   Certificate   Apostille   Envelope
© SubLimIT performance and presentation Y1900843 (HIPO 2019.11.14)   Certificate  Reference   Envelope
© Differ Criteria collection Y1900244 (HIPO 2019.04.01) Certificate
© SubLimIT & Differ Y2000764 (HIPO 2020.10.27) Certificate
© Numeral systems and Inteligence Y2500445 (HIPO 2025.05.08) Certificate