Creativ Solutions BV develops system architectures that make information and measurement self-verifiable.
Our work unites advanced physics and clean digital design to deliver transparent authenticity, trusted data, and reproducible results — from network ingress to laboratory analysis.
We operate across domains where correctness, provenance, and trust are foundational requirements, translating first-principle models into architectures and technologies that can be deployed, validated, and operated in real-world systems.
We work at the architectural level, defining explicit rules, invariants, and acceptance paths that make system behavior reproducible, auditable, and verifiable over time.
All work is grounded in first-principle physics, from which architectural models are derived and, where needed, carried through into concrete technologies and products. This allows the same underlying principles to be applied consistently across domains—from system architecture to operational implementation.
This approach defines what we call deterministic physics — technology whose behavior can be demonstrated, verified, and explained by construction: technology that proves itself.
Identity as presence, not credentials
Traditional authentication relies on transferable artifacts: passwords, codes, tokens, and sessions. Once stolen or relayed, identity collapses. HCAC replaces this model entirely.
HCAC expresses identity as a continuous property of interaction. Every protected action is authorized by live, hardware-bound presence on the user’s device — not by a reusable credential issued earlier. There are no passwords, no OTPs, and no bearer sessions to steal, replay, or hijack.
Authentication becomes non-transferable by construction. Only the legitimate device, under local user control, can authorize actions — even if the operating system is compromised. Phishing, session hijacking, credential replay, and token theft are structurally eliminated, not merely detected.
HCAC is designed as the natural successor to passwords, MFA, and passkeys: a post-credential model aligned with modern secure hardware and regulatory requirements, where identity is proven continuously, not assumed from a past login.
Deterministic Measurement for Biology
Most diagnostics depend on reagents, calibration, and interpretation. Results vary by instrument, operator, and laboratory, even when measuring the same sample. Statistical models infer patterns, but they do not produce reproducible truth.
Invariant Verification replaces interpretation with structure. It converts measured signals — impedance, Raman, FTIR, or related domains — into invariant coordinates that remain identical across instruments, laboratories, and time. Where conventional methods estimate, IV proves.
By mapping measurable signals into deterministic invariant space, IV eliminates calibration drift, reagent variability, and statistical fitting. If the signal is measurable, the result is the same — anywhere, by design.
This enables reagent-free diagnostics, true cross-lab comparability, and globally reproducible measurement in clinical, pharmaceutical, forensic, and public-health settings. Integrity is not inferred after the fact; it is built into the measurement itself.
Permanent, independently verifiable records
Binder converts documents and datasets into tamper-evident records with a persistent verification trail. Instead of relying on platform trust, certificates, or external services, each bound artifact carries the information needed to verify its integrity—offline and independently.
Binder supports continuous authenticity: from the moment a file is created, through sharing, review, and long-term archiving. Any party can later verify whether content has changed, when it was bound, and how it relates to prior records, without relying on the original issuer.
Binder focuses on explicit, reproducible verification. Verification outcomes are deterministic and consistent: given the same inputs, independent verifiers reach the same result. This makes Binder suitable for regulated environments where traceability, auditability, and long-term defensibility matter more than cryptographic ceremony.
Explicit ingress verification for critical systems
TAIV verifies incoming traffic at the point where trust matters most: ingress. Instead of relying on probabilistic detection, signatures, or long-lived secrets, TAIV evaluates each transmission against explicit freshness, ordering, and destination rules.
Every packet is assessed within a bounded verification window and evaluated for continuity, duplication, and correct targeting. Replayed, delayed, or misdirected traffic is rejected deterministically, producing clear allow, drop, or quarantine outcomes that can be audited after the fact.
TAIV is designed for environments where time synchronization is imperfect, devices are constrained, and replay attacks are operationally realistic. Decisions are fast (<1 ms), reproducible, and produce verifiable records suitable for compliance and incident analysis.
TAIV provides predictable ingress behavior: given the same traffic and context, it will always make the same decision. This reduces ambiguity, simplifies audits, and lowers operational overhead in OT, IoT, and industrial networks.