We create technology that proves itself

Foundational architectures for authenticity, verification, and next-generation measurement

What We Do

Creativ Solutions BV develops system architectures that make information and measurement self-verifiable.

Our work unites advanced physics and clean digital design to deliver transparent authenticity, trusted data, and reproducible results — from network ingress to laboratory analysis.

We operate across domains where correctness, provenance, and trust are foundational requirements, translating first-principle models into architectures and technologies that can be deployed, validated, and operated in real-world systems.

How We Work

We work at the architectural level, defining explicit rules, invariants, and acceptance paths that make system behavior reproducible, auditable, and verifiable over time.

All work is grounded in first-principle physics, from which architectural models are derived and, where needed, carried through into concrete technologies and products. This allows the same underlying principles to be applied consistently across domains—from system architecture to operational implementation.

This approach defines what we call deterministic physics — technology whose behavior can be demonstrated, verified, and explained by construction: technology that proves itself.

These principles are applied across a set of architectures and technologies addressing verification, authenticity, and measurement in real-world systems.

Applied Architectures & Systems

Examples of how foundational principles are applied across domains
Architectural Constructs

HCAC — Continuous Hardware-Bound Authentication

1

Identity as presence, not credentials

Traditional authentication relies on transferable artifacts: passwords, codes, tokens, and sessions. Once stolen or relayed, identity collapses. HCAC replaces this model entirely.

HCAC expresses identity as a continuous property of interaction. Every protected action is authorized by live, hardware-bound presence on the user’s device — not by a reusable credential issued earlier. There are no passwords, no OTPs, and no bearer sessions to steal, replay, or hijack.

Authentication becomes non-transferable by construction. Only the legitimate device, under local user control, can authorize actions — even if the operating system is compromised. Phishing, session hijacking, credential replay, and token theft are structurally eliminated, not merely detected.

HCAC is designed as the natural successor to passwords, MFA, and passkeys: a post-credential model aligned with modern secure hardware and regulatory requirements, where identity is proven continuously, not assumed from a past login.

Invariant Verification

2

Deterministic Measurement for Biology

Most diagnostics depend on reagents, calibration, and interpretation. Results vary by instrument, operator, and laboratory, even when measuring the same sample. Statistical models infer patterns, but they do not produce reproducible truth.

Invariant Verification replaces interpretation with structure. It converts measured signals — impedance, Raman, FTIR, or related domains — into invariant coordinates that remain identical across instruments, laboratories, and time. Where conventional methods estimate, IV proves.

By mapping measurable signals into deterministic invariant space, IV eliminates calibration drift, reagent variability, and statistical fitting. If the signal is measurable, the result is the same — anywhere, by design.

This enables reagent-free diagnostics, true cross-lab comparability, and globally reproducible measurement in clinical, pharmaceutical, forensic, and public-health settings. Integrity is not inferred after the fact; it is built into the measurement itself.

Deployable Systems

RPF Binder

1

Permanent, independently verifiable records

Binder converts documents and datasets into tamper-evident records with a persistent verification trail. Instead of relying on platform trust, certificates, or external services, each bound artifact carries the information needed to verify its integrity—offline and independently.

Binder supports continuous authenticity: from the moment a file is created, through sharing, review, and long-term archiving. Any party can later verify whether content has changed, when it was bound, and how it relates to prior records, without relying on the original issuer.

Binder focuses on explicit, reproducible verification. Verification outcomes are deterministic and consistent: given the same inputs, independent verifiers reach the same result. This makes Binder suitable for regulated environments where traceability, auditability, and long-term defensibility matter more than cryptographic ceremony.

TAIV — Time Aware Ingress Verification

2

Explicit ingress verification for critical systems

TAIV verifies incoming traffic at the point where trust matters most: ingress. Instead of relying on probabilistic detection, signatures, or long-lived secrets, TAIV evaluates each transmission against explicit freshness, ordering, and destination rules.

Every packet is assessed within a bounded verification window and evaluated for continuity, duplication, and correct targeting. Replayed, delayed, or misdirected traffic is rejected deterministically, producing clear allow, drop, or quarantine outcomes that can be audited after the fact.

TAIV is designed for environments where time synchronization is imperfect, devices are constrained, and replay attacks are operationally realistic. Decisions are fast (<1 ms), reproducible, and produce verifiable records suitable for compliance and incident analysis.

TAIV provides predictable ingress behavior: given the same traffic and context, it will always make the same decision. This reduces ambiguity, simplifies audits, and lowers operational overhead in OT, IoT, and industrial networks.

Our Approach

Transparent

Every rule and acceptance path is public and replayable.

Deterministic

Outcomes follow defined physics, not probability or keys.

Ethical

Engines are designed for openness and social benefit; field-of-use licensing prevents misuse.

Collaborative

We work with universities, laboratories, and OEM partners to validate, refine, and extend deterministic verification worldwide.
© 2025 Creativ Solutions BV BE1015.363.831 — RPR Brussels. All rights reserved.