Limited Time Offers

| Main Page | Home | Practical Use | 3 Keys | Legal References |

IP Seven Alpha Identity Registration

Three Keys (Symbolism)

The three keys represented in Seven Alpha are 'Death', 'Hell', and 'The Grave'.

Physically there are three component keys to access security, which may be kept together or separately by members.

Each key represents an access token to the database and strong-identity tracking service system available to a Seven Alpha member. Feature availability is subject to the use of API (Application Programming Interfaces) on the respective "segment" of the network according to its administrator and their wishes. The API provides the user with the ability to enter into the protectorate and participate according to a set of rules and policies which facilitate trusted name and identity generation without disclosure of the 'true owner' of the registered Seven Alpha account. Thus, a Protectorate may allow users to have a screen name, to change screen names at a frequency, and to have that screen-name associated permanently with the protectorate as a local name (valid only in that region) or global registration (valid in all regions) preventing impersonation of a well known user across multiple zones.

In this way users can have academic discussions without reliance on their identity or credibility to influence debate, while retaining the right to user names across the enterprise, and hosts can select what degree of privacy is permitted (if any) to manage bans and administrative controls while users enjoy anonymity and multiple account profiles (personas) that are not bound to IP address identifiers or other tracking data visible to network partners.

"Seven Alpha" Asset API Framework - A Trust Management Tool

Assets are stored on the Seven Alpha network, separate from vendors, to ensure credit and license rights for later use in change of service and end-of-life support for virtual goods. This 'Virtual Data Vault' keeps the account information in a format usable by other vendors and private while browsing, as well as accessible as an asset and thus transferrable to controlling legal parties throught the Access Right panel - preserving the 'digital Life' of the user after the passing of registered owner.

Virtual Identity credentials are likewise 'digital assets' preserved in the data store, along with associated membership and voting rights, information feeds, access, and social data keys; and may be reviewed for proof of use and first-use by the Archive Right panel, even after the physical passing of the registered owner.

In this way, through asset protection and virtual (intangible) property and persona management, the Legacy (means of influence, record of influence, record of contributions) remain intact in the Seven Alpha account database while maintaining strong controls and integrity checks for users during and after their physical lifetime. Because this data can be segmented, scaled into new branch databases, and preserved in triple-cipher encrypted block storage for archival and long-term reference, the Legacy of members does not degrade over time or memory and remains subject to strict privacy controls.

This ensures that the dignity (integrity of identity and standing derived in any persona) of the user regardless of multiple personas registered and used over the course of a lifetime across multiple network clients who retain no records correlating this data, may be maintained and protected despite the loss of life or other injury to the natural born person who is agent of this estate system.

Conventional estate law and instruments, like the Social Security System of the United States, are not designed to protect the privacy of the individual and do not use strong four-factor encryption technology to protect this data or segment access to specific groups and limited grants.

Seven Alpha provides this 'discrete atomic locking' system of identification and asset registration services, as well as a means to access without assuming legal agency thereof a vital 'view' of data to resolve pertinent legal questions similar to a record of a registered court at law or county seat and county record services. Automation in this area, to serve discrete 'protectorate' parties requests based on strict third-party-observed access contracts afford maximum security and utility to the public while protecting the privacy of individuals in a free society, including anonymity and screen names with strong accountability for abusive actions to include effective limited and network wide bans.

Respectively, Seven Alpha prevents Death in the sense it retains your Virtual Data after you physically die, so others may enjoy it; Seven Alpha preserves the Dignity of a formal record to assure usage of your online activity can be relied on in a strong three-party registration system affording anonymity necessary for academic work and review; and Seven Alpha ensures that after you are no longer able to protect your own works it will not rely on others or community support to ensure your Legacy (record of contributions, memberships, participation, and title) remain intact.

The alternative outcomes: Death representing the loss of virtual property when the estate at law normally is dissolved by other forms of registration or liquidated wrongfully; Hell as the erosion of relevance after an influencer or innovator passes and/or ceases to exert a role in community activity; and The Grave representing the end of suffrage and participation right with the passing of the agent and conditional their life and ongoing contribution, to any roles or equity including voice in community which their legal heir may wish to exercise or preserve at law.

As such, and conditional to the terms set forth in Seven Alpha governing the optional contracts and defined agreements among API providers, the creation of the estae in trust is made a legal fact pursuant to the laws of the State of Oklahoma and our participants, and bears standing as a central user account in registry of the Seven Alpha Network and its sponosred agent in limited INTERSTATE COMMERCE by United States corporation in formal and state made lawful agency, presently RACCOON TECHNOLOGIES INCORPORATED of Ada (Oklahoma), the designated trustee of such estate at law.

Historical and Legal Context of the Metaphors

Historically, Death represents the end of all power to act in the world of living persons and over property there. So arresting 'Death' means arresting the disruption of that authority.

Hell, in context to the old language, is more accurately translated as the abolition of existence than the metaphor of the garbage dump well know in Biblical times, and wrongly interpreted as fire and torture in evangelical era, to represent the utter destruction of any record or evidence that a person actually lived or existed - similar to erasing them from history and seizing credit for their works and acts, innovation, and deeds by larger collective groups they were assimilated by or outcast into. If the works of a person are their 'soul', then the destruction of their soul (works) would be the erasure of their deeds and all memory and name from history. In this context, the Legacy of the person would be obliterated, and so the concept of 'Hell' above and preservation of the same to the credit of individual and not to works of groups or outcome of society as some imaginary function of process or collective will, is preserved by this system as its core objective goal.

The Grave is the physical representation of the body being decomissioned and removed out-of-sight and beneath the earth (grave) so it shall no longer have standing or be used as a legal thing in matters at state by anyone. To literally 'walk out of the grave' is to walk in legal standing from a place having none to the square which bestows the rights of individual personhood and powers associated with the being of a living person. This power, too, afforded by the estate planning of the contracts and conditions codified for use by vendors and the estate at-law represented by the Key system which survives the physical death of its original agent in perpetuity - including all the rights bestowed upon it and the option to continue to exercise those rights with consent of the other parties in contract a legal thing at law among Seven Alpha partners and the designated survivor/heir of the estate, without right to sale or other use in Commerce or transfer for lesser circumstance. This concept, the same element in contract as a security for financial instruments, disbarring any money or commodity and limited solely to persona, suffrage, access rights, social media authority, and other privileges at-law, also conditional terms and service and use.

The cryptographic identity, registration, and access framework of Seven Alpha therefore seeks to arrest other automatic procedures at law which are afforded the right under Trust and estate rules a civil contract at law, and establish in trustee a stewardship over the affairs and protection of such data as afford certain advantage for partners and members and other API consumers, including strong user control and privacy rights.

This is, in a small way, a metaphorical stab at "defeating death, hell, and the grave" as relayed in the story of Jesus of Nazareth with respect to his time during Passover and popular stories in the evangelical tradition of Southeastern Oklahoma, and its relationship to the domain:

...and the related core registry of users (The Book of Life) governing the service Seven Alpha. The theme is recurring, such as reference to the "Seven Seals" of Revalations as the "Seven Gates" of the VPN network routing mesh, ephermal IP end-point-netwrok, and citation of the "Ninth Gate" (a citation to 'The Nine Doors to the Kingdom of Shadows' in the Roman Polanski movie on the screenplay by Enrique Urbizu in 1999.) The original book (a work of fiction, published in 1993) as "The Club Dumas"

The illustrations of which, including moving gates and doors, inspired the concepts in advanced networking and cloud servers employed for Seven Alpha security. The concept that you could walk through a door and be free of mortal contraints fascinated the writer to consider the legal ramifications and requirements in context to business law, information services, network security, and privacy rights.

As Crypto evolved into multi-key multi-factor solutions and instanced cloud technology infrastructure, the metaphor of the 'seven gates' and ninth gate (administration) access control evolved to abstract the concepts that would bore more non-programmers to tears (PKI, key stores, digital signing, etc). At risk of upsetting traditional Christian audiences, the metaphor dramatically cuts a path down analytical conversations of security versus non-germaine hate speech from users who traditionally win by 'shouting down' their opponents and overplaying their skills to intimidate other vendors and customers against criticism and report of illegal activity in backbone optical transport and high volume data network services, where state sponsorship to promote censorship and wiretapping directly threaten users rights to the extent a network like Seven Alpha is now necessary. As with shippping, the amount of goods a vendor can move is not nearly as important as the security and privacy of their movement. Efforts to disrupt that movement by large monopolies in optical transport against many smaller vendors using forged Denial of Service (DoS) and violent fraud tactics by Texas and Michigan companies prompted the Seven Alpha concept into formal development.

Contrary regular VPN services, Seven Alpha provides valid user information to combat abuse by customers of other customers and services, limiting service to maximize business throughput while monitoring and arresting beligerant traffic and removing bad actors proactively.

Effort to discredit or mar the service based on superstition or lack of access arise mostly from volume wholesale public Internet Exchanges (IX) whose practices of scraping data and selling access are threatened by strong cryptographic data services and next-generation privatized Internet with national ownership limitations. The Seven Alpha technology would disbar large foreign state investors in the United States and other countries vulnerable to wholesale wiretapping and espionage at the carrier and exchange level, and reveal true ownership via shell companies a number of foreign owners who represent a clear threat to national security of nations in which they are seeking expansion.

Like the work of Julian Assange and Phil Zimmerman, the impact on United States network services and policies if Seven Alpha products gain traction is substantian. Encryption has never been a strong platform for national security interest in transparency of civilian communication, contrary the best practices and abuses evident in 2001-2019 assault on the Oklahoma firm developing Seven Alpha. Encryption is in the interest of National Security, so much so that military networks will not even share truck access with the services used by civilian businesses, citing national security concerns.

Some States, like STATE OF TEXAS, also object - as they rely on forfeiture laws to compel citizens to comply with fraud before the Federal Treasury for monies in excess of $70 billion USD per year, and such laws have been (recently) ruled unconstitutional and illegal for over 200 years per the SCOTUS ruling in 586 U.S. case 17-1091 and 588 U.S. case 17-647 right to relief contrary sovereign immunity claims of STATE OF TEXAS in these matters, tainting the United States Patent and Trademark Registry by such unlawful and illegal actions since 2001 August in support of their optical telecom and related securities markets jointly with STATE OF MICHIGAN, STATE OF CALIFORNIA, and STATE OF NEW YORK - executing large capital finance rounds similar to ENRON and MCI WORLDCOM again through NATION OF JAPAN and PEOPLE'S REPUBLIC OF CHINA state-fund investment.

Private networks like Seven Alpha are therefore vital, just as an impartial judge might have been in the case of Pontius Pilot at the Trial of Jesus, and resulting crucifixion to 'please the Jews' rather than comply with the Rule of Law; a Hegelian Dialectic decision if ever there was one.

In terms of Internet security and privacy, control over contact, and harassment - a civil death can have all the same impact in our society and workplace rights as a physical death, rendering a person 'legally dead' while their body remains alive to suffer the 'invisible' (inferior) treatment and exploitation of human trafficking, debt-bondage, and other forms of abuse barred by 22 USC Chapter 75 and 21 O.S. 21-748.1, generaly themed "genocide" by removal of children, loss of economic right to work, emotional and psychological abuse, deprivation of care and basic services, and other forms of injury themed "serious injury" in 18 USC 1589 Federal Law, a felony even when performed by State agents and court officers as a procedure at law, per Supreme Law in "The Convention on the Prevention and Punishment of the Crime of Genocide"; as exposed in case 01-17702-R and "FR-18-04", a civil suit themed "automatic mistrial" and refused 45 CFR 303.6 rule and protection at law to embezzle (18 USC 666) from the Treasury of the United States from 2001-2019. These concepts, in civil death, also strongly contributed to the design and language of Seven Alpha, to compare the right of return and remedy guaranteed under Oklahoma Constitution Article II section II-6 with the raising of Lazarus in the Biblical fable, and threat that such revalation posed to the Sanhedrin, as well as to the fable of of Hiram Abiff as killed and concealed under a sprig of Acacia. Like the allegory, Seven Alpha relies on metaphors to guard secrets of design (also protected at law by the Oklahoma Trade Secrets Act).

§21-1732. Larceny of trade secrets – Applicability of section.

    A. Any person who, with intent to deprive or withhold from the owner thereof the control of a trade secret, or with an intent to appropriate a trade secret to his or her own use or to the use of another:

      (a) steals or embezzles an article representing a trade secret, or,

      (b) without authority makes or causes to be made a copy of an article representing a trade secret, shall be guilty of larceny under Section 1704 of this title. For purposes of determining whether such larceny is grand larceny or petit larceny under this section, the value of the trade secret and not the value of the article shall be controlling.


      (a) The word "article" means any object, material, device, customer list, business records, or substance or copy thereof, including any writing, record, recording, drawing, sample, specimen, prototype, model, photograph, microorganism, blueprint, information stored in any computer-related format, or map.

      (b) The word "representing" means describing, depleting, containing, constituting, reflecting or recording.

      (c) The term "trade secret" means information, including a formula, pattern, compilation, program, device, method, technique, customer list, business records or process, that:

        1. derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and

        2. is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

      (d) The word "copy" means any facsimile, replica, photograph or other reproduction of an article, including copying, transferring and e-mailing of computer data, and any note, drawing or sketch made of or from an article.

    C. In a prosecution for a violation of this act, it shall be no defense that the person so charged returned or intended to return the article so stolen, embezzled or copied.

    D. The provisions of this section shall not apply if the person acted in accordance with a written agreement with the person’s employer that specified the manner in which disputes involving clients are to be resolved upon termination of the employer-employee relationship.

    Added by Laws 1968, c. 110, §§ 1 to 3, emerg. eff. April 1, 1968. Amended by Laws 1986, c. 85, § 12, eff. Nov. 1, 1986; Laws 2009, c. 287, § 1, eff. Nov. 1, 2009.

What this means is, asking for technical plans or details beyond the metaphor as a condition of right to operate a business or make claims or offers shall be construed as felony criminal activity and treated as such. Do not fail to regard the law in this matter. Elements of the Seven Alpha product are protected by Trade Secret and subject to the prior statutory rule verbatim.

For more infomration, see: Blackmail, extortion, and felony rules in Oklahoma.

Technical Analysis

Seven Alpha requires three (3) digital keys and one (1) password to access the data store and related data associated. This key system protects users from access without authorization, monitors internal access, and automates information without making credentials a mandatory part of the account system, further allowing granular control over access for users concerned about any tracking of their activity not required for site-to-site ban and age verification tools. By rating user authentication using tokens, questions like age validity and right to contact into binary (True or False) query-response API tools.

In context wtih COPPA and other regulations deemd good legal stewardship, Seven Alpha presents a framework API which help vendors be compliance with the minimum amount of customization on their part. By associating the INTERSTATE COMMERCE obligations with strong identity and management tools, Seven Alpha effectively privatizes the traditional role of government in the same manner that lawful agency and trust law in estate afford protection to corporations for individual and private business, entertainment, and social aspects not governed at law by the same protections afforded economic activity.

As a Christian, the developer used the citation of Jesus power to overcome 'Death', 'Hell', and 'The Grave' to represent the ability to defeat the pluralism of property, reputation, and rights associated with the physical living body - preserving those rights with consent and prior agreement of the service provider (rights grantor) and customer (rights receiver), including the right to create transferrable account privleges and benefits as a class of rights. Imagine, if you will, passing down your user account for a game over 50 years to your son, his daughter, and her child... as a founder of that product or service. Seven Alpha preserves the 'works' of a person, in this manner, and creates a portable and industry standard model compatible with transfer of ownership and license rights for major properties which may fall under development of multiple companies over a twenty or thirty year property lifecycle. This type of grant installs unique property rights and collective bargaining opportunities with major vendors to support a large community base and development of that community.

This process only makes sense when the Seven Alpha network exposes that accounts are not destroyed or new accounts created on lapse of subscription, and the data is preserved whenever a member stops paying for service as a permanent account in trust for as long as the Seven Alpha Network shall exist. This means your data - the works performed via this intrumentality at least - will be preserved

For persons who have been through genocide, hate crimes, and other forms of stalking targeting the reputation and character of their mind and mental health, as cited by Justice Thomas in the characiture abuse by Liberal Progressive violence in his term as Supreme Court Justice, the ability to keep a 'diary' during such abuse and records closed to the public which family members and historians may benefit from later is of tremendous value. With online violence escalating to directed attacks and abuse of network services at the national level as Russian Federation members witnessed in the Ukraine cyberattacks, the ability to insulate your online life and protect your channels of contact among trusted persons and communities protecting the contents of those publications from surveillance on a global scale with VPN and other tools available to abusers - Seven Alpha begins to define its niche in privacy application middleware.

The only inaccuracy in the prior diagram is that all keys AND a fourth factor are required to access any of the components of the system. While the keys are named after the three aspects they address, metaphorically, they do not have any ability to open a locking mechanism without the other three components. Seven Alpha is therefore more secure than the International Payment Card Services (PCS) standard, and requires 2048 bit or higher security, to the third power, making for 755 billion possible combinations or more per user account. Counting the user name (factor five), IP address locking (factor six), and device strong identity key (factor seven), that makes brute force attacks statistically impossible without triggering account lockdown and verification activity. Details pertaining this method (security) are not featured or representative above, and do not describe the "Seven Gates" system - the VPN peer network and routing mesh - which are proprietary to Seven Alpha.

Metaphors, especially religious themed ones, tend to quickly identify the irrational and dangerous persons who read into content delusions and projection unrelated to the subject matter (non-germaine content) - and help us to filter these persons out of our community prior to any meaningful discussion or serious dialog. The symbolism and naming conventions also resonate the values and mission statement of Seven Alpha, which is to enhance the dignity and security of all persons against forms of abuse amplified by modern anonymous communication and global visibility of viral media which is beyond the control of regional and national jurisdictions to support adequate protection and enforcement set forth in law. Seven Alpha is just an enforcement mechanism, and unlike early crypto-tools (eMule, Napster, et al) it is designed to support proper law enforcement actions and assist rights holders, not disable them.

FAQ (Frequently Asked Questions)

  • Does Seven Alpha include Cloud Storage?

    No. Not as a part of the core service. Vendors using Seven Alpha may provide Cloud Storage, but key services do not provide mass storage of data or files. Frankly, this is because the framework disclaims any and all content themed sexually oriented, and most content people store even if personal and lawful, contains that data. We do not want to be a time capsule for your grandfather's pics of your grandmother. If you need that, contact one of the many other services for that purpose and party on.

  • What is stored in the Key Database

    Serial numbers, tokens for product sku invoices, and other data and products which are formatted for the Seven Alpha API. Vendors must supply this information if they want to register products via the API.

  • Are all licenses perpetual or transferrable

    No. Certain rights may be flagged as such, like Founder / Sponsor Honors as a transferrable honorarium, which add value to being a start-up or venture patron, but most license models are terminated lease on end of contract which occurs when the registered party ceases to be alive permanently. That we offer options that can be conveyed to family or transferred to related accounts by sanguinality disclaim the sale of such honors and title, while affording a great benefit to venture micro-capital offers.

  • What is the purpose of Access and Archive Rights?

    Access rights allow use and control of account content, while Archive tools afford access based on strict terms such as warrant or specific application data obligated by law. When a question at law arises, such as first use, creation dates, etc - these data points can be essential to settle matters and are routinely distributed and deleted in five years by most providers. Retained data is goverend by COPPA, and beginning January 1 2020 strict rules governing this will come into effect in the United States similar to GDPR in the European Union. The tools also provide a way to register and log any executed "right to be forgotten" in full or part, if exercised by our clients, and may be used to clear this information in compliance with European Union law by the end user or their estate at-law, unlike most other services today. This compliance feature again benefits API users.

  • Why Centralize my Data?

    Networks adapt to risk. In the past, the threat of your data being gathered and sold or retained, or shipped to jurisdictions which do not regulate its retention prior deletion in the country it was gathered in or from, did not pose a threat to individual users. Violent and abusive stalkers also did not enjoy the privileges of large corporations reluctance to permanently ban them and reliance on difficulty to refuse to do so.

    Threats have changed, and personal computer services are also not trustworthy third-parties for information tokens. A trusted third-party to hold and verify users and data is a form of risk management. Paired with disclosure and transparency for the end-user, and 'right to be forgotten' to control or delete data specifically, creates a form of private social media space essential to electronic commerce and trust with export capabilities for virtual products (Serial Numbers, et al).

    As long as you control your data, and can physically tokenize the access tool for unsophisticated (family) use in case of emergency, this is a good and necessary evolution of security against systematic and large-scale identity and traffic data collection now supporting many "free" services in exchange for carte blanche access to your communications and activity at your computer, phone, or Internet device. Since all Seven Alpha members adhere to a DO NOT TRACK policy, this means your data in your own account is the only record you need to be concerned with and a complete view of all network records associated with your account which do not belong to the application of a Seven Alpha host, and such data is not eligible for sale or access as a condition of their participation in the network. Paired with the variable IP and user identity matrix in the Seven Gates (mesh network), application providers are not privy to user activity or their home IP or other identifying information.

    This "blind trust" of user accounts from a trusted network resolves most of the tracking issues associated with abuse of privileged connection information in the same way a global VPN affords anonymous users. To these clients, the ability to effectively ban a user without an IP ban is more valuable than any loss of potential revenue from scraping connection data which could potentially become a COPPA (2020) violation later.

  • What is Logical Storage Block Data?

    Volume Block Storage, sometimes called "attached storage" is a file mounted as a file system, much like a 'virtual hard drive'. The term "logical" means this is not a 'physical' drive or device, but instead a file which can be moved from place to place (like a block of data), and remains secure and locked during transport independent of the encryption (or lack thereof) in a specific channel. While this can be used for cloud storage, it is also useful to hold very small credentials and keys, database files, and other records not designed for flat-file access.

    The 'object' that is locked by the system and requires the 'keys' to open in our model is a similar logical encrypted block data object, designed to be secure when not in use or access. Stealing an entire machine with the data block on it will not, therefore, allow access to a party without the keys and secret. Additionally, the encryption is multi-layer multi-cipher, making decryption by brute force under ideal circumstances still very difficult and limited by physical storage media regardless of computing power. In combination with the rotation of keys regularly, this prohibits long-term brute-force attacks from potentially compromising a secure data store even in the hands of a hostile power or state.

    Because the object holds other tokens to access the distributed data system, it further negates the chance of data access by forcing a single or multiple keys and a secret known to the client, without the additional secret and keys retained by the service. It is not a virtual drive for customers to store data or files on. Instead, it is the 'master gate' which client requests must pass to execute changes on a secure network of very strong cryptographic trust. In the Seven Alpha Network, the unit functions as a single openstack universal link to other data servers (gates).

  • How does this differ from Kerberos?

    Kerberos is a Massachusettes Institute of Technology project that handles hand-off security between two servers to a third server, effectively obscuring your key using a single link implicit trust between a ticket-office and a back-office server. Kerberos does not manage any data or access privileges, authenticate other aspects of accounts atomically, nor provide network-wide ban capability to select areas or multiple sub-nets. No code is shared with the Kerberos project in Seven Alpha.