STEADYWATCH™ — Quantum Security Platform
Quantum V^ LLC · Principal Investigator: Nathaniel Vazquez
Status: ✅ Production-Ready · Hardware-Validated · DUO Parity Achieved
This repository contains the public research and demo infrastructure for Echo Resonance Technology — a quantum-resistant security platform combining information-theoretic security (GHZ entanglement) with computational security (Echo Resonance encryption).
The platform has reached full Cisco DUO functional parity as a self-hosted biometric OIDC Identity Provider, running on a Raspberry Pi with no per-seat cloud subscription required.
STEADYWATCH™ HANDHELD: Atomic Clock Multi-Tool · Free · iOS · macOS · watchOS · visionOS
- Biometric credential enrollment · OIDC approval · Harmonic visualization · Stability measurement
Status: ✅ Live — IBM Quantum Hardware Entropy · Publicly Verifiable
True random number generation derived from real IBM Quantum hardware runs across all three Security Trinity hives (VAULT p=5, VIPER p=13, LOTUS p=17). Every byte is traceable to a verifiable IBM Quantum job ID.
Architecture:
- Entropy pool: SHA-256 of all
seed_hexmeasurements across 912 satellites (VAULT + VIPER + LOTUS) - Key stream: HKDF-Expand(PRK,
qrng:stream:{counter}, length) — monotonic counter ensures output never repeats, even across server restarts - Public attestation:
/qrng/attestationreturns per-hive fingerprints and IBM Quantum Job IDs for independent third-party verification atquantum.ibm.com
Entropy Fingerprints (April 2026 seed run):
- VAULT (p=5):
0948620f8e0eb5c0…— 144 satellites - VIPER (p=13):
46c5131b05523c8f…— 336 satellites - LOTUS (p=17):
e4afa5e616f052bd…— 432 satellites
Live API endpoints:
GET /qrng/bytes?n=32— random bytes (hex)GET /qrng/int?min=0&max=1000000— unbiased random integer (rejection sampling)GET /qrng/float— uniform float in [0.0, 1.0)GET /qrng/uuid— quantum-seeded UUID v4GET /qrng/batch?count=10&bytes=32— batch generationGET /qrng/attestation— public provenance document (no auth required)
Try the live demo: infin-8.github.io/STEADYWATCH-QUANTUM-DEMO/qrng.html
Evaluation guide: QRNG Enterprise Setup Guide
Full RFC 8628 (Device Authorization Grant) OIDC Identity Provider with biometric-backed approval, RADIUS bridge, multi-tenant isolation, and admin console. Direct replacement for Cisco DUO — self-hosted, no per-seat fee, runs on a Raspberry Pi.
Capabilities:
- RFC 8628 Device Authorization Grant (OIDC/OAuth2)
- Biometric-backed approval via iOS app (Trinity key fusion)
- RADIUS bridge — RADIUS Access-Request → OIDC Device Flow
- Multi-tenant isolation with per-tenant API key registration
- JWT with biometric claims (
sw_biometric_factor,sw_prime,sw_confidence) - Admin console with tenant and session management
- JWKS endpoint and OpenID Connect discovery
Try the live demo: oidc.html
Status: ✅ Deployed — VAULT™ · VIPER™ · LOTUS™
The F4 Hurwitz lattice shell, previously used as a visual identity for each server, is now cryptographically load-bearing. Every operational unit in the Security Trinity is bound to its nearest F4 lattice site. The quaternion coordinates of that site are folded into key derivation — without knowing the F4 structure, keys cannot be reproduced.
| Server | Prime | F4 Sites | Operational Units | Binding |
|---|---|---|---|---|
| VAULT™ | p=5 | 144 | 81 key slots | Grid → nearest F4 node |
| VIPER™ | p=13 | 336 | 336 detection keys | Direct (key IS quaternion) |
| LOTUS™ | p=17 | 432 | 432 swarm nodes | Direct (key IS quaternion) |
The 95 F4 sites at p=5 unreachable by any vault slot form a structural guard ring (the Moat). Any fingerprint forgery must account for all 144 sites including the moat.
Research: docs/research/F4_NODE_BINDING_CRYPTOGRAPHIC_ADDRESS.md
Status: ✅ No Pre-Shared Secret Required
Solves the QKD bootstrapping problem. Each API server in the Security Trinity has a unique Hurwitz prime. The F4 shell around that prime forms a crystal cluster with a shape unique to that prime — SHA-256 hashed to produce a lattice fingerprint. Any party can independently compute the expected fingerprint and verify a server's identity without prior communication.
Security Trinity Fingerprints:
- VAULT (p=5):
e1d594a946e07e52...— 144 F4 lattice sites - VIPER (p=13):
aa270de9ab65cbd2...— 336 F4 lattice sites - LOTUS (p=17):
d4ddded70230b364...— 432 F4 lattice sites
Research: docs/research/HURWITZ_LATTICE_BIOMETRIC_AUTHENTICATION.md
Status: ✅ First Cross-Platform Qubit Aggregation System
- 783 qubits aggregated across IBM Quantum + AWS Braket
- Shor's Algorithm (750 qubits needed): ✅ FEASIBLE
- Grover's Algorithm (258 qubits needed): ✅ FEASIBLE
- First cross-platform aggregation system of its kind
Research: docs/research/CROSS_PLATFORM_QUBIT_AGGREGATION.md
Status: ✅ First Bell Inequality Violation on Real Hardware with Loophole Closed
- Mermin Parameter: |M| = 3.7216 (93% of theoretical maximum)
- Violation: 86% above classical limit of 2.0
- Freedom-of-Choice Loophole: Closed via quantum random number generation
- Error Mitigation: 51.83% improvement (|M| 2.4512 → 3.7216)
- Hardware: IBM Quantum ibm_fez (156-qubit Heron r2) · 40,000 shots
Raw vs mitigated Mermin parameter — clear Bell inequality violation
Research: docs/research/BELL_INEQUALITY_BREAKTHROUGH.md
Status: ✅ First Complete End-to-End QKD Protocol on Real Hardware
IBM Heron R2 quantum processor (156 qubits) used for all hardware validation
Dilution refrigerator maintaining qubits at near-absolute zero
All 6 protocol phases validated on IBM Quantum ibm_fez:
- ✅ Authentication — HMAC or Hurwitz Lattice-Metric (no pre-shared secret)
- ✅ Quantum Key Generation — 65% raw fidelity
- ✅ Error Detection — 52% error rate detected
- ✅ Error Correction
- ✅ Privacy Amplification
- ✅ Key Verification
12-qubit GHZ circuit: H gate initialization + CX chain entanglement
Multi-qubit GHZ entanglement — unconditional security through perfect correlation
Error Mitigation: 33% fidelity improvement (65% → 100%)
Job ID: d5gs5mkpe0pc73alki40 (verifiable on IBM Quantum)
Execution Time: 7.69 seconds
Research: docs/research/QKD_MILESTONE_RESEARCH_PAPER.md
STEADYWATCH™ is a production OIDC Identity Provider and Cisco DUO replacement.
| Document | Purpose |
|---|---|
| Live API Status | Real-time service health for QRNG and OIDC |
| Auth Platform Demo | Live RFC 8628 device flow demo |
| OIDC Enterprise Setup Guide | Curl walkthrough, JWT inspection, DUO comparison |
| Feature Matrix | Capability comparison vs Cisco DUO |
| TCO Analysis | 3-year cost comparison at 100–10,000 users |
Enterprise licensing: Contact Quantum V^ LLC
| Paper | Description |
|---|---|
| QKD Milestone Research Paper | First end-to-end QKD validation on real hardware |
| QKD Academic Paper | Formal security analysis |
| F4 Node Binding | Geometry as cryptographic address |
| Hurwitz Lattice-Metric Authentication | Biometric-style identity for QKD |
| Cross-Platform Qubit Aggregation | 783-qubit cross-platform system |
| Bell Inequality Breakthrough | First violation with loophole closed |
| Hurwitz-Mermin Hardware Validation | 95.5% Mermin violation on ibm_marrakesh |
| 144 Z Primes — Hurwitz Quaternion Satellites | Quantum entropy seed generation |
| GHZ Network Authentication | GHZ-based network auth validated on IBM hardware |
| Wardenclyffe → GHZ → Echo Resonance | Shared state parallel across centuries |
STEADYWATCH-QUANTUM-DEMO/
├── index.html # SHQKD platform landing page
├── oidc.html # Auth Platform / DUO replacement demo
├── qrng.html # QRNG-as-a-Service demo + attestation panel
├── status.html # Live API status page (QRNG + OIDC health)
├── styles.css / app.js # Site styles and logic
│
├── quantum_computing/ # Core quantum backend
│ ├── unified_api_server.py # Main Flask server (75+ endpoints)
│ ├── oidc_provider.py # RFC 8628 OIDC Identity Provider
│ ├── qrng_service.py # QRNG service — HKDF stream over quantum entropy pool
│ ├── key_derivation.py # HKDF key derivation from IBM Quantum seed files
│ ├── echo_resonance_circuits.py # Echo Resonance quantum circuits
│ └── echo_resonance_calculations.py
│
├── vault-api/ # VAULT hive (Node/Express, p=5)
├── viper-api/ # VIPER hive (Node/Express, p=13)
├── horde-api/ # LOTUS hive (Node/Express, p=17)
│
├── js/ # Browser-side quantum modules
│ └── hurwitz-lattice-auth.js # F4 lattice auth client
│
├── docs/
│ ├── qrng-guide.html # QRNG enterprise evaluation guide
│ ├── oidc-guide.html # OIDC enterprise evaluation guide
│ ├── research/ # Research papers
│ └── business/ # Enterprise positioning and TCO docs
│
└── images/ # Visualization assets
git clone https://github.com/Infin-8/STEADYWATCH-QUANTUM-DEMO.git
cd STEADYWATCH-QUANTUM-DEMO
pip install -r requirements.txtCheck API status: infin-8.github.io/STEADYWATCH-QUANTUM-DEMO/status.html
Try the live OIDC demo: infin-8.github.io/STEADYWATCH-QUANTUM-DEMO/oidc.html
Try the live QRNG demo: infin-8.github.io/STEADYWATCH-QUANTUM-DEMO/qrng.html
Read the research: QKD Milestone Research Paper
| Platform | Device | Qubits | Usage |
|---|---|---|---|
| IBM Quantum | ibm_fez (Heron r2) | 156 | QKD validation, GHZ scaling |
| IBM Quantum | ibm_marrakesh | 156 | Mermin violation (95.5%) |
| AWS Braket | Rigetti Ankaa-3 | 82 | Cross-platform aggregation |
| AWS Braket | QuEra Aquila | 256 | Neutral atom validation |
| Local (Pi) | Raspberry Pi 5 | — | OIDC production server |
© 2026 Quantum V^ LLC. All Rights Reserved.