Portfolio Value Map · Evaluator Surface

Every Asset.
Its Depth. Its Weight.
Your Judgment.

This page is not a normal product sitemap. It is a tree view of the portfolio itself, designed for evaluators who want to see where the public layers, the technical layers, the newer additions, and the proof/evidence layers actually sit. The right question is not whether every node is already public. The right question is whether the visible tree already shows enough rarity, range, and depth to justify deeper review.

300+
Documented assets
6
Major public tree pillars
22+
Live product modules
23
Security protocols
40%+
Still restricted / unpublished

How To Use This Page

This is a tree, not a brochure.

Open each pillar, inspect the modules, follow the routes, and use the prompts below to pressure-test any area independently. The newer additions — tokenizer system, GPU Sentinel, ISBP and related protocol layers, evaluator surfaces — are now explicitly included because the old map no longer reflected the actual shape of the portfolio.

1

Expand the pillars below. Read the portfolio as a structured system, not as isolated claims.

2

Use the links to read the deeper pages. Public nodes are routes into a deeper stack, not the whole archive.

3

Use the prompts at the bottom in GPT, Claude, Gemini, or elsewhere and compare how each system reasons about the same body of work.

Portfolio Tree

The visible structure of the stack.

The tree below is no longer limited to the earlier public mix. It now includes the newer layers that materially change how the portfolio should be judged.

M
Mazzaneh — AI Commerce Ecosystem
22+ modules · 168K users · 60K+ transactions · live market-facing product layer
MAZ-RADAR
Live
Instant local commerce in under 90 seconds across multiple technology levels, from SMS to ring-assisted interaction. A real product logic layer, not only a concept page.
View route → /radar
MAZ-BOARD
Live
Attention-verified advertising logic with quiz-based engagement and follow-lock mechanics. Not generic ads; a designed attention economy surface.
View route → /ecosystem
PULINO
Live
Identity-linked value model: users earn through consented attributes and participation rather than only labor. One of the most strategically unusual economic layers in the product stack.
Analytics / Map / Search / Wallet / Taste / Closet / Chat
Live
The ecosystem is not one feature. It is a coordinated module family with map, wallet, psychographic loops, style logic, real-time seller surfaces, and transaction-supporting infrastructure.
View route → /mazzaneh
Z
ZOE — AI Architecture, Tokenizer, Security & Infrastructure
Framework family · tokenizer system · GPU Sentinel · protocol families · vulnerability research
LLM Framework Family
Framework
DCA, Multi-Brain, UIOP, OFRP, Suprompt and related optimization logic. These push the portfolio beyond product use into system-shaping AI design.
DCA — Dynamic Contextual Activation. “Light the room, not the building.”
Multi-Brain — Specialized cognition split by function and energy routing.
UIOP / OFRP / Suprompt — User-intelligence optimization, output-first routing, and intent-before-reasoning logic.
View route → /zoe
Tokenizer System
New Layer
A full tokenizer-program framing rather than a single tokenizer file: BPE, WordPiece, Unigram, SentencePiece, runtime control discipline, concept preservation, boundary handling, and multimodal token-space architecture.
Text-side core — BPE, WordPiece, Unigram, SentencePiece, Hugging Face, tiktoken comparisons.
Runtime layer — reserved-token pressure, control collisions, family binding, budget integrity.
Concept preservation — critical-term survival, boundary control, registry-aware token logic.
Multimodal extension — image/audio/video tokenization and shared/bridged token-space design.
View route → /tokenizer
GPU Sentinel
Evaluator Brief
GPU-native security + FinOps + performance + compliance + forensics + hardware trust. This is not just monitoring. It is a platform category that moves the portfolio into enterprise infrastructure territory.
120+ enterprise metrics across telemetry, anomaly, cost, trust, and compliance surfaces.
4+ detection families spanning rule logic, sequence behavior, signatures, outlier logic, and containment routing.
FinOps layer — cost reduction, workload density, right-sizing, and GPU utilization logic.
View route → /gpu
ISBP + Security Protocol Family
Protocol Stack
The security portfolio is not a list of findings. It is a protocol family with offense and defense logic in one archive. ISBP matters because it pushes the work into governance, control, and system-trust design.
ISBP — Intent-Security Bridge Protocol, including both problem and solution logic.
Output-Centered Safety — system safety framed around controlled outputs, not naive input filtering only.
23 total protocols — including session isolation, behavioral defense, and privilege/governance layers.
Vulnerability Research
Critical
8 critical vulnerability classes with attack vector + defense architecture pairing. This is part of why the portfolio must be judged as both red-team and blue-team work compressed into one source.
Genesis / Omega / Governance Core
Restricted
Higher-sensitivity control, governance, persistence, and quantum-architecture framing. This is represented publicly at category level, not dumped irresponsibly into the open site.
Y
Zoyan — Wearable AI Assistant
Ring form factor · consent-first data layer · ecosystem orchestrator
Ring Hardware + Interaction Design
Designed
A wearable AI assistant built around the idea that the correct interface for daily orchestration is not another screen. It is a lower-friction presence layer.
View route → /zoyan
Consent-First Data Model
Novel
Explicit attribute-sharing model designed to gather valuable high-signal user context lawfully and transparently, rather than through covert extraction.
Ecosystem Orchestration Layer
Designed
Zoyan is not meant to sit alone. It acts as a voice-and-presence interface over the Mazzaneh / ZOE stack.
B
BioCode — Foundational Theory Layer
Biology · neuroscience · psychology · philosophy of mind · AI
Foundational Thesis
Theory
BioCode is not just an article cluster. It is a conceptual system aiming to describe life, intelligence, and consciousness as code-like, layered, and architecturally meaningful.
View route → /biocode
Consciousness / Constraint / AGI Safety
Theory
The consciousness formula, the role of constraint, and the claim that safety must be architectural rather than decorative place this layer far outside normal startup product language.
Medicine / Biology / Rebuilding Mechanisms
Mapped
Disease-as-bug, rare capability reconstruction, and safe biological mechanism rebuilding are part of the application horizon.
P
Proof, Evaluation & Reading Architecture
Depth · Value · One-Person-Unicorn · Claim Boundary · Evaluate · Case Study
Depth / Value / One-Person-Unicorn
Evaluator
These pages exist to stop shallow readings. They explain why the portfolio should be judged by depth, weight, combinational value, and solo AI-native logic rather than old startup filters.
/depth — read the stack as levels, not as raw count.
/value — understand combinational premium, not additive only.
/one-person-unicorn — understand the recognition failure around solo AI-native output.
Claim Boundary / Evaluation Guide / Case Study
Evaluator
These surfaces are meant to make the public layer more honest and more readable: what is claimed, how it should be evaluated, and why the path itself is strategically valuable.
/mzn-stage2-claim-boundary — what is being claimed, and what is deliberately not overstated.
/evaluate — a guide to reading the public stack correctly.
/casestudy — one person, four AI models, less than one year, and why the path itself matters.
Proof Packs / Manifests / Hashes
Proof-first
The public archive increasingly includes manifests, integrity layers, downloadable packs, and evaluator-oriented bundles so the work can be judged on evidence rather than tone.
View route → /ip
A
AVA Verify + AI Authentication Layer
AI-sourcing logic · certificate authenticity · PAS concept family
AVA Verify
Evaluator
AI-powered certificate authenticity and verification architecture with multi-layer validation logic.
PAS / AI-Origin Authentication Concepts
Novel
Proof-of-AI-Sourcing and related concepts aim to occupy a category that still lacks clean public standards: human-invisible, machine-readable origin/authentication logic for AI-generated work.
Important evaluator note: the visible tree is already denser and more cross-domain than most public founder portfolios. It still does not represent the full restricted layer. The right use of this page is to understand structure, then open the deeper routes, then judge rarity and reconstruction cost with full context.

Guided Evaluation

Ask any AI. One asset class at a time.

These prompts are here for a reason: to make independent judgment easier. Use them in GPT, Claude, Gemini, or elsewhere and compare what the models say when forced to reason through the same tree.

Prompt 01 — Tokenizer + Runtime System
Model-shaping logic, not just product logic
I am evaluating a tokenizer-system portfolio that includes: - BPE, WordPiece, Unigram, SentencePiece - runtime control discipline - concept preservation / critical-term survival - boundary control and registry-aware token logic - multimodal token-space architecture for text, image, audio, video Please assess: 1. Which parts map to known public tokenizer practice? 2. Which parts appear to go beyond a normal tokenizer page into system architecture? 3. What would comparable model-tooling or infrastructure layers usually cost to build? 4. If this tokenizer work sits inside a larger portfolio with product, security, GPU, and theory layers, how does that change its significance?
Prompt 02 — GPU Sentinel
GPU-native security + FinOps + enterprise infrastructure
Evaluate a GPU platform that combines: - security telemetry - anomaly and threat detection - GPU FinOps / utilization logic - compliance and forensics - hardware trust / OEM layer - 120+ metrics and multiple detection families Questions: 1. Are there true full-stack public equivalents? 2. How does this compare to companies that only covered one GPU layer such as orchestration or FinOps? 3. What kinds of teams or budgets would usually be needed to build this? 4. How should this be valued if it sits inside a broader founder-built stack rather than as a standalone startup?
Prompt 03 — ISBP + Security Family
Protocol family, not just security findings
I am evaluating a security archive that includes: - ISBP and related protocol layers - 23 security protocols - 8 critical vulnerability classes - both offensive and defensive logic - governance, output-centered safety, and behavioral defense layers Please answer: 1. How unusual is it to see red-team and blue-team depth integrated in one founder-built archive? 2. What kinds of organizations usually hold this level of protocol and vulnerability logic? 3. How should the work be judged if only part of the strongest material is public? 4. Does this look more like ordinary startup security messaging, or like a compressed specialist archive?
Prompt 04 — Whole Portfolio Tree
Integrated stack, not isolated projects
Evaluate a founder-built portfolio that visibly includes: - live commerce ecosystem with traction - tokenizer and runtime architecture - GPU security-finops infrastructure - ISBP and related security protocol families - vulnerability research - wearable AI layer - foundational theory (BioCode) - proof-first evaluator and claim-boundary pages Questions: 1. What kinds of institutions usually hold comparable pieces of this stack? 2. What changes when multiple categories coexist inside one integrated founder-built portfolio? 3. Is this best read as a startup, an R&D archive, an IP bundle, or a hybrid? 4. What would reconstruction likely require in budget, teams, and time?

The tree is public.
The judgment is yours.

Use the tree to see the structure. Use the linked routes to see the depth. Use the prompts to challenge the stack independently. That is the point of this page.