Wednesday, February 25, 2015

Sun Power Company

This is a basic plan.  Lots more to add:


Executive Summary

The plan is to deliver alternative power to existing electric grids on a country basis with separate companies for each country or jurisdiction.  Solar power is viable financially and has about a 4 year return on investment.  That is a financing issue that is solved with this plan.  

A public company is created to work with the existing electricity grid and government authorities.  It can raise capital in a public offering and issue common stock to land owners in exchange for the use of their land or roof tops.  This is not a lease, it is a contractual relationship of allowing space on the land or building for solar panels and related equipment.  The solar panels would be owned and maintained by the company with the company having no rights to the land or building.

Preferred stock offers voting rights without dividends and can be distributed to relevant parties, such as the electrical grid organization, governmental authorities and any relevant local authority or structures.  This allows local authorities to maintain a controlling interest if there become issues with the local management of the power system.

These companies are separate entities bound by local laws and regulations.  In the United States, there are 50 states plus territories, so there would be ~60 separate companies each organized under the laws of the relevant state.  As every country has unique laws and regulations, each countries' company(s) would be unique.

Solar power and other alternatives are distributed, so these companies must also be distributed.

In the United States alone, 60 companies require at least 1000 managers and executives.  There is no legal connection among the various companies.  They might have an open conference on a regular basis.

Other countries, such as Thailand, might have 1 company.


That is initial corporate structure and I am looking for people to get involved.

Tuesday, November 5, 2013

Fingerprint Touch - unified logon, password consolidation, and identity theft prevention


Fingerprint Touchtm
 The “Single Sign-on” mobile app

Overview
The way a person presses his/her touch screen is as unique as a fingerprint.  Combine that with a fingerprint scan and you have the most secure identification system on earth.  That is Fingerprint Touchtm.  Some key aspects to the technology:
  • the pressure applied and surface area on the touch screen is saved.
  • a database administrator is the only person with access to your personal data.  That administrator is a public officer for accountability.
  • the IP address of the database server is saved on the mobile device to make sure all subsequent messages originated from that server.

The above are part of a patentable system for a single sign-on site.  The app will log you into Google, Gmail, MSN, etc with just a single finger press.

Mobile Application
The first iteration of this will be an iPhone app for the 5S, although backward compatibility will be a major goal. Fingerprint Touchtm will be the first app you access on your phone. Press your finger and all your manual usernames and passwords will be centrally available. The server prototype framework is complete.

The app becomes a portal or entry-point to the internet while serving as a password consolidation utility and automatic login utility.

The design and detailed specs for Fingerprint Touchtm are complete.

Time to market
1. Finish the server-side application (1-2 weeks).
2. Develop the native application (4-6 weeks).
3. Create marketing materials (3-4 weeks).

Most likely within 7-8 weeks the Fingerprint Touchtm app for the iPhone would be available in the iPhone store.  Android would be next.

Profits
Cost for the app will be free. Corporate partnerships and licensing will be the revenue. Also, the portal itself can be leveraged for advertising data.  Going forward, security out of a spy novel might prevent identity theft forever.

Inventor & CEO
Andrew B Brown is a software engineer with over 15 years experience.  During his career he has completed over 20 successful projects in many industries, including real estate, accounting, mortgage, and human resources.  Mr. Brown has a bachelors degree in Accounting from UT Austin with a focus on philosophy and astronomy.


Fingerprint Touchtm Finances
The “Single Sign-on” mobile app

Round 1 Financing
Hire Objective-C developer                                                       $15,000
Write the server-side database                                                 $25,000
Retain IP lawyer (trademark and patent)                                    $10,000
Initial marketing (press release and materials)                            $7,000
Website (including graphics, server and database)                       $8,000
Administrative (filing fees, copies, subscriptions, etc.)                $3,000
Total                                                                                       $68,000
                                                                                                         
Round 1 will result in an iPhone app for the 5S in the App Store.  Time to market <2 months.="" o:p="">

Round 2 Financing
International IP lawyer (trademark and patent)                        $100,000
Marketing team (10 at $100,000 salary)                                  $1,000,000
Travel (hotel, transportation, per diem)                               $2,200,000
Airfare                                                                                   $300,000
Retain marketing firm                                                             $500,000
Expenses (wine & dine)                                                           $500,000
Membership and subscriptions                                                 $150,000
Website                                                                                   $10,000
Software development                                                            $800,000
Administrative (copies, phones, internet, utilities)                  $200,000
Office lease                                                                            $400,000
Furniture and fixtures                                                             $200,000
Social media marketing                                                          $100,000
Salaries for administrative personnel                                       $200,000
Salaries for management                                                        $500,000
Total                                                                                   $7,160,000

Round 2 will secure intellectual property globally.  Marketing to phone manufacturers and software companies to integrate the Fingerprint Touchtm at major corporations while marketing to the end consumer for market share.  Round 2 financing will provide funds for one year.

Round 3 Financing
TBD.  This will include offices throughout the world for identity theft prevention and restoration, including secure paper backup and DNA testing.  This is highly dependent on the partnerships built during Round 2 so cannot be estimated accurately.  Round 3 financing might be generated through internal revenue (patent fees at the phone manufacturer level).  A buyout during Round 2 is very possible.



Fingerprint Touchtm Screenshots
The “Single Sign-on” mobile app


This is a working application serving a secure image (chosen by the person) directly to the phone after a successful "finger press" logon.  The server code is solid and the framework including database and most of the security is built along with the specs for native app development.






















Fingerprint Touchtm FAQ
The “Single Sign-on” mobile app

The market?
All mobile phone users.  Keeping track of all the usernames and passwords for various websites is the problem. The initial Fingerprint Touchtm app will consolidate them and auto log you in, if desired.

The competition?
The only perceived competition is the iPhone 5S, but that is largely due to a misunderstanding of the technology.  The 5S does an excellent job of imaging the fingerprint, however, is insufficient for comparing a living person’s finger with the image.  In other words, it can be faked pretty easily from several different angles.  In contrast, Fingerprint Touchtm gives a tactile response that is remembered by the person as well as adding some security features not found anywhere. Going forward, version two will likely include adaptive response to the person's use.

The iPhone developers focused on detecting the image with sufficient granularity to pass any comparison test, however, did not adequately address the living being part when comparing.  Fingerprint Touch works WITH the iPhone 5S technology.  Not against.

Also, it is expected that Fingerprint Touch will be available on all phones with a basic touch screen.

The technology?
There are several approaches to detecting a human being actively pressing their finger on a touch screen:
  1. One approach is reading the pressure exerted.  This might not be available on all mobile devices.
  2. A second approach is reading the pixels at the point that the phone responds.
  3. A third approach is a timing mechanism combined with the image comparison.  This is a clever approach and might be part of the final solution, however, not my first choice.  It might be the base method chosen in the iPhone 5S.

The project is at a point where I need to hire an iPhone developer who understands hardware to make sure the algorithms I have designed are right.  I have a number of plans, however, do not know some specifics in the LCD display to know which approach will work best.  One of the approaches will, but that will require some technical discussions of very high detail.

Each approach will work by itself and it might be a combination of those approaches and a few other ideas that will be the final product.  I kind of prefer the first approach at the moment, but might change my mind depending on the hardware interface available on each phone.  This is a very low level API, and most developers have never even see that (a few game engine designers might be the exception).

In any case, the above has not been done before and can be patented. Gaining market share through a password consolidator opened with a fingerpress would be popular. Then the manufacturers will adopt the technology with a patent fee attached, of course.

Two other parts to the technology are the server IP and identifier included in every message.  This leads into a discussion of an application framework or viewport that could be sold to developers to simplify their HTML5 development.  Essentially it would be a generic way for an HTML5 developer to deploy to every device without concern for native functionality.  This also includes total security, of course.  That might be another way to gain market share and another product itself.

The other part of the technology is a database administrator in an officer position for accountability. 
This is a very important part.

Sunday, April 3, 2011

True Love Story - a true story looking for film/literary agent

In 1996 I was out of college for a few years and started work at a brand new mortgage wholesale company. I was the 5th employee. There was a young Vietnamese girl who was the 3rd employee. She was petite and sexy in her tight business skirt. Smart as could be and a little barracuda. She and I made instant best friends and although she was married we flirted and competed against each other. About 6 months later she introduced me to her older sister. Her name was Demi. Part Vietnamese, part Chinese, and part French. She lived in NYC (Brooklyn) and I later learned she was part of the Vietnamese mafia.

We met at a bar with a buddy of mine and her friend. We both sat in the middle of a large booth with her across from me and our respective friends on either side. China doll, but smart. We were both quiet and kind of shy, but we went out for food afterwards with her and her friend and me and my buddy. Drove an hour down south to the beach at 3am drinking the whole way. We made out under a blanket. A mosquito was buzzing around and I tried to kill it. She wouldn't let me and shooed him away. I fell in love instantly.

The next day she slept at my place. She returned from the shower. She was short.. only 5'2" and had pulled my towel that had been hanging on the door. She had to jump to get it back where I had left it. I was gone for her forever.

She went back to Brooklyn. On the fourth of July weekend, my buddy and I drove 22 hours from Houston. Straight through to meet her again. We arrived, went out to some small bars and listened to live music. I did most of the driving and loved driving in NYc. She woke me up in the middle of the night to quietly make love while her friend and my buddy slept on the floor nearby. We returned to Houston after only a day or two with her.

We took a number of trips together... Vegas.. New Orleans. I was one of the ushers at a friend's wedding. We missed the wedding.

She got me involved in a mafia scam once. We went to the mall to launder some money by purchasing a diamond ring. Faking that we were going to get married, we had a fight in the store. A funny anecdote here...

Finally she moved to Houston, with a live-in friend who was trying to be her boyfriend. For whatever reason, she would not allow herself to be with me. With her sister's support I visited, made dinner for her, went to movies, and occasionally she would want to get physical. We only did once or twice. She lived with her sister, her husband, their children, Demi's boyfriend and Demi's son. After some months I finally drove to her house, she packed her bag and left with me.

We bought a house together, rode mountain bikes with her son and me. She is the sexiest mountain biker who has ever ridden single-track in Houston, Texas. I have witnesses who will attest to that.

We fought once in a power struggle. We were in the bathroom and I put my hand on the wall over her head. This scared her physically and she scampered off. A few days later, although the bathroom was very clean, a colony of ants moved into some clean folded white towels right where we had had that fight. She hand carried every single one of those ants outside.

I had no desire or intention to ever cheat on her, but for some reason I started using the internet for online chatting. This went on for only a month or so, but of course Demi noticed. All this time I had been coming home for lunch every day. She and I were starting a mortgage business together so she worked from the home. Friendliest and most beautiful mortgage broker in Houston Texas in 1998 by far. No comparison. She was dingy and a little too organized sometimes, but I was good at follow through and setting her in the right direction. Anyway, I came home one day and half the house was empty. She had printed out every single website I had visited with transcripts of the chats, pictures, etc. The house was covered with thousands of printouts, taped to walls, underneath furniture, in drawers, every square of inch of the house was covered.

Now. We did get back together for a time and almost got married. For reasons outside both our control I moved away and we almost got married again. The only regret I have ever had in my life is not marrying her. For Hollywood, this could and should be a happily ever after story.

Kristin Kreuk is my suggestion for the role of Demi. They are similar in looks and style.

Saturday, January 22, 2011

Kids' Courtyard


Create a new building for single parents to go back to school. Unique design provides free day care for single parents and the surrounding community. Long term financing is provided by pooling Federal education grants and loans. 100% return within 6 months to investors with the opportunity for 100+ more projects throughout the United States. Initial investment is $1 million (can be a group of investors).

Multiple stories with pools on different levels. Indoor lighting from reflected sunlight on the roof with spotlights for tanning. Nighttime lighting would use the same system, but be artificial of course (perhaps fire). Chutes in the ceilings for kids to drop through into the pool. Study and observation glass windows overlooking each indoor courtyard area (some pools, some would be play areas for different ages). Living spaces on the outside of the building. Kids' Courtyard. There should be enough money for personal chefs in a buffet with hand carved roast beef and omelettes, etc.

Mothers share time watching the kids so plenty of study and play time are available without daycare costs. Kids in the neighborhood would be allowed during the day with possible mothers from outside also assisting in daycare.

The ownership of the building would be held in trust with the children owning the building (all children who played there).

Women would have to sign a contract to obtain at least a masters degree (6 years) and my initial numbers show a 3 generation (18 year) bond would be enough to finance the project with little to no expense to the mothers. Interest rate would be quite low as it would be backed by government-sponsored programs.

Ideally, I'd like to install conveyor belt sidewalks in the school area for getting to classes quickly.

A building for single fathers works with the same exact plan.

Modular sound systems.
State of the art video games.
Centralized computer system for easy upgrades.
Driving simulators with Recaro seats, stick shifts from Audi, BMW, or Ferraris.

Any father with a child can get in the building during the day. Free childcare for fathers in the neighborhood.

Note: No adults in either building (mothers' or fathers' building) of the opposite are allowed at any time.

Sunday, August 8, 2010

54 Noble Truths

To help young women understand their sexuality, this is a possible suggestion open for discussion: between the years of 14 and 23 (from conception date, not birth date), a woman can give 54 blow jobs outside of a committed relationship. Those blow jobs might be metaphorical or physical and arranged to fit her personality.

The blow jobs should be arranged in reverse, numerologically. For instance, one blow job to a super-hot guy (a 10), 2 to a 9, 3 to an 8, all the way until 10 blow jobs to ugly guys (a 1). Or perhaps 1 blow job to a 23 year old and 10 blow jobs to 14 year olds while meeting in the middle. Numerologically creative and interesting as decided by her.

One optimal version might be to stay metaphorical until the age of 18 where she gives 5 to people she likes. Then 4 when she is 19. Then she skips 20, 21, and 22 when she has time to learn her power over men. Then perhaps at 23 she reaches the peak of her potential as a woman in maturity and beauty. Just an idea of an ideal for a few.

Organization of the above can be as creative and numerological as she chooses, perhaps even with resets.

In my experience, intercourse was a disappointment. Making out with stimulation through jeans was much more satisfying. So, full intercourse is best when both parents are fully prepared to handle a life. When a child is conceived, the parents' emotional content helps the ovum choose the best sperm for her. Strong, fast protective sperm might reach the egg first, but his and her emotions combine to form a protective barrier where the ovum has a chance to choose the best for her. The right one is chosen. Over the next few days as the two DNA strands from each parent interwine and make genetic selections, the mother's emotions help decide. The natural father must be informed immediately and ideally he will rush to protect and assure she is safe and will be taken care of throughout her gestation and supportive throughout the child's life. Regardless of long term relationship or marriage, DNA maximizes itself when in the most caring emotional bubble and the fetus is allowed to grow in safety.

54 is numerologically interesting, however, 55 or 49 are other possible choices. Each has a unique personality and some thought should be given to choose the right one for you.

Sunday, March 28, 2010

LA 400

The windmills on I-10 between Phoenix and LA might be used to tow ocean water uphill over the continental divide. If that were done, a river could be built that would flow down through Phoenix, into Mexico, and all the way to the Gulf of Mexico. Water rapids, bike trails could be built, and of course the organic material in the ocean could be used to raise farmland and provide drinking water to the area.

The 1950s interstate highway system is due for some improvements:

1. high-speed train down the center for quick commutes
2. two lanes next to the train for high-speed motorcyclists (200+ MPH)
3. autobahn lanes for cars without speed limit
4. slower traffic lanes on the right

Build 2 tracks off-road to the right of the interstate. One would be a gravel or dirt road for high speed four wheel drives. Then another track for Baja 500-type driving. Drunk driving might be allowed (or even encouraged with proper licensing). Imagine partying in Phoenix overnight and then racing to LA or San Diego before sunrise for possible surfing. Hence the LA 400. You could also have a few campgrounds along the way just in case you wanted to stop.

Saturday, March 20, 2010

Book Futures

While hiking with my natural mother over Father's Day in 2009, she was talking about writing a nutrition book for the masses. Her book encouraged experimenting and re-teaching your taste buds to detect chemicals and find the natural food that is best for you. She had written a few chapters in her spare time, but didn't have the time or energy to complete the book. She was also running into road blocks with finding a publisher that didn't want her to invest money for publishing her book.

So while we were hiking and discussing her book, I was considering options for how to get that important book published and had an idea. A properly marketed website called Book Futures would allow independent investors to review book or movie ideas and invest in them directly. This could provide seed capital and allow the author/screenwriter an advance to concentrate on completing his/her vision. Investors would certainly provide enough oversight to ensure their investment was well tended and depending on risk, would share in a substantial portion of the profits.

Eventually this idea could be used for business investment capital without requiring any oversight or regulatory control. Interested parties are always watching. Small niches can be filled without going through a hierarchical system that requires the review of a finite number of editors who do not have the time to devote to certain ideas that might otherwise be marketable.

Trapping Discrete Particles in Fluids

Molecular Dynamics looks at the shape, charge, speed, and spin of individual molecules as they move and bump into each other in a fluid such as air, water, fire, etc.

Water contains all atoms at a small particulate level. Since each molecule/particle has a unique shape and responds to specific electrical/magnetic charges, molecules and atoms can be trapped. The patent for the process is called "Trapping Discrete Particles in Fluids".

If you were to imagine a shoe floating down a river, a specific shaped trap could be built that would capture only that particular shoe. A certain size. A certain shape. A certain weight. So the same thing could be done for molecules to trap individual sodium molecules to desalinate as well as water mining for precious metals or cleaning the ocean of large pharmaceutical or herbicide pollution.

International Banking System

After 7 or 8 years of studying banking, politics, economics, and money, the problem with money became apparent through reverse engineering the concept of money. A solution called Promise Language was developed using software programming concept/object-oriented design principles. It is a simple specification that is similar to basic contract law and is easily read by a computer. It's designed to be a public specification that is both human and computer readable. Ensuring trust is maintained by tracking the results of people's promises between each other. When implemented, money becomes obsolete. All transactions become transfers of wealth (or value).

For details on Promise Language:
http://promiselanguage.blogspot.com

Hidden Desktop

Hidden Desktop is an evolution of The Computer Condom (see below) that hides a user/desktop from all other potential users of the computer. The login and password is completely hidden as is all their files and data. Originally envisioned to protect someone's data from innocent perusal of the computer, it was engineered with near NSA-quality security.

The desktop is only accessible through a secret hotkey and all associated data (browser history, files, chats, emails, etc.) is instantly locked down and secured when the user logs off or shuts down the computer. Even computer security experts would not locate or suspect that another login existed on the computer.

A provisional patent was filed on this software in 2006 or 2007.

The Computer Condom

The Computer Condom is a software product designed to protect a computer from attacks by hackers and viruses on the internet.

The software created a separate user login (desktop) on a computer that was fully secure and could browse any website safely. It customized the desktop by locking down the internet browser to disallow many of the more exploitable services, but would not hinder normal web browsing. It was also going to lock down the computer's Windows Services to further prevent outside hacker attack, but I did not receive market success and the product then morphed into Hidden Desktop as described above. Hidden Desktop is virtually the same product, except the entire desktop was hidden from all other users of the computer.

The Arbiter

In 2003, while at work and bored with the few restaurant choices available in the area for lunch, a software application was developed to help us make the right choice.

A few features of this fully-functional choice-maker:
- entering of available restaurants
- database remembering the last few restaurants chosen (so as not to repeat a restaurant too often)
- button to make the proper choice of restaurant on that given day.

It worked every time.

Internet software development API

In 2002, as part of another project a tiny program was designed to automate software development at most companies. For 90+% of all companies, the software relegates and abstracts most of the drudgery of application development. It was designed for websites and could be used for both intranet and internet applications. It is extremely fast, can be used by anyone who can code a webpage's HTML. It abstracts all aspects of software design, including the database. It goes beyond object-oriented programming and might be called "concept-oriented programming". Intuitive and easy to use by non-programmers, it virtually eliminates the need for software developers at most companies.

Some features:
- framework for complex business applications with fully functional classes and object models. No limitations.
- automatic data persistence of classes/objects with full choice of back-end database (text files to SQL Server to Oracle to Access)
- multiple application support with single user login
- fully secure login (one-way encrypted password with salt value) with password reset and login creation
- role-based security for each web application
- automatic pagination
- shopping cart with encrypted credit card numbers unavailable to developer or database
- configurable payment methods that support instant or installment payments
- efficient load-balancing across multiple servers for server farms
- programmable HTML menu system
- JavaScript functions for dates and data validation
- small DLL (~350k) runs in each IIS application process

In essence, it's a fully-functional application server that is easier to use than .NET or any Java-based solution and is without limitation on class, object, database design or HTML layout.