Providing Unique and Innovative Solutions
Developing new methods designed to be unique and with the objective of setting a business apart from its competitors. Combining new processes with sophisticated technology, these unique methods provide a business with a First-Mover Advantage, allowing it to secure a sizable share of its market and gain technological leadership within the industry. Simply, these recently developed and patented methods provide a reliable choice for clients looking to leverage the power of innovative solutions.
Programmable Touchpad System (Patent Pending 18,527,330) A computerized method to electronically designate sectors within a touchpad’s surface area for the purpose of executing software-driven user-programmed commands. To execute a command, the method requires the user to be in contact with a specific sector within the touchpad area and the pressing of a specific programmed key within the computer’s keyboard. Once the command is entered by the user, the computer device executes the programmed instructions. For example, a user could program a sector of the touchpad to instruct the computer device to provide the user with user-selected websites in various tabs, organized by topics, while programming another sector to activate various software applications or to operate the functions of an application. To allow the user to identify the designated sectors, markings could be printed and/or stamped on the surface and/or perimeter of the touchpad and/or depicted on a computer screen.
Email/Text Automated Response Method (Patent Granted 12,021,801) A computerized time-based electronic text and email response method for electronic text and email users to automatically categorize and send user-customized text and email responses based on respondents’ reply times and user-defined time-based scales. Through the use of user-defined time-based scales and reply time values, the method continuously evaluates, scores, and categorizes the texting and email replies of respondents, and automatically provides the said respondents with user-customized response messages that are correlated to their reply times. The method selects a message from a library of user-categorized messages and sends the said selected message with a score value to the respondent and a copy of the message to the user. The score values are provided to users and respondents to identify reply time issues, provide a measured level of message responsiveness, and assess the communication performance of people and organizations.
Cartesian-Based User Authentication Method (Patent Granted 11,238,149) A computerized user authentication method that utilizes a digital drawing created by a user and the Cartesian Coordinate System to verify the user's identity. The method utilizes a software-driven stopwatch integrated into a computing device to measure time, establish a time baseline, and control the scanning expanse of a digital drawing. To verify the identity of the user, the acquired X Axis and Y Axis values that represent the scanned segment of the digital drawing, which were previously correlated to the user, are used as part of his/her authentication credentials to obtain access to computer information systems and portable computing devices. Since the authentication process requires (or can be optional) the user to stop the stopwatch within the user-assigned time range, the clocked time value is also used to identify the user. Admissible time and axis values are stored in a database for comparison during the user authentication process.
Pi-Based Authentication Method for Mobile/Computer Users (Patent Granted 10,951,610) A computer-implemented user authentication method to provide users of computer devices interconnecting with computer information systems with a frequently changing numeric passcode generated via a time-synchronized mathematical operation of the mathematical constant Pi (π) without the need for a Two Factor Authentication process. The method operates the mathematical constant Pi, wherein an application software performs the mathematical operation of Pi to select a segment of Pi. The selected Pi segment becomes the user’s passcode, referred in this invention as the PI ID Value (PIV). The method is dynamic, creating a new PIV for the computer user each time the user operates his/her computer device to gain access into a network or website. To attain the same Pi segment in real-time and authenticate the user, the network or website administrator utilizes in its computer server the same parameters and mathematical operation used by the user’s computing device.
Pi-Based Authentication Method for Credit Cards (Patent 10,949,855) A computer-implemented method for authenticating credit cards via a mathematical operation of the mathematical constant Pi. Pi is stored in a user-operated computing device connected to a network, wherein an application software performs the said mathematical operation of Pi to select a segment of Pi. The selected Pi segment becomes the Dynamic Card Verification Value (DCVV) of a credit card. The method is dynamic, creating a new DCVV for the user's credit card each time the user operates his/her computer device to purchase products and services online with his/her credit card. To attain the same Pi segment, the issuer of the credit card utilizes in its computer server the same parameters and mathematical operation that the user utilizes on his/her computing device. Consequently, this process provides the user and issuer with a synchronized process to attain the same resulting DCVV to authenticate a credit card.
Encryption Method for Credit Cards (Patent 10,664,617) An encryption method to protect the identification and account constructs displayed on cards, like identification cards and credit cards, or on paper medium like hospital or bank statements, where these constructs are comprised of numbers, and/or characters, and/or symbols and where the encryption method works by replacing some of the elements comprising the account construct with aspecial symbol(s) to avoid revealing the entire construct to unauthorized people and where the numbers and/or characters replaced by the special symbol(s) represent the personal identification number (PIN) associated with the construct. The method is designed to be utilized by issuers of cards like hospitals, governments and banks, and used as a process to protect the cardholder account information or account statements on paper medium. To provide the entire construct, the user simply replaces the special symbol(s) with his PIN. Without the PIN, a person will not be able to complete the construct.
For additional information, see the "Exclusive, New, and Unique Options" section below.
Reasons for a Business to Opt for a Patent Protected Method
Provides an Innovation-Driven image to a company and establishes it as a Technological Leader
Provides a Differential Advantage to set a business apart from its competitors
As an emerging technology, patented methods allow a firm to define new market capability needs
For Additional Information
A Remarkable and Peculiar Comment
- “People don’t know what they want until you show it to them”
Quote from Steve Jobs, Founder of Apple Computers
Consider what a patented method can offer!
Transform
Transform your business with a one-of-a-kind industry method.
Design
Each method is designed to provide unique functions, setting your business apart.
Customize
All methods can be tailored to fit your unique requirements.
Experience
Users experiencing unique computer functionalities never provided before.