SlideShare a Scribd company logo
1 of 4
Fingerprint Touchtm
The “Single Sign-on” mobile app
Overview
The way a person presses his/her touch screen is as unique as a fingerprint. Combine
that with a fingerprint scan and you have the most secure identification system on
earth. That is Fingerprint Touchtm
. Some key aspects to the technology:
• the pressure applied and surface area on the touch screen is saved.
• a database administrator is the only person with access to your personal data.
That administrator is a public officer for accountability.
• the IP address of the database server is saved on the mobile device to make
sure all subsequent messages originated from that server.
The above are part of a patentable system for a single sign-on site. The app will log
you into Google, Gmail, MSN, etc with just a single finger press.
Mobile Application
The first iteration of this will be an iPhone app for the 5S, although backward
compatibility will be a major goal. Fingerprint Touchtm
will be the first app you access
on your phone. Press your finger and all your manual usernames and passwords will be
centrally available. The server prototype framework is complete.
The app becomes a portal or entry-point to the internet while serving as a password
consolidation utility and automatic login utility.
The design and detailed specs for Fingerprint Touchtm
are complete.
Time to market
1. Finish the server-side application (1-2 weeks).
2. Develop the native application (4-6 weeks).
3. Create marketing materials (3-4 weeks).
Most likely within 7-8 weeks the Fingerprint Touchtm
app for the iPhone would be
available in the iPhone store. Android would be next.
Profits
Cost for the app will be free. Corporate partnerships and licensing will be the
revenue. Also, the portal itself can be leveraged for advertising data. Going forward,
security out of a spy novel might prevent identity theft forever.
Inventor & CEO
Andrew B Brown is a software engineer with over 15 years experience. During his
career he has completed over 20 successful projects in many industries, including real
estate, accounting, mortgage, and human resources. Mr. Brown has a bachelors
degree in Accounting from UT Austin with a focus on philosophy and astronomy.
andrewbb@gmail.com
+1 (512) 947-8282
Fingerprint Touchtm
Finances
The “Single Sign-on” mobile app
Round 1 Financing
Hire Objective-C developer $15,000
Write the server-side database $25,000
Retain IP lawyer (trademark and patent) $10,000
Initial marketing (press release and materials) $7,000
Website (including graphics, server and database) $8,000
Administrative (filing fees, copies, subscriptions, etc.) $3,000
Total $68,000
Round 1 will result in an iPhone app for the 5S in the App Store. Time to market <2
months.
Round 2 Financing
International IP lawyer (trademark and patent) $100,000
Marketing team (10 at $100,000 salary) $1,000,000
Travel (hotel, transportation, per diem) $2,200,000
Airfare $300,000
Retain marketing firm $500,000
Expenses (wine & dine) $500,000
Membership and subscriptions $150,000
Website $10,000
Software development $800,000
Administrative (copies, phones, internet, utilities) $200,000
Office lease $400,000
Furniture and fixtures $200,000
Social media marketing $100,000
Salaries for administrative personnel $200,000
Salaries for management $500,000
Total $7,160,000
Round 2 will secure intellectual property globally. Marketing to phone manufacturers
and software companies to integrate the Fingerprint Touchtm
at major corporations
while marketing to the end consumer for market share. Round 2 financing will
provide funds for one year.
Round 3 Financing
TBD. This will include offices throughout the world for identity theft prevention and
restoration, including secure paper backup and DNA testing. This is highly dependent
on the partnerships built during Round 2 so cannot be estimated accurately. Round 3
financing might be generated through internal revenue (patent fees at the phone
manufacturer level). A buyout during Round 2 is very possible.
andrewbb@gmail.com
+1 (512) 947-8282
Fingerprint Touchtm
Screenshots
The “Single Sign-on” mobile app
This is a working application serving a secure image (chosen by the person) directly to
the phone after a successful "finger press" logon. The server code is solid and the
framework including database and most of the security is built along with the specs
for native app development.
andrewbb@gmail.com
+1 (512) 947-8282
Fingerprint Touchtm
FAQ
The “Single Sign-on” mobile app
The market?
All mobile phone users. Keeping track of all the usernames and passwords for various websites is the
problem. The initial Fingerprint Touchtm
app will consolidate them and auto log you in, if desired.
The competition?
The only perceived competition is the iPhone 5S, but that is largely due to a misunderstanding of the
technology. The 5S does an excellent job of imaging the fingerprint, however, is insufficient for
comparing a living person’s finger with the image. In other words, it can be faked pretty easily from
several different angles. In contrast, Fingerprint Touchtm
gives a tactile response that is remembered
by the person as well as adding some security features not found anywhere. Going forward, version two
will likely include adaptive response to the person's use.
The iPhone developers focused on detecting the image with sufficient granularity to pass any
comparison test, however, did not adequately address the living being part when comparing.
Fingerprint Touch works WITH the iPhone 5S technology. Not against.
Also, it is expected that Fingerprint Touch will be available on all phones with a basic touch screen.
The technology?
There are several approaches to detecting a human being actively pressing their finger on a touch
screen:
1. One approach is reading the pressure exerted. This might not be available on all mobile
devices.
2. A second approach is reading the pixels at the point that the phone responds.
3. A third approach is a timing mechanism combined with the image comparison. This is a clever
approach and might be part of the final solution, however, not my first choice. It might be the
base method chosen in the iPhone 5S.
The project is at a point where I need to hire an iPhone developer who understands hardware to make
sure the algorithms I have designed are right. I have a number of plans, however, do not know some
specifics in the LCD display to know which approach will work best. One of the approaches will, but
that will require some technical discussions of very high detail.
Each approach will work by itself and it might be a combination of those approaches and a few other
ideas that will be the final product. I kind of prefer the first approach at the moment, but might
change my mind depending on the hardware interface available on each phone. This is a very low level
API, and most developers have never even see that (a few game engine designers might be the
exception).
In any case, the above has not been done before and can be patented. Gaining market share through a
password consolidator opened with a fingerpress would be popular. Then the manufacturers will adopt
the technology with a patent fee attached, of course.
Two other parts to the technology are the server IP and identifier included in every message. This
leads into a discussion of an application framework or viewport that could be sold to developers to
simplify their HTML5 development. Essentially it would be a generic way for an HTML5 developer to
deploy to every device without concern for native functionality. This also includes total security, of
course. That might be another way to gain market share and another product itself.
The other part of the technology is a database administrator in an officer position for accountability.
This is a very important part.
andrewbb@gmail.com
+1 (512) 947-8282

More Related Content

What's hot

TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...
TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...
TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...Ravi Chandra
 
Python Institute Coimbatore
Python Institute CoimbatorePython Institute Coimbatore
Python Institute Coimbatoresathyancegon
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsCraig Walker, CISSP
 
Why iOS developers requires code signing certificate.?
Why iOS developers requires code signing certificate.?Why iOS developers requires code signing certificate.?
Why iOS developers requires code signing certificate.?Kayra Obrain
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
IRJET - Speech Recognition using Android
IRJET -  	  Speech Recognition using AndroidIRJET -  	  Speech Recognition using Android
IRJET - Speech Recognition using AndroidIRJET Journal
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSPurna Bhat
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threatAli J
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesBiBoard.Org
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsSkycure
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 

What's hot (20)

TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...
TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...
TECHNOLOGY: Solution to our woos not Politicians & INTERNET of THINGS in Nuts...
 
Python Institute Coimbatore
Python Institute CoimbatorePython Institute Coimbatore
Python Institute Coimbatore
 
Python
PythonPython
Python
 
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack VectorsInternet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
 
20120140504023
2012014050402320120140504023
20120140504023
 
Why iOS developers requires code signing certificate.?
Why iOS developers requires code signing certificate.?Why iOS developers requires code signing certificate.?
Why iOS developers requires code signing certificate.?
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
IRJET - Speech Recognition using Android
IRJET -  	  Speech Recognition using AndroidIRJET -  	  Speech Recognition using Android
IRJET - Speech Recognition using Android
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
BETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoSBETTER- Threat Whitepaper- PoS
BETTER- Threat Whitepaper- PoS
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
AI Machine vs Human
AI Machine vs HumanAI Machine vs Human
AI Machine vs Human
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Pocket virus threat
Pocket virus threatPocket virus threat
Pocket virus threat
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Secure Mobile BI on Apple devices
Secure Mobile BI on Apple devicesSecure Mobile BI on Apple devices
Secure Mobile BI on Apple devices
 
my smartphone
my smartphonemy smartphone
my smartphone
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 

Similar to FingerprintTouch

What are the Benefits of Using Digital Technology in Mobile App Development
What are the Benefits of Using Digital Technology in Mobile App DevelopmentWhat are the Benefits of Using Digital Technology in Mobile App Development
What are the Benefits of Using Digital Technology in Mobile App Developmentdefault default
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docxCMARIX TechnoLabs
 
UNIT_1_1626771386169.ppt
UNIT_1_1626771386169.pptUNIT_1_1626771386169.ppt
UNIT_1_1626771386169.pptHannaAnvar1
 
The Top Technologies Used To Develop a Mobile App.pdf
The Top Technologies Used To Develop a Mobile App.pdfThe Top Technologies Used To Develop a Mobile App.pdf
The Top Technologies Used To Develop a Mobile App.pdfTechugo
 
The Top Technologies Used To Develop a Mobile App.pdf
The Top Technologies Used To Develop a Mobile App.pdfThe Top Technologies Used To Develop a Mobile App.pdf
The Top Technologies Used To Develop a Mobile App.pdfTechugo
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Io t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesIo t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesFuGenx Technologies
 
Major points of challenges experienced during fintech app development process
Major points of challenges experienced during fintech app development processMajor points of challenges experienced during fintech app development process
Major points of challenges experienced during fintech app development processOrange Mantra
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Top 1 0 IoT App Development Trends.pdf
Top 1 0 IoT App Development Trends.pdfTop 1 0 IoT App Development Trends.pdf
Top 1 0 IoT App Development Trends.pdfFuGenx Technologies
 
9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdf9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdfDailyTechnoReview
 
8 Flutter App Development Tools Developers Must Use For Your Project.pdf
8 Flutter App Development Tools Developers Must Use For Your Project.pdf8 Flutter App Development Tools Developers Must Use For Your Project.pdf
8 Flutter App Development Tools Developers Must Use For Your Project.pdfMoon Technolabs Pvt. Ltd.
 
Pecha Kucha Presentation
Pecha Kucha PresentationPecha Kucha Presentation
Pecha Kucha Presentationbrasso123
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Software is Now Your Brand - OFS
Software is Now Your Brand - OFSSoftware is Now Your Brand - OFS
Software is Now Your Brand - OFSRelevantz
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve ThemInnofied Solution
 
10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...Pavan Kumar
 
What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.Techugo
 
Which Is The Best AI Tool For Mobile App Development_.pdf
Which Is The Best AI Tool For Mobile App Development_.pdfWhich Is The Best AI Tool For Mobile App Development_.pdf
Which Is The Best AI Tool For Mobile App Development_.pdfBOSC Tech Labs
 

Similar to FingerprintTouch (20)

What are the Benefits of Using Digital Technology in Mobile App Development
What are the Benefits of Using Digital Technology in Mobile App DevelopmentWhat are the Benefits of Using Digital Technology in Mobile App Development
What are the Benefits of Using Digital Technology in Mobile App Development
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docx
 
UNIT_1_1626771386169.ppt
UNIT_1_1626771386169.pptUNIT_1_1626771386169.ppt
UNIT_1_1626771386169.ppt
 
The Top Technologies Used To Develop a Mobile App.pdf
The Top Technologies Used To Develop a Mobile App.pdfThe Top Technologies Used To Develop a Mobile App.pdf
The Top Technologies Used To Develop a Mobile App.pdf
 
The Top Technologies Used To Develop a Mobile App.pdf
The Top Technologies Used To Develop a Mobile App.pdfThe Top Technologies Used To Develop a Mobile App.pdf
The Top Technologies Used To Develop a Mobile App.pdf
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Io t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesIo t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challenges
 
Major points of challenges experienced during fintech app development process
Major points of challenges experienced during fintech app development processMajor points of challenges experienced during fintech app development process
Major points of challenges experienced during fintech app development process
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Top 1 0 IoT App Development Trends.pdf
Top 1 0 IoT App Development Trends.pdfTop 1 0 IoT App Development Trends.pdf
Top 1 0 IoT App Development Trends.pdf
 
9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdf9 Predictions for the Future of Programming.pdf
9 Predictions for the Future of Programming.pdf
 
8 Flutter App Development Tools Developers Must Use For Your Project.pdf
8 Flutter App Development Tools Developers Must Use For Your Project.pdf8 Flutter App Development Tools Developers Must Use For Your Project.pdf
8 Flutter App Development Tools Developers Must Use For Your Project.pdf
 
Pecha Kucha Presentation
Pecha Kucha PresentationPecha Kucha Presentation
Pecha Kucha Presentation
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Software is Now Your Brand - OFS
Software is Now Your Brand - OFSSoftware is Now Your Brand - OFS
Software is Now Your Brand - OFS
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them
 
10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...
 
What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.
 
Which Is The Best AI Tool For Mobile App Development_.pdf
Which Is The Best AI Tool For Mobile App Development_.pdfWhich Is The Best AI Tool For Mobile App Development_.pdf
Which Is The Best AI Tool For Mobile App Development_.pdf
 

FingerprintTouch

  • 1. Fingerprint Touchtm The “Single Sign-on” mobile app Overview The way a person presses his/her touch screen is as unique as a fingerprint. Combine that with a fingerprint scan and you have the most secure identification system on earth. That is Fingerprint Touchtm . Some key aspects to the technology: • the pressure applied and surface area on the touch screen is saved. • a database administrator is the only person with access to your personal data. That administrator is a public officer for accountability. • the IP address of the database server is saved on the mobile device to make sure all subsequent messages originated from that server. The above are part of a patentable system for a single sign-on site. The app will log you into Google, Gmail, MSN, etc with just a single finger press. Mobile Application The first iteration of this will be an iPhone app for the 5S, although backward compatibility will be a major goal. Fingerprint Touchtm will be the first app you access on your phone. Press your finger and all your manual usernames and passwords will be centrally available. The server prototype framework is complete. The app becomes a portal or entry-point to the internet while serving as a password consolidation utility and automatic login utility. The design and detailed specs for Fingerprint Touchtm are complete. Time to market 1. Finish the server-side application (1-2 weeks). 2. Develop the native application (4-6 weeks). 3. Create marketing materials (3-4 weeks). Most likely within 7-8 weeks the Fingerprint Touchtm app for the iPhone would be available in the iPhone store. Android would be next. Profits Cost for the app will be free. Corporate partnerships and licensing will be the revenue. Also, the portal itself can be leveraged for advertising data. Going forward, security out of a spy novel might prevent identity theft forever. Inventor & CEO Andrew B Brown is a software engineer with over 15 years experience. During his career he has completed over 20 successful projects in many industries, including real estate, accounting, mortgage, and human resources. Mr. Brown has a bachelors degree in Accounting from UT Austin with a focus on philosophy and astronomy. andrewbb@gmail.com +1 (512) 947-8282
  • 2. Fingerprint Touchtm Finances The “Single Sign-on” mobile app Round 1 Financing Hire Objective-C developer $15,000 Write the server-side database $25,000 Retain IP lawyer (trademark and patent) $10,000 Initial marketing (press release and materials) $7,000 Website (including graphics, server and database) $8,000 Administrative (filing fees, copies, subscriptions, etc.) $3,000 Total $68,000 Round 1 will result in an iPhone app for the 5S in the App Store. Time to market <2 months. Round 2 Financing International IP lawyer (trademark and patent) $100,000 Marketing team (10 at $100,000 salary) $1,000,000 Travel (hotel, transportation, per diem) $2,200,000 Airfare $300,000 Retain marketing firm $500,000 Expenses (wine & dine) $500,000 Membership and subscriptions $150,000 Website $10,000 Software development $800,000 Administrative (copies, phones, internet, utilities) $200,000 Office lease $400,000 Furniture and fixtures $200,000 Social media marketing $100,000 Salaries for administrative personnel $200,000 Salaries for management $500,000 Total $7,160,000 Round 2 will secure intellectual property globally. Marketing to phone manufacturers and software companies to integrate the Fingerprint Touchtm at major corporations while marketing to the end consumer for market share. Round 2 financing will provide funds for one year. Round 3 Financing TBD. This will include offices throughout the world for identity theft prevention and restoration, including secure paper backup and DNA testing. This is highly dependent on the partnerships built during Round 2 so cannot be estimated accurately. Round 3 financing might be generated through internal revenue (patent fees at the phone manufacturer level). A buyout during Round 2 is very possible. andrewbb@gmail.com +1 (512) 947-8282
  • 3. Fingerprint Touchtm Screenshots The “Single Sign-on” mobile app This is a working application serving a secure image (chosen by the person) directly to the phone after a successful "finger press" logon. The server code is solid and the framework including database and most of the security is built along with the specs for native app development. andrewbb@gmail.com +1 (512) 947-8282
  • 4. Fingerprint Touchtm FAQ The “Single Sign-on” mobile app The market? All mobile phone users. Keeping track of all the usernames and passwords for various websites is the problem. The initial Fingerprint Touchtm app will consolidate them and auto log you in, if desired. The competition? The only perceived competition is the iPhone 5S, but that is largely due to a misunderstanding of the technology. The 5S does an excellent job of imaging the fingerprint, however, is insufficient for comparing a living person’s finger with the image. In other words, it can be faked pretty easily from several different angles. In contrast, Fingerprint Touchtm gives a tactile response that is remembered by the person as well as adding some security features not found anywhere. Going forward, version two will likely include adaptive response to the person's use. The iPhone developers focused on detecting the image with sufficient granularity to pass any comparison test, however, did not adequately address the living being part when comparing. Fingerprint Touch works WITH the iPhone 5S technology. Not against. Also, it is expected that Fingerprint Touch will be available on all phones with a basic touch screen. The technology? There are several approaches to detecting a human being actively pressing their finger on a touch screen: 1. One approach is reading the pressure exerted. This might not be available on all mobile devices. 2. A second approach is reading the pixels at the point that the phone responds. 3. A third approach is a timing mechanism combined with the image comparison. This is a clever approach and might be part of the final solution, however, not my first choice. It might be the base method chosen in the iPhone 5S. The project is at a point where I need to hire an iPhone developer who understands hardware to make sure the algorithms I have designed are right. I have a number of plans, however, do not know some specifics in the LCD display to know which approach will work best. One of the approaches will, but that will require some technical discussions of very high detail. Each approach will work by itself and it might be a combination of those approaches and a few other ideas that will be the final product. I kind of prefer the first approach at the moment, but might change my mind depending on the hardware interface available on each phone. This is a very low level API, and most developers have never even see that (a few game engine designers might be the exception). In any case, the above has not been done before and can be patented. Gaining market share through a password consolidator opened with a fingerpress would be popular. Then the manufacturers will adopt the technology with a patent fee attached, of course. Two other parts to the technology are the server IP and identifier included in every message. This leads into a discussion of an application framework or viewport that could be sold to developers to simplify their HTML5 development. Essentially it would be a generic way for an HTML5 developer to deploy to every device without concern for native functionality. This also includes total security, of course. That might be another way to gain market share and another product itself. The other part of the technology is a database administrator in an officer position for accountability. This is a very important part. andrewbb@gmail.com +1 (512) 947-8282