[ The optimum screen resolution for this site = 1024 x 768 or higher ]
This Site Best Experienced Using The Latest Versions Of:
If you are unable to enter this site - your browser is not fully compliant with HTML5 or the "Object Map" Tag
Use the links above to obtain the most recent updates to browsers and browser plug-ins
SOUNDEX SecurePass, SOUNDEX SecurePass(tm), SOUNDEX SecurePass(r),SOUNDEX Innnovative Design Concepts <center> <h3> "Sorry - Your browser does not handle frames!" </h> </center> <!--The following information is provided in support of the SecurePass(r) Project--> <!--Contact Information:--> <!--Team Name: SOUNDEX Innovative Design Concepts--> <!--Main Contact Name: Kevin E. Amos--> <!--Main contact Address: 2315 Rockspring Rd., Toledo, OH. 43614--> <!--Main contact Phone: (419) 351-7148 cell (419) 530-2518 (x2518) UT phone--> <!--Department/Area of Study: Academic Support, Information Technologies and related fields.--> <!--Number of Team Members: 1--> <!--Proposal Information:--> <!--What is the product or service and what does it do?--> <!--My idea for a new product or service, SecurePass®, is actually both a new product, and a new service. It will require and involve a convergence of a number of different technologies, and the collaboration between multiple technology-based organizations, to produce the hardware, software, and user devices, interfaces, and services, that are intended to offer the ultimate in personal identification protection, especially for those consumers and computer users who access computer-based and electronic systems, web-based financial, eCommerce, and other commercial and institutional web sites, and what are traditionally involved in direct user/consumer access and authentication interaction such as; banking institutions, check caching facilities, and the many ATM (Automated Teller Machine) and POS (Point Of Sale) terminals that are deployed throughout this country, and around the world.--> <!--SecurePass® is an idea designed to provide and maintain the most secure and reliable individual account and web site access and authentication methods available, in a very user-friendly and intuitive, yet ultra secure manner. SecurePass® is intended to eventually replace all existing systems and processes, and is expected to become the most technologically sound and widely accepted industry standard solution to the on-going and ever increasing problems associated with creating, remembering, maintaining, and protecting personal and private systems access and authentication information, and the identities of individual consumers.--> <!--By utilizing a combination of proven technologies and accepted standards in the industry, SecurePass® is expected to provide the ultimate in secure systems access and authentication through the implementation of; AES Encryption techniques (Advanced Encryption Standard) for both data storage and transmission, Bluetooth PAN (Personal Area Network) wireless transmission (Maximum effective transmission range of eight feet), and an intuitive and user-friendly interface requiring only a single user password or biometric (fingerprint scan identification) for access to all other user login, password, and identification data. This concept is a dramatic improvement over existing login, password, and PIN (Personal Identification Number) methods currently deployed, which often require users to create, maintain, and remember a multitude of different forms and types of passwords and logins, in an industry that is quickly moving towards requiring the use of “Strong Passwords” and “Strong Logins” to facilitate--> <!--more improved security measures and policies for accessing and authenticating to the various systems in use. User identification security is expected to become an even more important and relevant concern, as more and more applications and services become only available via “Cloud Computing”, or Computing in the Cloud.--> <!--Note: Strong passwords, as defined by Microsoft Corporation, are those that employ key elements that involve length and complexity.--> <!--An ideal password is long and has letters, punctuation, symbols, and numbers.--> <!--Whenever possible, use at least 14 characters or more. --> <!--The greater the variety of characters in your password, the better. --> <!--Use the entire keyboard, not just the letters and characters you use or see most often. --> <!--(Microsoft Corp., 2010) http://www.microsoft.com/protect/fraud/passwords/create.aspx--> <!--SecurePass®, in its most basic conceptual essence, is a new type of credit-card sized handheld device, or a service feature on an existing handheld device such as a cell phone, that works as a client in a client-server scenario, in conjunction with the SecurePass® capabilities of a comparably equipped server, through a client-server synchronization and communications process. The user authenticates to the handheld client device by entering a single secure password, or by authenticating owner/user identification through a biometric (thumb or fingerprint) scanner interface.--> <!--Once authenticated to the SecurePass® device the owner/user enters the name or acronym associated with a service, system, account, or web site they wish to access on a qwerty-style keyboard interface, the system selected is verified via visual feedback on the handheld device, which could be as simple as an L.C.D./L.E.D. (Liquid Crystal Diode/Light Emitting Diode) bar or mini display panel. Then the owner/user would be prompted to press the transmit button, which then extracts the associated user login, password, PIN, or other identification information that is stored in AES encrypted format in the SecurePass® database and transmits this information using secure AES encrypted Bluetooth wireless communication, identifying them to the system or account they are attempting to access. From this point, the user is presented with the normal user interface provided by the host system, where they may conduct their business with full confidence that their login, authentication and personal identity has--> <!--been protected from theft, release in the clear, or other security breach, by the SecurePass® system.--> <!--How is the product or service unique and/or innovative?--> <!--SecurePass® is unique and innovative in many ways including; it’s method of database creation and storage, its hands-free methods of securely negotiated communications and data transmission, its user interface, its built-in and multiple levels of security, and in its ability to support an intuitive backup and secure database transfer process. Most of all, SecurePass® represents a unique and innovative approach to providing and supporting multi-platform/multi-system support, which if eventually adopted as an industry standard, will allow existing institutions, organizations, businesses, and government entities the ability to provide a uniform method of secure access to their systems in such a way that computer users and consumers can feel comfortable and confident in the knowledge that their identity is safe and secure throughout the access and authentication processes used to gain entry to all of their accounts, systems, and web sites, while needing to remember only a single password or login,--> <!--or by utilizing alternative identification methods such as biometrics (finger print identification).--> <!--SecurePass® is also unique and innovative in its approach, implementation, and deployment, involving both a host system employing server-side SecurePass® functionality and support, as well as client-side (thin client) aspects of the SecurePass® system. Users would be able to create new, or enter their existing secure systems access and authentication logins, passwords, and PINs into the SecurePass® AES encrypted database via direct input to the SecurePass® handheld device, through a SecurePass® enabled cell phone, Blackberry type device, or other PDA (Personal Digital Assistant) device, or via a USB (v2.0) or Bluetooth interfaced connection to a PC (Personal Computer) using a SecurePass®, Windows-based database and data entry application.--> <!--The SecurePass® database, stored in encrypted form on the SecurePass® device, could be backed up to commonly available Flash memory cards via a built in FMC (Flash Memory Card) port, or transferred to other off-line storage via a built-in USB (v2.0) interface.--> <!--Additionally, as an added feature available from third-party service providers that are licensed to offer the SecurePass® system, users could opt to maintain backups of their SecurePass® database to off-line locations in a manner similar to backup services currently available for saving cell phone contact lists, through service providers such as; Verizon Wireless, T-Mobile, AT&T, and any other SecurePass® supported and licensed provider. These backups could be used to transfer the SecurePass® database and configurations to alternative or replacement SecurePass® enabled devices, or used to recover an existing SecurePass® database that is suspected of being corrupted or is otherwise inaccessible due to any number of common and typical hardware and/or software-related malfunctions and anomalies.--> <!--What is the current State of the Technology?--> <!--The current state of user login and password identification technologies varies throughout all industries, with some systems requiring minimal and relatively unsecure verbose usernames and passwords, while other systems employ elaborate access and authentication processes and polices, often involving the use of Strong Passwords and login information.--> <!--Treasury Direct, for example, employs a three-tiered or three-factor security access and authentication process that involves the user entering a pre-approved and verified username and password login, followed by responding accurately to a pre-arranged security question, which then requires the user to input the serial number associated with their secure access token card (credit card sized cryptographic key code card), and finally entering three matching codes from that token card that are referenced to specific coordinates provided by the Treasury Direct web interface. For each menu option selected once access is granted and authentication has been verified, an additional pre-arranged security question is posed, for which an accurate response must be provided to gain additional access to secure areas of their web interface.--> <!--This process and methodology, and similar ones, are becoming more and more prevalent throughout many industries that are involved in secure electronic account and web-based account and systems access, however they are not very mobile or convenient to use from multiple remote locations. Some prefer the use of a hardware type of key code FOB or token, such as RSA's SecureID key fobs or the key code FOBs used by some banking systems such as Huntington Bank, which are used in a similar fashion for providing user access and authentication.--> <!--However, many of these types of systems are felt to be expensive to deploy and maintain, are very cumbersome and represent a hassle to end users and administrators, are not very extensible, and often present a deployment and logistical nightmare (WikID, 2010). A company called WikID offers a similar access and authentication product that they claim is a two-factor design, without the hassle factor.--> <!--WiKID provides a simple-to-install, scalable and secure two-factor authentication system to help increase network security and to meet various Compliance requirements, such as PCI/DSS section 8.3 (“Implement two-factor authentication for remote access to the network by employees, administrators, and third parties.”) Thanks to its seat-based licensing and simple user management, WiKID is particularly well-suited for companies that need two-factor authentication for non-employees or that have high turnover.--> <!--(WikID, 2010) http://www.wikidsystems.com/learn-more/Problem/hardwaretokens--> <!--The primary problem with many of these methods, systems and processes, is that there are no industry-wide accepted standards in use, and many are proprietary in nature, complex, and confusing to the average consumer. Most of the current technology solutions are designed around a corporate entity providing secure access for users to “their” systems only, but still require that users be able to remember the multiple strong passwords and logins they use on all of the systems, accounts, and web sites they may desire to access.--> <!--SecurePass® is a solution with the user in mind – eliminating the need for, and the fears associated with users that have opted to reuse the same passwords and logins for multiple accounts, web sites and systems, merely because remembering the strong login information is very difficult if not an impossible task, given the vast array of systems and networks involved in their daily lives.--> <!--The current state of the technologies used in the SecurePass® system are such that nearly all of the technologies being incorporated have already been established in the industry as de facto standards, and have been underwritten and approved, or are in compliance with IEEE established standards.--> <!--The current state of technology must also include recognition that undesirables, intent on stealing passwords, login information and user identities using existing technology, is on the increase. From viruses to worms, from spyware to adware, from key-loggers to all other forms of malware, and from remote video surveillance information theft to social and reverse social engineering, the ability of consumers to feel comfortable and confident in using any system or account access method, without the fear of having their access information or their identity stolen, is a very real concern throughout all industries and for all consumers and businesses alike.--> <!--All the more reason for adopting a more standardized technical solution industry-wide that addresses all of these concerns in a simpler, cost effective, and user-friendly product and service – i.e. SecurePass®.--> <!--Note:--> <!--Key-logger: Malicious software written and deployed through various means and methods, typically incorporated into viruses and spyware, which monitors and traps all keyboard entries, saving them to a file that is then transmitted to the malicious code author(s), where it is used to determine user access logins, passwords and identities, often unbeknown to the user.--> <!--Remote video surveillance information theft: video surveillance methods used to capture users entering their passwords, PINs and other identifying information, into user interface devices; typically ATM user access keypads, and other forms of controlled access systems.--> <!--A mobile device O/S (Operating System) capable of supporting multiple industry accepted I/O (Input/Output) standards. Note: most hand-held cell phone, Blackberries, PDAs and other common communications devices already include a mobile device O/S.--> <!--A portable database based on SQL (Structured Query Language) or an equivalent derivative, capable of AES encryption/decryption for both storage and transmission over common and accepted network and communications standards.--> <!--A mobile device user interface capable of accepting and supporting common qwerty-style keyboard input, processing, and output.--> <!--An installable user interface supporting all of the same features as the mobile device interface, but intended for installation on multiple computing platforms, and capable of communicating with the SecurePass® enabled device via a USB v2.0 I/O port.--> <!--Sufficient internal Flash RAM to store the O/S, configuration data, the SecurePass® database and changes/updates, as well as the device drivers necessary for basic I/O functions (BIOS).--> <!--Internal EAROM (Electronically Alterable Read Only Memory) to store the O/S, I/O driver support, configurations, BIOS, and the SecurePass® database. At power-up, the contents of the EAROM would be copied over to the much faster Flash RAM and would not require power to maintain its contents. While powered-on, the flash RAM contents would periodically be written to the EAROM to ensure that the contents are as current as possible and to maintain the validity of data.--> <!--Internal, rechargeable Li-Ion (Lithium Ion) battery pack able to be recharged via the USB port and connection to any PC/MAC host or off-line charger/adapter.--> <!--LED/LCD display to provide visual user information and input verification.--> <!--A USB v2.0 I/O port for interfacing SecurePass® device with other computing devices, and for providing I/O to alternate or backup devices.--> <!--A Flash Memory Card port compatible with existing industry standards for providing access to alternative storage devices for the SecurePass® database and configuration backups [e.g. MMC (MultiMedia Card), SD (SecureDigital Card), MiniSD (Mini SecureDigital Card), SM (SmartMedia Card)].--> <!--A biometric human interface suitably sized for the average human finger or thumb.--> <!--Support for Bluetooth PAN wireless communications and synchronization.--> <!--Support for AES encryption/decryption standards.--> <!--Support for biometric scanner input, recognition, and communication/authentication.--> <!--What is the Likely Intellectual Property (IP) protection for the product/service idea?--> <!--SecurePass® involves a number of different technologies and its success will likely require obtaining the proper licensing for the incorporation of those technologies from the various patent, copyright, and trademark owners. However, I have already initiated, and am in the process of developing the necessary documentation to support the requirements of the patent, trademark, and copyright processes and procedures through the USPTO (United States Patent and Trademark Office). The original idea for SecurePass® was documented over two years ago, and was even submitted to the staff of the Shark Tank television program.--> <!--Since then, I have continued to move forward on the development of the finer details of the SecurePass® concept and project, and have submitted applications and paid required fees for obtaining licensure and registration of the SecurePass® name and logo, which were initiated on August 28, 2010. The current status of the trademark application process is that it is being investigated by the USPTO attorneys, and the last communication I received from them was dated; September 3, 2010 where they assigned the Design Search Code and Pseudo Mark for Serial Number 65118201.--> <!--In order to obtain the enhanced protections afforded to product and service ideas beyond the automatic, inherent, and default protections normally afford to intellectual property and ideas once minimally documented, it is my understanding that full documentation and details will need to be developed and provided through application to the USPTO, in the proper and appropriate USPTO formats, in order to facilitate obtaining the provisional patents, copyrights, and trademarks that are available and/or necessary.--> <!--What need does the product/service address in the market?--> <!--SecurePass® addresses a need that has existed, currently exists, and will exist in perpetuity, thanks to the unlawful efforts of malware and spyware authors, identity thieves, and those who would-be. In a perfect world, computer users and consumers would be able to feel confident and comfortable in using the same password, login and other personal identification information for every network, service, account, and web site that they choose to access. However, we don’t live in a perfect world, and the threat and risks associated with being “connected” in a high-tech world economy are always looming over our heads.--> <!--The market for a more standardized, improved, and secure form, method, and process for accessing and authenticating to multiple services, systems, accounts, and web sites has, in effect, been created as a result of those who would attempt to steal the identity of consumers and computer users. The market is there – just waiting to be tapped! Consumers are hungry for something that offers security, simplicity and consistency in their lives.--> <!--A recent marketing survey, conducted among male and female consumers and computer users, comprised of a wide range of age groups, while still in its infancy and while all anticipated or expected returns have not yet been collected, would suggest the following based on the returns tallied thus far, with only 6% of total expected respondent returns:--> <!--The results of this preliminary survey would need to be further refined and analyzed, and should likely be included in a much broader analysis obtained from focus and test group settings.--> <!--However, it should be recognizable, even in these early stages of collection and analysis, that there is a great deal of concern for the risks associated with the potential for personal identification theft; suggesting there is a need, for a simpler and more secure way to access and authenticate to systems, accounts, and web sites; and that among those responding there is an expectation of the costs involved, or what consumers might be willing to pay for such a product or service if it were available.--> <!--What are the barriers to entry associated with this market?--> <!--Expected barriers to market entry would primarily be the need for multiple industry-wide acceptance of a more standardized system, process or method, as proposed by the SecurePass® system, as well as any FCC regulations regarding and governing the wireless transmission of information, even where short PAN distances are involved.--> <!--Other barriers would include those posed by competitors in the markets served that currently offer alternative, albeit limited solutions, but have already established a market presence as early movers.--> <!--Additionally, the introduction of a new technology such as SecurePass® would likely require that existing user interfaces through all affected industry systems and devices be modified to provide multiple support of the SecurePass® system access and authentication methods, as well as existing access and authentication methods, until such time as a single access and authentication method is in full deployment, allowing other methods to be phased-out.--> <!--As always, costs relating to the migration and convergence of the technologies involved, licensing procurement, and the further development, implementation, and ultimate deployment will represent very real barriers – not insurmountable barriers, but barriers none the less.--> <!--Who are the first customers and what are they like?--> <!--The introduction of SecurePass® is expected to resemble that of a top-down implementation and deployment structure, with the first customers being businesses, institutions, organizations, and government entities, in all industries and all fields of endeavor, that possess a desire to license, offer, and support the SecurePass® system as a means of providing the simplest, hands-free, and most secure methods for accessing and authenticating to their networks, systems, accounts, and web sites. These customers will include new businesses and organizations that are just starting out, as well as those who have been in existence for many years, but have always struggled to gain complete control over the security issues relating to the networks, systems, and accounts they provide and administer, and the consumer information that they are responsible for.--> <!--The next group of customers would likely and logically be those computer users and/or consumers who are of legal age to enter into a binding contract (18 years old in most states), specifically those who have a need or desire to securely access the Internet, secure web sites, finance and eCommerce accounts, and any services, networks, accounts or computing devices that require secure authentication as a part of their access control methods and policies such as ATM machines, for example. The vast majority of consumers and computer users taking advantage of eCommerce capabilities over networks or via direct interface with SecurePass® enabled systems and computing devices will be those of legal age, mainly because they stand to be in the highest risk group for potential personal identification theft.--> <!--Given that more and more systems and services are moving towards requiring the use of Strong Passwords; both as a matter of security policy and procedure, and as a means of protecting their customer’s personal identification, it is generally felt that it will also become more and more difficult for most consumers to create and maintain different strong passwords and logins for each network, service, account, and web site they access. It is expected that the average consumer and computer user who does not have a system, service, or product like SecurePass® available to them, will likely continue to do what they have always done in the past; which includes using and reusing a minimal number of different password and login combinations that are familiar to them and easy to remember. This of course represents a lack of adequate security issue on the part of the consumer, because once a person intent on stealing a consumer’s identity to gain access to one system or account is successful, it is rather--> <!--easy for them to move on to other systems and accounts using that same stolen or illegally obtained information.--> <!--What is the estimated total size of the initial customer group? Will this segment be adequate to support the business associated with the product/service idea?--> <!--I think it might be somewhat difficult to estimate a total size of the initial customer group, given the vast and wide-ranging applications for SecurePass® throughout all consumer industries and markets in our society, however, it would need to be inclusive of all businesses, organizations, institutions, firms, and entities that conduct transactions where electronic systems, accounts, and web sites are involved and where consumer access and authentication methods and processes are employed or required. Any location, service, device, or system intended to provide consumer access would be a likely candidate for marketing and deployment of the SecurePass® system.--> <!--Additionally, there will likely be a number of B2B (Business-to-Business) applications for the SecurePass® system. Generally speaking, anywhere an individual or a system needs to gain access and authenticate to a another system in order to gain access to the services supported by those systems - these would be likely candidates; and given the vast size of the numerous consumer industries, there is very likely adequate segments to support the business associated with my SecurePass® system.--> <!--The U.S. Census Bureau classifies businesses and organizations according to their payroll status and whether a registered business or organization actually has employees on payroll (i.e. employers and non-employers), with three-quarters of all registered businesses having no employees on payroll (U.S. Census Bureau, 2010). The bureau also recognizes that there have been steady increases in the number of self-owned, self-operated, and self-employed (non-incorporated/non-employer) businesses since 1997, and that the statistics associated with non-employer businesses suggest that the number of non-employer firms has surpassed the number of employer firms.--> <!--However, the Census bureau also reports that in 2004 the total size of all registered employer and non-employer firms in the U.S. was 25,409,525 (U.S. Census Bureau, 2010). A quite sizable market for a product or service that any, or all, could possibly benefit from once my SecurePass® system is available in full deployment. From a client-side perspective, the number of employees registered by the firms indicated for 2004 represents a size of 115,074,924 prospective customers in the business/organization sectors alone.--> <!--From a business and technical standpoint, there would likely be a select number of businesses or organizations that would be involved in a limited deployment test scenario for my SecurePass® system, prior to going live and being released in full deployment.--> <!--U.S. Census Bureau (2010). http://www.census.gov/epcd/www/smallbus.html--> <!--How will you use funds that are given to the business?--> <!--If my SecurePass® idea is chosen as a successful entry in this competition, there are at least three immediately available paths of action, or options, for the use of funds received that come to my mind:--> <!--1)[Production] The funds will be used to further develop the SecurePass® system, devices and related technologies as a function of my own business plan, in an effort to produce a fully functional prototype, and to obtain all necessary licensing and intellectual property protections and registrations, which will then be even further developed in collaboration with other interested investors, partners and firms, to move the entire SecurePass® system package to its ultimate goal of being marketed and deployed in business networks, systems, and account access devices around the country, and possibly throughout the world; as well as being made available to consumers in the form of a small hand-held device, or an add-on system and technology to existing features and services available on their favorite personal communication device, cell phone, Blackberry, or other PDA device.--> <!--In this scenario, I (dba: SOUNDEX Innovative Design Concepts), would retain all rights and ownership of patents, copyrights, and trademarks associated with the SecurePass® system, and any other software, hardware, systems or devices that are produced in relation to my SecurePass® idea.--> <!--2)[Buyout] The funds will be used to further design and develop my idea to a point where it represents a more appealing product and service to existing companies and firms involved in wide-scale secure communications and systems access/authentication products and services, where the SecurePass® idea may be purchased either in part, or in its entirety, for the purposes of large scale implementation, deployment, promotion and marketing by the new owners of the idea. This option would also include the negotiation of licensing fees, royalties, and residuals payable to me as the author, inventor and innovator of SecurePass®. Additionally, this path would free my time and resources from this project, affording me the opportunity to pursue other ideas, inventions, innovations, projects, and business plans I have had in the works for a number of years.--> <!--3)[Business and Educational Collaboration] The funds will be used to provide a return on investment, with dividends, to existing project investors that have demonstrated a willingness to support me in my endeavors in the development and promotion of the SecurePass® system, from its original concept to a marketable product and service idea, with any remaining funds being used to further promote, procure, and develop new investment opportunities for the continued overall development of the SecurePass® system, as part of a collaborative effort between other businesses, institutions, and educational organizations such as; The University of Toledo (faculty, staff and students), Kaplan University (faculty, staff and students), the Association for Computing Machinery (ACM), and interested honors society members involved in IT-related fields such as; IST (Iota Sigma Tau Honor Society), ABK (Alpha Beta Kappa Honor Society), GK (Golden Key International Honor Society), NSCS (National Society of Collegiate--> <!--Scholars), and others.--> <!--In this way the funds could be used to further promote and develop the SecurePass® system idea while also serving as an educational and business collaboration tool and opportunity that others (faculty, staff, students, and business owners) can share in; wherein I would continue to retain ownership of all related patents, copyrights, and trademarks associated with the SecurePass® system, and any returns or profits derived from actual production, marketing, deployment, and the on-going support aspects could be shared between a number of institutions, organizations, and businesses involved, including myself, in the form of residuals, licensing fees, and royalties.--> <!--My reasons for providing an early return on investments, with dividends, to existing investors is two fold:--> <!--Doing so creates a positive image and feeling to investors that their involvement and support of my projects represents a valid and appreciated businesses and financial decision on their part. Even in a good economy, most investors tend to severely scrutinize the expected or projected performance of their investments – obtaining returns earlier than originally illustrated or demonstrated in project proposals, prospectuses, and forecasts is somewhat unheard of in most industries, especially in our current economic times.--> <!--Providing early returns and dividends to existing investors may perpetuate an environment that involves less hesitancy, or reluctance, to invest in other or future proposed projects and ideas.--> <!--Just as one might expect from most serious and passionate inventors and entrepreneurs, I typically will have a minimum of three projects in the works at any given time;--> <!--each at varying phases in their individual project management process. Some projects are processed through design, marketing and invention management firms--> <!--such as; Davison Design, Rocket Ventures, or Einstein Design. The costs associated with getting something from the "idea" stage - to being available to consumers, can be quite--> <!--high, not to mention the costs associated with the I.P. procurement and other legal processes. This is why investor involvement is so crucial to the entire process; although most investors--> <!--are understandably hesitant to contribute towards any venture, without having a fair understanding of what it is that they are investing in, how the funds will be used, and what their anticipated or--> <!--expected returns are projected to be, or might actually result in being, as is the case where contractual loan agreements or partership agreements are used, etc.--> <!--For these reasons, and many more, I want my prospective investors to make educated, informed, and well thought-out decisions with regard to the projects I am working on and involved in. I --> <!--would never ask, or expect, anyone to invest in something that I personally am not financially vested in or committed to. &nbsp; So please take a few moments to browse the available project investment options provided below.-->