The Geym Cheynjer (Prononced: The Game Changer)

by Ray Field Judson JR-II

Ray Field Judson JR-II wants some feedback on this project. What do you like? What could be better? Anything missing?

Leave feedback

No feedback yet! Be the first to leave feedback

This is not a live project. This is a draft shared by Ray Field Judson JR-II for feedback.

Note that all projects must comply with the Kickstarter Rules to launch. Ray Field Judson JR-II may disable this link at any time.

Project image
)}
$0
pledged of $25,930pledged of $25,930 goal
0
backers
30days to go

Back this project

Share
Tweet
Mail
Embed
This project is not live
This is only a draft that the creator has chosen to share
$0
pledged of $25,930pledged of $25,930 goal
0
backers
30days to go

Back this project

Share
Tweet
Mail
Embed
This project is not live
This is only a draft that the creator has chosen to share

About

Est. Launch 06/11/2014

Hello everyone and welcome to The Geym Cheynjer (pronounced: Game Changer) an absolutely clever new product, KickStarter's Campaign. Where we are promoting the funding of the completion for the patent, of a patent pending new use/business method/process, that will stop more than 99% of personal identity theft, committed by the common criminal that will result into a financial loss. And, not just stopping the criminal, but catching them in the act, before the transaction, withdrawal, or credit charge is completed. For the first time, we will be out in front of the criminal, not making guesses and trying to catch them after the act.

For example of the guesses: Hey did you know, that the premiering software that the banking/credit card entities and fraud protection companies use, learn your spending habits. So, that they can make a better guess of, whether, is it you or is it not you, making that transaction. The way I see it is, a better guess is still a guess. And, with The Geym Cheynjer you will see there are no guesses, you will know.

This is a simple overview of a business method/process, new use and not limited to this explanation. The umbrella name for the system is The Game Changer. The Game Changer… is spelled, in a cryptic way, but phonetically correct… game… is spelled G E Y M…, and changer… is spelled C H E Y N J E R… to help show the cryptic nature of the product.

First things are first; this is a simple and straightforward innovation, but that does not mean that it is trivial. For example, I would compare it to The Amazon’s One Click. Because, it is obvious, once it has been explained to you. In other words, Amazon’s competitors claimed it was to simple and obvious to be patented and tried to use it without permission. They were wrong. Amazon sued and won. Then with The One Click as their most exclusive and powerful tool, topped their competition. If you can call them competition anymore.

Second thing to talk about is any technology can be nullified by an even higher advanced technology. Right? But, most crimes are committed by using clever means, or at the least, technology used in a clever way. Like: a pin camera that is positioned in such a manner that you can not see it, but it can view the typing of your pin number. So, it is time that the good guys use cleverly influenced technologies to.

Third lets talk a little about infrastructure. Some experts believe the systems that guard our personal finance and information is broken, and we need a complete change to the security of our personal financial and personal identity protection. But, that will be incredibly expensive for our banking entities. So the bottom line is it will be incredibly expensive for us the account owners.

The Geym Cheynjer

The Geym Cheynjer will seamlessly merge with the current technology, with little changes. And, will fix all the foreseeable holes in our security of the personal financial and personal identity, without changing the infrastructure. The Geym Cheynjer will be much less expensive, extremely effective, and very feasible.

1. The Geym Cheynjer : Is when a banking entity gives the account owner the ability to control their account's transaction capabilities. The account owners can freeze their account’s transaction capabilities (make inactive), at will. By using a secure connection via a phone, website, and/or text (or the like). With the account inactive, no money can be taken from the account. Your money is like, being in a safe deposit box. So, if your debit card or checks are cloned, lost, or stolen, your money is out of reach, and it is safe.

Now that you have made your account inactive, so one of the things that you are doing is telling the banking entity that you are not going to use your account. Right? Now, if any financial transaction request is made. The banking entity will know that it is not you, it is an unauthorized transaction request.

By using the same system that the banks use to route financial transfers when we swipe our credit/debit cards, (and/or write a check) in a simple but clever way. So, basically The Geym Cheyner uses the same part of the said, system that is programmed to decipher where the information is coming from and where to send it, e.g. : (greatly simplified) 1. you swipe your card at retailer; 2. Key in PIN; 3. That information is broadcast to the banking entity's computer; 4. The banking entity's computer receives, determines authenticity of information than calculate if funds are available and if so...; 5. The banking entity's computer broadcast the transfer information to relocate the funds to the retailer.

But, if the transactions of the account that is connected to the card were inactive during 4. Then the banking entity's computer will know that the transaction is unauthorized. Then the banking entity's computer will put the transaction on hold (to keep the criminal standing there), contact the authorities and tell them exactly where he is. And, oh yeah he will be easily located because he will be, in this case, standing in front of the retailer's cashier, where he just swiped the card. Got'em!!! Hey, all this happens as fast as a computer can calculate. Look after he has swiped the cloned card, keyed in your stolen PIN, than he read on the little display screen "waiting for cashier", and the cashier presses the button. The usual 3-5 seconds that it normally takes, for a card's transaction to take place are all that it takes to know where that criminal is located. Yeah, meanwhile, he is still waiting for the information to be authorized so he can swindle you. But, all he is going to get is the authorities in his face and be arrested. Again, Got'em!!!

And, the account owner can unfreeze their account (make active), also with Restrictions. Restrictions are instructions to how you are going to use your account when it is active, e.g.: 1. When: from when to when or specific length of time 2. Where: zip code, area code, specific store, or the like. 3. How much: a set dollar amount to spend 4. With who/whom in case of a check… And, etc. After The Restriction has expired, ran its course, and/or came to fruition the account will revert to inactive. Then outside of that time, place, dollar amount, and not that who or whom will easily be recognized as an unauthorized transaction by the bank and other authorities. The instructions for The Restrictions will be set with the ease of using the said, secure connection via a phone, website, and/or text (or the like).

2. Credit card entities will use The Geym Cheynjer in a very similar fashion, like the banking entities. The credit card entities will give it’s card owners the ability to control their card charging capabilities. By using a secure connection, a phone call, going to website, and/or texting system. Allowing the card owner to turn the charging capability off and back on, also with Restriction, if wanted. These Restrictions again can be when, where, how much, with whom, and/or etc.

These are some examples of how the Restrictions will work. The banking/credit card entity will allow you to set up your own personal parameters to your account's transactions' capabilities and if properly set up will make transactions virtually impossible for a person that has obtained a lost or stolen credit card, debit card, and/or check, to use them without violating parameters and causing an alert.

For example but not limited to: let's say you keep your financial accounts transactions capabilities turned off until you need them, as a good practice, so you decide to go out on the town tonight and have a good time, on your way out, you call the banking/credit card entity and set up parameters on your debit card, like: my account's transaction capabilities are on with these Restrictions, time: 8:pm to 11:pm, Saturday 07/21/2016, location: zip code 3 0 3 0 8, then after that time, outside of that location you will not be able to make a transaction and/or without setting off an alert.

Another example but not limited to: let's say you keep your financial accounts transactions capabilities turned off until you need them, as a good practice, so you decide to write a check to pay for some yard-work before you give the check to your yard-man you go on-line to the banking/credit card entity in order to set up parameters, like: my account's transaction capabilities are on with these Restrictions, check number, the amount and who will be cashing it, any variance from these criteria the check will not be cashed and/or will set off an alert.

For another example but not limited to: let's say you keep your financial accounts' transactions capabilities turned off until you need them, as a good practice, so you decide to go shopping, on your way out, you text the banking/credit card entity and set up parameters on your credit card, like: my account's transaction capabilities are on with these Restrictions, time: Six hours, location:770 area code, spending limit $500, then after that time, outside of that location, and that the amount, you will not be able to make a transaction, and/or will set off an alert.

There are many Restrictions that can be implemented to add encryption while the account is active.:

For an even further example, there is even a Restriction that will allow a number of transactions, 1...2... 3...or more before the account's outgoing transactions are turned off, and after that number of transactions have been made if anyone try to make a transaction it will cause an alert.

Okay, let's do a quick recap before moving on to the rest of the business method/process, new use. The Geym Cheynjer will coordinate the banking/credit card entity to be in perfect synchronization with the owners of the accounts/credit cards. The Geym Cheynjer will allow the authorized entities to know if it is or not you instantly. And, with the added Restrictions to the account and/or credit card transactions every owner has the ability to create more encryption than uniqueness of their fingerprint, when the account's transactions are in use.

FYI: Hey, for those of you who do not believe my statement of …more unique than a fingerprint. Well, if you have just $100.00 in your bank account. That would be 10,000 choices, using your restriction with 1 cent increments. There are approximately 43,000 zip code in US to choose from. There 1,440 minutes in a day, also to choose. So, that will be approximately 619.2 billion combinations. That is about 90 per person for the ones that have fingerprints, anyway, ha ha. Wow, that is a lot of encryption, without mentioning the other Restrictions in this equation and all of this is under your control, satisfying your needs for personal financial security, and The Geym Cheynjer is easy to use.

Think about it: You don't have to use all of The Restrictions. You can use the basic time limit or none. Because, if The Geym Cheynjer's capabilities are implemented to everyone's account, the criminal will not know if you are or are not using it. Just the fact that it can be in use will be an incredible deterrent. It is truly a game changer.

Now, with the guess work taken out of the equation. Mostly, all of the worry will probably be an owner forgetting the protocol and using her/his debit card, credit card, or check outside of set parameters. But, there is a solution for that, as well.

Here are some Pos (Peripheral Options). Pronounced: Poz.

Wuhn Yoos PIN

It is named The One Use PIN. The One Use PIN is also spelled, in a cryptic way, but phonetically correct… the one… is spelled W-U-H-N…, and use…is spelled Y-O-O-S…. The Wuhn Yoos PIN is a PIN number that is use only once then becomes void. It is pre-selected by you and you can make multiple One Use PINs to be used in a sequence. The Wuhn Yoos PIN will make the operations of The Geym Cheynjer run smoother after we have made a simple human error.

The Wuhn Yoos PIN example:

So lets say that, The Owner forgets that she has turned off or has Restrictions on her outgoing transactions, and she attempts a transaction outside of parameters. Then the merchant, ATM, restaurant waiter or other is instructed to keep the card and/or refuse check.

The Owner can use her One Use PIN to cancel the alert, on the spot. This will do three important things. 1. It will instantly notify the banking entity and the credit card company that it is you and not a fraudulent attempt. 2. It will allow her to receive her card back. 3. And, it will allow her to complete her transaction or receive her cash before The One Use PIN is voided.

Cheynj Uhp

Okay now, I have another Pos to describe. This peripheral will add encryption to the business method/process. It is named The Change Up and again it is also spelled, in a cryptic way, but phonetically correct… Change is spelled… C-H-E-Y-N-J and Up is spelled U-H-P.

The Cheynj Uhp adds security to The Geym Cheynjer, by the using of multiple connection to contact the banking/credit entities, like: multiple phone numbers, multiple web-site addresses, and/or multiple text numbers & short codes, if you do not choose the right one, it will set off an alert.

The Cheynj Uhp examples:

For example but not limited to, let's say that there are ten phone numbers and all are real and full functioning said, phone numbers all are real and will connect you to the banking/credit entities, but you have selected only one of them to be the correct one for you to call the banking/credit entities, if the correct one is not chosen to call, it will set off an alert.

Again let's say that there are ten web-site addresses and all are real and full functioning said, web-site addresses that will connect you to the banking/credit entities, but you have selected only one of them to be the correct one for you to connect to the banking/credit entities, if the correct one is not used to connect to the banking/credit entities, it will set off an alert.

One more time lets say that there are ten text numbers or short codes, and all are real and full functioning said, text numbers or short codes that will connect you to the banking/credit entities, but you have selected only one of them to be the correct one for you to text the banking/credit entities, if the correct one is not chosen to text to, it will set off an alert.

The Buzz

Last one I promise, The Buzz is an alert, that you setup, to notify you when your parameter's settings have begun and/or have ended. The Buzz can be setup, to alert you via: phone, text, computer, and other electronic devices.

For an example of The Buzz, but not limited to: let's say you keep your financial accounts' transactions capabilities turned off until you need them as a good practice, let say, you decide to take your wife out, to a movie and dinner. You know that dinner with tip cost $55, the movie cost $15 per ticket (totaling $30), and oh yeah, can't forget the popcorn & chocolate covered raisins, for your wife, cost $8. This good time out cost $93.

So, you set your parameters accordingly, with a little wiggle room. 4 transactions and $133, than you set The Buzz to alert you when your transactions reach 3 and/or your set spending amount reaches $103. This will do two things. First, it will help you to stay inside of your set parameters. Second, if someone is using a cloned card, or something along those lines, the maximum amount they could get is $133, before setting off an alert. Then let's say, you have already eaten, and you are at the movies and have purchased popcorn & chocolate covered raisins. Now, that means if the criminal takes only $10 you will know it because The Buzz will alert you because you would have reached your $103 limit. And, if the criminal takes $40.01 and/or make 2 transactions the authorities will be alerted because you will be over the set Geym Cheynjer's limit.

One more FYI: For any privacy concerns. The Geym Cheynjer should be using automated secure connections, by the most part. Beside giving you the most convenience and ease of use. It will also allow for the same amount of privacy if not more than other account. The only time authorized person will have to pay any extra attention to your account (compare to an ordinary account) is when someone attempt an unauthorized access to your account‘s debit card or checks and credit card. That will cause an alert, than authorized personnel will have to look into it. But, otherwise your privacy will be intact.

Now, that you have a little more information, I will describe the automated secure connection via phone, website, and texting service in some detail. It will be preferred to use the automated secure connections so that there will be a smaller amount of people privy to your parameter settings, if any.

For the sake of showing the concept of The Geym Cheynjer further, here is a generic step by step description of how to access and use the web-site version:

* Go to web-site, by typing the correct web-address in the address bar, one of let's say ten, in reference to The Cheynj Uhp, click go.

* Type in the correct username, click go.

* Answer all prompts correctly, click go.

* Type in the correct password, click go. This will allow you to access the banking/credit entity's account page that they assigned to you.

* Click the Geym Cheynjer Icon to launch the application.

* You can select to turn the account's transaction function off or on. Also, you can turn it on, with restrictions, like but not limited to.:

* Is there a time restriction/time limit: you can only click on one: _ no, then continue to the next command. _ or, yes, If so specify parameters. Example of time restriction: From: one PM To: five PM. Example of the time limit: you can indicate in seconds, minutes, hours, days, weeks, and so on, like, but not limited to: you can use your account's transactions for three hours, twenty-nine minutes, and fifty-nine seconds length of time, then after that amount of time has expired if there is any attempt to make a transaction it will cause an alert.

* Is there a Location restriction: you can only click on one: _ no, then continue to the next command. _ or, yes, If so specify parameters. Example of location restriction: City, State: Atlanta, GA and/or zip codes:3 0 3 0 7, 3 0 3 0 8, 3 0 3 0 9, 3 0 3 1 0 and/or area codes:706, 762, 770, and/or even specific store, retailer, restaurant, on-line vendor, or a like, by business number, or the like. ( A database can be established so that businesses can register their business numbers, or the like, to make it easier for the account owner to find and use them.)

* Is there a spending limit: you can only click on one: _ no, then continue to the next command. _ or, yes, If so specify parameters. Example of spending limit: What is your spending amount: $500.00.

* Is there a third-party: you can only click on one: _ no, then continue to the next command. _ or, yes, If so specify parameters. Example of Third-party notification: Who and/or what business entity: name: The Good Business inc. and/or business number

* And, so forth and so on...if there are any variances from these restrictions/parameters it will cause an alert.

* Then sign out (or before signing out you can reset your banking/credit entity's security access protocol, then sign out.)

Something a little extra about The Geym Cheynjer, via website.

For a more explanation of the generic step by step description of, banking/credit entity‘s website: I have an account with Bank of America and when I use their secured web-site I type in my username; then I have to answer a prompt (An answer to a question that only I am privy to because I previously set it up with Bank of America's automated system.), then last I type in my password. Then I can monitor and make transactions from my account.

For the sake of a little more further showing the concept of The Geym Cheynjer here is a generic step by step description of how to access and use the phone version:

*Call the correct phone number, one of let's say ten, in reference to The Cheynj Uhp.

* Type in the correct username or user-pin for the lack of a better word, with keypad or with the assistance of voice recognition software, you can say your password.

* Answer all prompts correctly.

* Type in the correct password with keypad, you are granted access.

* request The Game Changer when prompted.

* When prompted you can select to turn the account's transaction function off or on. Also, you can turn it on, with restrictions, like but not limited to.:

* When prompted - Is there a time restriction/time limit: you can dial 1 for no, then continue to the next command. Or 2 for yes, If so specify parameters. Example of time restriction, you type in with your keypad: From:1PM To:4 PM. Example of the time limit: you can indicate in seconds, minutes, hours, days, weeks, and so on, like, but not limited to: you can use your account's transactions for three hours, twenty-nine minutes, and fifty-nine seconds length of time, then after that amount of time has expired, if there is any attempt to make a transaction it will cause an alert..

* When prompted - Is there a Location restriction: you can dial 1 for no, then continue to the next command. Or 2 for yes, If so specify parameters.. Example of location restriction, you type in with your keypad: zip code or zip codes:3 0 3 0 7, 3 0 3 0 8, 3 0 3 0 9, 3 0 3 1 0 and/or area code or area codes:706, 762, 770, and/or even specific store, retailer, restaurant, on-line vendor, or a like, by business number, or the like. ( A database can be established so that businesses can register their business numbers, or the like, to make it easier for the account owner to find and use them.)

* When prompted - Is there a spending limit: you can dial 1 for no, then continue to the next command. Or 2 for yes, If so specify parameters. Example of spending amount, you type in with your keypad: $500.00.

* When prompted - Is there a third-party: you can dial 1 for no, then continue to the next command. Or 2 for yes, If so specify parameters. Example of Third-party notification: Who and/or what business entity, you type in with your keypad: name: The Good Business inc and/or business number

* And, so forth and so on...if there are any variances from these restrictions/parameters it will cause an alert.

* Then hang-up (or before hanging-up you will be prompted to see if you want to reset your Banking/Credit entity's security access protocol, then you can hang-up.)

For the sake of an additional further showing the concept of The Geym Cheynjer here is a generic step by step description of how to access and use the texting version:

* Text a short code: GGs@5432 to a text database, one of let's say ten, in reference to The Change Up.

* The text database will text you back a request for your username.

* You text your correct username.

* The text database will text you back one of maybe five questions that only you know (because beforehand you created the questions and answers). * You text the answer correctly.

* The text database will text you back a request for your password.

* You text the password correctly. Than you are granted access.

* You text the word Geym Cheynjer to start the application to accept your preferences.

* You can text the database to turn the account's transaction function off or on. Also, you can turn it on, with restrictions, by texting the text database, like but not limited to.:

* Time restriction/time limit: Example of time restriction, you can text: From: one A.M. To: four-thirty P.M.. Example of the time limit: you can indicate in seconds, minutes, hours, days, weeks, and so on, like, but not limited to: you can use your account's transactions for three hours, twenty-nine minutes, and fifty-nine seconds length of time, then after that amount of time has expired, if there is any attempt to make a transaction it will cause an alert.

* Location restriction: Example of location restriction, you can text: zip code or zip codes:3 0 3 0 7, 3 0 3 0 8, 3 0 3 0 9, 3 0 3 1 0 and/or area code or area codes:706, 762, 770, and/or even specific store, retailer, restaurant, on-line vendor, or a like, by business number, or the like. (A database can be established so that businesses can register their business numbers, or the like, to make it easier for the account owner to find and use them.)

* Spending limit: Example of spending amount, you can text: $500.00.

* Third-party: Example of Third-party notification, you can text: Who and/or what business entity: name: The Good Business inc and/or business number

* And, so forth and so on...if there are any variances from these restrictions/parameters it will cause an alert.

* Then text end. Or before texting end, you can text the word reset in order to go through a series of texts, to reset your Banking/Credit entity's security access protocol Then you can text end.

A little more to think about:

The account owner can also go into a banking entity and give instructions person to person, authorized personnel of the banking entity. Any of the ways, that the account owner uses to give instructions for the way their account's transaction functioning perform can be mix and match. For example, she/he can turn the account's transaction functioning off with the phone and turn it back on with the web-site, text, and/or person to person, in whichever way they desire.

How The Geym Cheynjer is used to secure personal information.

Tell-a-tale

There is another part of The Geym Cheynjer to discuss. It is named the Tell-a-tale. The Tell-a-tale operates very similar to the way the rest of The Game Changer, works with banking/credit entity and their account/card owners. Because it is the same system just formulated to protect our personal information (Social Security number and the like) instead of money and credit. And so, the difference is it is between private/governmental filing entities and the owners of the personal information or maybe a better way of saying it is, the person that is identified by that information. Either way, for the sake of describing the Tell-a-tale, I will be using information owner.

The Tell-a-tale is the means of which the filing entities will give the information owners the abilities to tell the said, filing entities that they are using or are not using their personal information. To make a long story short, personal information can not be stored and owned like money and/or be as conclusive as a credit card. Because, without your authorization, it is no one business how much money you have and how well your credit has been preserved. Right? But, your school, workplace, doctor’s office, and many other entities have your personal information. Hey lets just say it is out there. The only thing to do is to control it. By coordinating your intend to use your personal information with the filing entity. And with that, the filing entity will have the greatest success rate of all times in knowing if the information is identifying you or a fraudulent attempt to impersonate you.

So, The Tale-a-tell will be used to notify the filing entity of the information owner status, like in use, not in use. Also, very similar to The Geym Cheynjer, the information owner can easily call in, use website, and/or text to a secure service to set parameters, it can be in use with Restrictions, like what information is to be used, how long you will be using the information, with whom/entity you will be sharing your information, what you will be applying for, and etc.

Putting it all together: The Joint.

In the real world, there is a problem with all of this. It is called bureaucracy or red-tape. Because some of the filing entities are so big, and have so many rules that they are massive behemoths. And, with such large governmental entities they can not be so simply changed and/or improved. This is where The Joint comes into play. These filing entities will not have to change much. Because The Joint can be its own separate entity. Where the information owner can control their personal information status. Any of the authorized entities could check our personal information status. They can find out that our personal information is not in use or in use, also when in use what Restrictions, if any (with whom or what business entity, etc. further including for what reason/how long, etc..

The Summary

In summary: First, It is really this simple. A bank giving an account owner the ability to freeze her account's transactions (inactive), anytime she wants. Also, she can turn her account's transactions back on (active), at will. And, when her account is active, she can use Restrictions, that can easily create more encryption than the uniqueness of her fingerprint. And, when the first Restriction has expired or come to fruition, her account will revert to inactive. Here is the rub. If someone try to access her account while it is inactive or outside of her Restrictions, it will cause an alert. Because, the bank will know that it is not her. Simply because, with her settings she told the bank what she was doing with her account. So, the bank doesn't have to guess is it an authorized transaction or not, it will know. So, when the bank determines that it is an unauthorized transaction. The bank can use the same means that it uses to know where the financial information came from and where to send the financial transfer, to locate the criminal. Hey! There he is, standing right there, in front of the cashier. Where he just swiped a cloned card of your card in the debit/credit card machine and keyed in your stolen PIN. (Because, all of this happen as fast as a computer can calculate, or the time it takes for a normal card transaction.) He is still waiting for the information to be authorized so he can swindle you. But, all he is going to get is the authorities in his face and be arrested.

For the first time, we will be out in front of the criminal.

If the banking/credit card/personal information filing entities know… and I repeat know your spending activities, like: is it active or inactive, when, where, how much, with whom, how many transactions, and so on…. And, the criminals are left out of the loop. This will greatly hinder the criminals from taking your hard earned money and destroying your perfectly preserved credit or just taking what is yours. Second, On top of all that, The Geym Cheynjer will catch those criminals in the act and we can put them behind bars, where they belong. Third, This service will still have all of the privacy afforded by other accounts. Because, it all can be set-up with a full automated system. The only time authorized personnel needs to look at your account is when an alert has been activated by an unauthorized usage. Fourth, it will be an efficient and cost conserving way for the banking/credit/information filing entities to create a higher security level for our money, credit, and personal information then what we currently have. And, without totally dismantling The U.S. infrastructure for the security of our personal financial and personal identity. This may be critical, especially at this time where a lot of the proponents of the financial world, want the U. S. Dollar to take a backseat to some other monetary unit. We must act fast and strong if we do not want that to happen. And, this is one of the steps in going in that direction. Oh, by the way, that includes you too Canada and Europe. Like it or not, your financial future is connected to The US Dollar, as well.

The Geym Cheynjer is the closest system to the date to being identity fraud preventive, not just monitoring & trying to catch them after the fact.

That is it!

The easy go lucky days, of going through your trash, to obtain personal information, setting up ATMs with pin cams and card magnetic strip readers, and pick pockets & other criminal activities, are all futile.

The Geym Cheynjer creates a barrier that the common criminal can not get passed.

He can have all of your personal information, but he will still have to know how to use it.

This is The End of My Presentation. Thank you for your time and effort.

Risks and challenges

Simple over view for later reference, in order to fully understand my challenges. The Geym Cheynjer uses the functions that allow the routing of our finances to be transferred, when we swipe our credit/debit cards, (and/or write a check,) in a simple but clever way. So, basically The Geym Cheyner uses the same part of the said, functions that is programmed to decipher where the information is coming from and where to send it, e.g. : (greatly simplified) 1. you swipe your card at retailer; 2. Key in PIN; 3. That information is broadcast to banking entity's computer; 4. The banking entity's computer receives, determines authenticity of information than calculate if funds are available and if so...; 5. The banking entity's computer broadcast the transfer information to relocate the funds to the retailer.

But, if the transactions of the account that is connected to the card was inactive or restricted, during 4. the banking entity's computer will know that the transaction is unauthorized, then; 5. The banking entity's computer will cancel the transaction, contact the authorities and tell them exactly where the criminal is. And, oh yeah they will be easily located, because they will be, in this case, standing in front of the retailer's cashier, where they just swiped the card. Got'em!!! Hey, all of this happens as fast as a computer can calculate.

I think my first challenge is getting my point across about the new use part of the patent application. It is the basis of The Geym Cheynjer. The new use: is The Geym Cheynjer's suspending the transactions of an account, or in other words freezing of an account. The new use of the freezing of an account is, the account's owner having the ability to turn it off and on at will. Than the banking entity's computer monitoring of the account's transactions, with purpose and intent , to see if a transaction violates the frozen account and any of the Restrictions of said, account, than locating the criminal and alerting the authorities to their whereabouts.

My second challenge is the explaining of the method/process of the patent application. Some people who I have talked to believe that it should be a downloadable completed computer program. but, the business method/process is what the computer program(s) should be doing, or the method and/or process used to accomplish a business goal.

My third challenges is the KickStarter's Project description panel only handles 35,000 characters. So, I had to abridged some of the contents (Restrictions) from the Campaign.

So, here is my solution. I will briefly describe 5 of them here.

* The Ringer: you can set The Geym Cheynjer to give yourself a signal, text, or phone call (with an automation voice or maybe less likely a live operator) that will alert you every time you use your account. With The Ringer activated, you know if you did not just make that transaction, someone else did. So, it will give you the ability to react faster than anything out there now, even on the smaller violations.

*The Set: This is one of The Restrictions that are designed to make the operation much easier. It allow you to set up a combination of Restrictions to be used with one commend,e.g.: Let's say, you combine time limit (8 hours), amount of transaction (4), and spending amount ($400), just visit The Geym Cheynjer choose The Set and click, you are done. You can set up several variations of them for different occasions.

*The Routine: Is another one made for the ease of use of the user. Let's say, that you have a debit/credit card dedicated for the workdays, your 9 to 5. You can set The Routine of said, card, to turn on than off, for 7:30A to 9:00A than 11:45A to 12:15P for lunch than, 5:00P to 6:30P Monday through Friday, your Ringer is on, maximum transactions (4), maximum amount is $65, The Buzz is set for $50 and 3 transactions. Set it up anyway you like. And, if anything additional is need just modify The Routine.

*The Switcher: is the using of multiple credit or debit cards to the same credit line or bank account. By using The Geym Cheynjer method/process to control the account transaction capabilities. You simply activate one of the cards while allowing the rest of them to be inactive. By having the ability to switch card at will it will be a good defense against the cloning of cards. And, to a less of a degree, it will make it more convenient if you misplace or lose a card.

*Oh, one more, The ID-on: is what it sounds like. It is a Restriction that you can select to give a commend for a cashier at a retailer/store/restaurant/etc. to ask to see a pictured ID, before the transaction is completed.

The fourth challenges is since the subject is high tech most believe that the solution should be. But, what is causing most of the lost of information, and in turn lost of money, is the clever use of lower tech, e.g.: pin cameras, magnetic script readers, good old trash diving, and etc.. They think it need to be a complicated solution.

Fifth challenges of The Geym Cheynjer's campaign, is finding a very good patent lawyer. One that can handle the drudges that may accompany applying for a patent, like: claims rejections and other re-writes.

Being able to correspond between the patent lawyer and ourselves. Because, the concentration of the better patent lawyers are in California, more specifically Silicon Valley, at least that's what I have read. And, we are in Florida. That is on the other side of the country.
So, if emails with attachments, snail mail, and phone calls are not a complete substitute for a face to face, that will be a problem. But, I very much doubt it and I believe we have a very good chance of pulling it off.
Last, but not at all least, the make it or break it factor. Because, $25,930 will afford the bare minimum cost of applying and receiving a good solid patent, which is approximately $18,500 after taxes, incentives, and other fees, from minimum campaign's success.
The Risks are running out of money.

The solution to it all, is to be money conscious and get the best bang for the buck. Hey, we just recently considered looking into using a Patent Agent. For two reasons. First, their less expensive than lawyers (but, they can not represent you in court, for patent infringement and what not.). Second, the concentration of the better patent agents are in Washington, DC. Which is only a full day drive from us. If needs be, I will ride a Greyhound bus and stay in a cheap motel, clean non-smoking one hopefully. Oh by the way, yeah, I said it, I will ride the bus, all day and stay in a cheap motel, to talk face to face with our patent agent, if necessary. I will give it everything I got!

Because, I genuinely believe that this will fulfill an absolutely important need in all of our personal financial reality. Because farther, stopping financial crimes will not only help the individual, it is one of the steps in stabilizing The US Dollar. Finally because, we all are the building blocks of the financial wall, so the speak. And, if you remove enough blocks from that wall, no matter how small, it will fall. Oh by the way, that includes you too: Canada and Europe. Like it or not, your financial future is connected to The US Dollar, as well.

Learn about accountability on Kickstarter

Questions about this project? Check out the FAQ

Support

  1. Select this reward

    Pledge $1 or more About $1.00

    Since the reward should be from the project. And, my project does not produce a tangible result that we can gift. We will give of my hearts. We will send a think you note to you via attached email, with transcribed letterhead (of the company that is producing it, Um-What?,LLc) and signature of the inventor.
    This and all of the rest of the rewards will commemorate that you took part in bring about a new era for the protection of personal finances and personal information. All without changing the infrastructure of our banking and credit system. Which is a step in the right direction, in keeping the US Dollar the main currency of the world's monetary system. Then in turn, it will at the least be a small part of the puzzle that will help stabilize The US and Europe economies. Hey, it won't hurt anyway, huh.

    Less
    Estimated delivery
    Ships to Anywhere in the world
    0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  2. Select this reward

    Pledge $10 or more About $10

    We will send a think you note to you, on 100% Cotton Fiber, Luxurious Wove Finish, Watermarked letterhead (of the company that is producing it, Um-What?,LLc), and signed by the inventor. It will be suitable for to be framed and hung.

    Less
    Estimated delivery
    Ships to Anywhere in the world
    Limited 0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  3. Select this reward

    Pledge $25 or more About $25

    In addiction to the $10 reward, I will include a transcript of the coversheet of granted U.S Patent and signed and dated by inventor, of course, when issued.

    Less
    Estimated delivery
    Ships to Anywhere in the world
    Limited 0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  4. Select this reward

    Pledge $100 or more About $100

    In addiction to the $25 reward, I will include the signed transcripts for four of my other ideas and thoughts. 1. The Off/On Maneuver (A new way of looking at the cure of AIDES.), 2. The U-N-nese, the modern day Rosetta Stone (An innovating idea for a universal/international language.) 3. The answer to (The seemingly unanswerable question, is the glass half full or is it half empty.), and 4. A probable truth, of which comes first chicken or the egg. All signed and dated.
    You can see all of them on our website: www.umwhatllc.com.

    Less
    Estimated delivery
    Ships to Anywhere in the world
    Limited 0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  5. Select this reward

    Pledge $250 or more About $250

    In Addiction to the $100 reward, I will include a signed complete transcript of The US Patent, signed and dated. When issued, of course.

    Less
    Estimated delivery
    Ships to Anywhere in the world
    Limited 0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  6. Select this reward

    Pledge $1,000 or more About $1,000

    In Addiction to the $250 reward, I will include The Conscious Consumer Award, From our company, Um-What?,LLC. I really believe that The Geym Cheynjer will be bigger then The Pet Rock and as clever as The Amazon’s One Click, but much more necessary. And, this award will commemorate that you were a big part of its infancy.

    Less
    Estimated delivery
    Ships to Anywhere in the world
    Limited 0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.
  7. Select this reward

    Pledge $5,000 or more About $5,000

    In Addiction to the $250 reward, I will include The Top Contributor Award, From our company, Um-What?,LLC.
    This award will commemorate that you were an invaluable part of The Geym Cheynjer infancy.

    Less
    Estimated delivery
    Ships to Anywhere in the world
    Limited 0 backers
    $
    Kickstarter is not a store.

    It's a way to bring creative projects to life.

    Learn more about accountability.