Method and apparatus to crowd bootstrap an accelerator

ABSTRACT

An accelerator as a service is described where organizations can create an accelerator fund. From that fund the organization can invest sweat equity into selected startups. Those startups use the sweat equity to acquire startup services from experts who receive a participation in the fund. Eventually, shares in the fund are traded on an exchange.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation in part of application Ser. No.15/268,591 filed on Sep. 18, 2016 by the present inventor.

This application is related to the following commonly-owned UnitedStates Patent Applications; Provisional Patent Application 60/140,479(Jun. 22, 1999), Provisional Patent Application 60/216,767 (Jun. 7,2000), application Ser. No. 09/599,673 (Jun. 22, 2000), application Ser.No. 10/716,847 (Nov. 18, 2003), Provisional Patent Application61/315,977 (Mar. 21, 2010), Provisional Patent Application 61/327,720(Apr. 26, 2010), Provisional Patent Application 61/361,431 (Jul. 5,2010), patent application Ser. No. 13/046,775 (Mar. 14, 2011), UtilityPatent U.S. Pat. No. 8,527,327, Utility Patent U.S. Pat. No. 8,548,868and Provisional Patent Application 62/152,819 (Apr. 24, 2015),Provisional Patent Application 62/274,247 (Jan. 2, 2016), ProvisionalPatent Application 62/274,298 (Jan. 3, 2016), Provisional PatentApplication 62/295,135 (Feb. 14, 2016), patent application Ser. No.15/089,553 (Apr. 3, 2016), Provisional Patent Application 62/360,427(Jul. 10, 2016), patent application Ser. No. 15/268,591 (Sep. 18, 2016)and patent application Ser. No. 15/268,623 (Sep. 18, 2016).

This application is also related to the following commonly-ownedInternational Patent Applications; WO 00/79350 (Dec. 28, 2000), WO02/05138 (Jan. 17, 2002), and PCT/US00/17247 (Jun. 22, 2000).

The workflow management system taught herein is a part of the presentinvention and is a new use of the Process Automation Software taught inapplication Ser. No. 10/716,747 (Nov. 18, 2003).

The skills survey taught herein is a part of the present invention andis a new use of the interview questionnaire system taught in co-ownedpatent application Ser. No. 15/089,553 (Apr. 3, 2016).

The buyer demand system taught herein is a part of the present Inventionand is a new use of the aggregate demand system for buyer specifiedgoods and services taught in utility patent U.S. Pat. No. 8,548,868.

FEDERALLY SPONSORED RESEARCH

None.

SEQUENCE LISTING

None.

BACKGROUND OF THE PRESENT INVENTION 1.1) Field of the Invention

This invention relates generally to the field of startup recruitment.

1.2) Background

According to the article “The Importance of Young Firms for EconomicGrowth” by Jason Wiens and Chris Jackson, new and young companies arethe primary source of job creation in the American economy. In fact,companies that are less than one-year-old have created an average of 1.5million jobs per year over the past three decades. Moreover, from 2006to 2009, young and small firms (fewer than five years old and twentyemployees) were a positive source of net employment growth (8.6percent), whereas older and larger firms eliminated more jobs than theycreated. In addition, young firms provide economic dynamism by injectingcompetition into markets and spurring innovation. However, the rate atwhich new businesses are opening has been steadily declining until 2014.According to Census data, new firms represented as much as 16 percent ofall firms in the late 1970s. By 2011, that share had declined to 8percent. This contributed to the gross number of jobs created by newfirms falling by more than two million between 2005 and 2010.

To reverse this trend, innovation and changes are required to encourageand nurture startups. Startups require people, products, services,plans, equipment, advisors, mentors, etc. and funding is usuallyrequired to pay for these resources. In addition, startups have a lot ofuncertainty that funding can also help mitigate. Funding is thereforerequired to start and maintain the operations of most startups.Entrepreneurs have a number of options for funding including personalfinances, friends and family, accelerators, angel investors, venturecapitalists, debt financing, equity financing, customer financing andgovernment-sponsored programs. However, many potential startups cannotattract the funding or have the knowledge to make progress from the ideastage to product launch. To facilitate this process, a number of startupaccelerators and business incubators have been launched.

According to Forbes incubators and accelerators have become anincreasingly important part of the tech startup scene in recent years.These programs provide new entrepreneurs with mentorship, advice andpractical training on technical, business and fundraising topics to helpthem get from idea to product to launch and beyond. An acceleratorusually provides a small amount of capital and mentorship toentrepreneurs and usually receives less than 10% of the startup'sequity. An accelerator's program typically lasts for three to fourmonths and culminates in a public pitch event or demo day. Conversely,an incubator develops their own business ideas then hires an externalmanagement team to launch and run the business. Incubator startupsusually gestate for much longer periods of time than an accelerator andan incubator typically takes a much larger equity stake than anaccelerator.

The Internet, smartphones and lean startup concepts have dramaticallyreduced the cost to start a company. In addition, the Internet providesunprecedented distribution for startups. After a product is launched onthe Internet, it immediately has access to global markets. Smartphonesallow products and services to be launched as low cost “apps” that canleverage the Internet's low cost global distribution channel. The leanstartup movement further reduces startup costs by focusing limitedstartup resources on the minimal path from idea to successful launch.

However, driving down startup costs from millions of dollars to hundredsof thousands still leaves some entrepreneurs on the sidelines. Theycannot afford resource costs, product development costs, and executioncosts. Many entrepreneurs could bootstrap their startup without havingto raise a significant amount of funding if they had free access to thebroad range of startup resources and the knowledge they need. They needdevelopers, product designers, marketing expertise, businessdevelopment, sales, accounting, legal services, etc. which all typicallydemand compensation making bootstrap strategies almost impossible.

None of these disclosures, or any other prior art, teaches a marketwhere an entrepreneur can bootstrap a startup, by accessing a very largecommunity of subject matter experts on demand, without funding, to helpcomplete almost any task required to execute the startup's businessplan. Also, where startups can pool resources such as negotiating powerand technical sub-components that comprise their solutions to minimizedevelopment costs and can also minimize operating costs by executing aproven lean startup process that focuses scarce resources on the minimumnumber of critical activities required to progress from idea to launch.

Accordingly, there is a need for a bootstrapping market where acommunity of entrepreneurs, suppliers and experienced independentcontractors are organized and reorganized as a temporary crowd to helpaccelerate the launch of each startup; where independent contractorshave an incentive to provide services at little or no cost to thestartup; where the first version of each solution is created fromreusable technical building blocks that are developed and redeveloped bythe startup community; and where a lean startup process is continuallyimproved, and executed by entrepreneurs, and that lean startup processfocuses the scarce resources of each startup on the most efficientactivities required to guide the startup team from idea to launch.

The applicant is not aware of any other commercially viable system thataddresses the shortcomings of the prior art and also includes thefeatures stated above. It is therefore an object of the presentinvention to set forth a system that offers entrepreneurs an option tobootstrap their startup from idea to launch by minimizing costs forresources, product development and lean execution.

It is an object of the present invention to enable entrepreneurs, teammembers and independent contractors, skilled in individual steps in thepreferred lean startup process, to sign up and create a profile thatincludes their needs, preferences and capabilities.

It is yet another object of the present invention to enable anentrepreneur to form a team of permanent and temporary team members thencollaborate to complete each step in the lean startup process.

It is a further object of the present invention to enable entrepreneursto submit a startup idea and for the system administrator to accept orreject that startup.

It is another object of the present invention to enable the systemadministrator to review, assess, score, prioritize and accept startups.

It is a further object of the present invention to provide and update anoptimal lean startup process for startups to execute comprised of apredetermined sequence of deliverables at each step in the lean startupprocess.

It is another object of the present invention to enable eachentrepreneur to modify the default lean startup process to match thespecific needs of their specific startup.

It is another object of the present invention to match startups andindependent contractors, who offer specific subject matter expertise.

It is object of the present invention to enable startups and independentcontractors to search for each other then request and accept offers tocollaborate.

It is a further object of the present invention to enable startups toshare resources and knowledge including sharing reusable subcomponentsof their solutions.

It is yet another object of the present invention to enableentrepreneurs to reward excellent performance by independent contractorsand for independent contractors to reward excellent performance byentrepreneurs.

It is yet another object of the present invention to enableentrepreneurs to run a campaign to raise funds to meet specific startupcosts.

It is an object of the present invention for independent contractors tocomplete work orders to track their effort and for entrepreneurs toapprove those work orders.

It is an object of the present invention to be organized as a fund andprovide a startup the rights to acquire effort and solutions from anymember independent contractor.

It is another object of the present invention to enable independentcontractors to provide a startup the rights to acquire effort andsolutions from any member independent contractor.

It is yet another object of the present invention to enable eachindependent contractor who provides support for a member startup toacquire rights to an interest in the fund and swap those rights.

It is an object of the present invention to enable users to create adiscussion forum to share knowledge on specified topics.

These and other objects of the present invention will be apparent tothose skilled in the art from the following detailed description of thepresent invention, the accompanying drawings and the appended claims.

SUMMARY OF THE PRESENT INVENTION

In a preferred embodiment, the present invention provides a method andapparatus for users to:

Create a fund that helps entrepreneurs access startup resources ondemand.

Create and update the preferred lean startup procedure to bootstrap astartup, comprised of an optimal sequence of startup milestones anddeliverables.

Create a profile that includes key entrepreneur and independentcontractor information including bio, role, target industry, preferredstartup stage, experience, skills, interests, location, conflicts ofinterest, expectations, constraints, notification preferences andavailability.

Submit a startup idea and startup meta data, including bios of existingteam members, stage, status, plans, IP, traction, needs and supportrequired.

Search for startups and search for independent contractors then requestand accept offers to collaborate.

Form a team of permanent and temporary team members.

Collaborate with team members to complete each step in the process ofproduct and service development, marketing, sales and distribution.

Submit work orders for deliverables completed and for entrepreneurs toapprove the work orders.

Receive matching work order credits (bonus work units) for approved workorders that the independent contractor can donate to any member startup.

Receive rights to acquire an interest in the fund for support providedto member startups by member independent contractors.

Share resources among startups, specifically reusable subcomponents thatreduce the time and effort to create a functional prototype.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. The invention itself, however, as well asa preferred mode of use, further objectives and advantages thereof, willbest be understood by reference to the following detailed description ofan illustrative embodiment when read in conjunction with theaccompanying drawings, wherein:

FIG. 1 illustrates a first embodiment of an overview of the presentinvention.

FIG. 2 illustrates a first embodiment of the system architecture of thepresent invention.

FIG. 3 illustrates a first embodiment of the integration among thecentral control system and key components of the present invention.

FIG. 4 illustrates a first embodiment of the technical platform for thecentral control system of the present invention.

FIG. 5 illustrates a first embodiment of the user interface to thepresent invention.

FIG. 6 illustrates a first embodiment of the data storage system (“DSS”)for the present invention.

FIG. 7 illustrates a first embodiment of the business intelligencesystem (“BIS”) of the present invention.

FIG. 8 illustrates a first embodiment of the notification managementsystem (“NMS”) of the present invention.

FIG. 9 illustrates a first embodiment of the encryption system of thepresent invention.

FIG. 10 illustrates a first embodiment of the administration system ofthe present invention.

FIG. 11 illustrates a first embodiment of the workflow procedure for theworkflow management system (‘WMS’) of the present invention.

FIG. 12 illustrates a first embodiment of the sign-up procedure for thepresent invention.

FIG. 13 illustrates a first embodiment of the high level encryptionapproach for the present invention.

FIG. 14 illustrates a first embodiment of the high level authenticationapproach for the present invention.

FIG. 15 illustrates a first embodiment of the high level businessprocedure for the present invention.

DETAILED DESCRIPTION OF THE INVENTION

With reference to the figures, exemplary diagrams of key components ofthe present invention are provided in which illustrative embodiments maybe implemented. It should be appreciated that these figures are onlyexemplary and are not intended to assert or imply any limitation withregard to the components in which different embodiments may beimplemented. Many modifications to the depicted components may be made.

System Overview

In an overview of the first embodiment illustrated in FIG. 1, thepresent invention provides a method and apparatus for entrepreneurs toelicit support from a crowd of independent contractors who perform likean independent workforce of subject matter experts. For example, whenexecuting the lean startup procedure, the entrepreneur may decide todevelop an app. Each member of a group of independent contractors,selected by the entrepreneur, provides a vital role in developing theapp, such as market research, gathering requirements, design,development, testing, etc. The entrepreneur leverages the knowledge ofthe crowd to accelerate ideation, product development, marketing andsales. The entrepreneur leverages this crowd acceleration concept foreach key deliverable, such as a business plan, requirements, design,development, testing, marketing plan, market entry strategy, etc.

The present invention enables a system administrator 101 to sign up andcreate a profile. The system administrator then creates a fund byinputting the terms and conditions that describe the governance rules ofthe fund, the performance expectations of the startup, the benefits forthe stakeholders in the fund and the operating fees for the fund 102.The fund provides a number of work units to each accepted startup thatthe startup can use to attract assistance from independent contractors.

The system administrator creates the default lean roadmap which is thepreferred procedure to start a startup. This preferred procedure iscomprised of the minimal number of activities required to validate thebusiness model, build the minimal viable product then gain the firstcustomers 103. The system operator has worked with a number of startupexperts to determine the preferred procedure (e.g., sequence of leanactivities) to start a startup. The goal of this preferred procedure isto minimize startup costs and accelerate the timeline from idea tocustomer acquisition.

The system administrator then creates and updates match making rules.The match making rules compare the needs of each startup with the skillsand interests of each independent contractor. If a match is identified,then the present invention notifies the matching entrepreneur andindependent contractor 104.

When each user signs up they can create an entrepreneur profile 105. Theentrepreneur inputs a multitude of information, including their bio andinformation about their startup. When each user signs up they can alsocreate an independent contractor profile 106. The independent contractorinputs a multitude of information, including their skills and interests.

The entrepreneur can create a team by inviting independent contractorsto be team members then giving them team member permissions. This is byprivate invitation because the startup is not yet published on thepresent invention 107. The present invention allows team members tocollaborate to create the deliverables specified in the lean startuproadmap. One of these deliverables is an application form that theentrepreneur can submit to apply to become an official published startupon the present invention 108. The application form includes a multitudeof information, including a description of the startup and a summary ofits needs. The system administrator then reviews and accepts theentrepreneur's application 109.

The entrepreneur can search for independent contractors and follow theirposts in the present invention's forums 110. After the systemadministrator accepts a startup 109, its profile becomes visible to allindependent contractors who can search for and follow the startup 111.By following a startup, an independent contractor can see all of itspublic posts. If an independent contractor wants more information abouta startup or an entrepreneur wants more information about an independentcontractor, they can exchange information using a number of means,including chat and messages. They can also save notes about each otherand setup notifications 112. The independent contractor can offersupport to a startup and add the startup to their profile if theentrepreneur accepts 113. Similarly, the entrepreneur can requestsupport from an independent contractor and add the independentcontractor to the extended startup team if that independent contractoraccepts 114. The entrepreneur and the startup team then executes thepredetermined tasks in the lean startup roadmap 115. While executing theroadmap, startups will share knowledge and can share reusablesubcomponents of their solutions, such as reusable websitefunctionality. The independent contractor can recognize extraordinaryperformance by the entrepreneur or by members of the startup team bysubmitting an excellence award 116. The independent contractor cansubmit, to the entrepreneur, a work order for the deliverables completedfor the startup 117. The work order includes the number of work unitsrequired for each deliverable. Each deliverable is a solution to arequirement specified by the startup. The entrepreneur can approve thework order submitted by the independent contractor 118. Similarly, theentrepreneur can recognize extraordinary performance by members of thestartup team by submitting an excellence award 119. The independentcontractor can also submit the approved work order to the fund toreceive rights to acquire an interest in the fund, such as an option toacquire a specific class of share in the future 120. The independentcontractor also receives work order credits (e.g., bonus work units) foreach approved work order that the independent contractor can donate toany startup that has been accepted by the fund 121. Any accepted startupcan give bonus work units to an independent contractor after theentrepreneur approves one or more deliverables completed by thatindependent contractor. The entrepreneur can also run a campaign toraise money for the startup from the fund or from accredited investors122. The entrepreneur must include campaign documentation that includesdetails about the campaign including how the funds will be used. TheSystem Administrator can upload offerings from suppliers into theshopping cart 123. The startup can use the proceeds raised by thecampaign, or proceeds from any other sources, to meet specified startupexpenses 124 including paying for offerings from suppliers.

The system administrator maintains the app and the web site 125. Thisincludes updating the user interface, adding new features, monitoringand improving system performance, configuring the system, making systembackups, resolving system issues, developing and implementing systempolicies and procedures, generating system reports, updating systemdocumentation, etc. Independent contractors can input and update theirinterests in their profile. They can also create, edit and delete forums126. A forum is a bulletin board where users can add a series ofcomments and responses. Each forum has a specific topic and theconversation can be moderated by the user who creates the forum.

System Context

FIG. 2 illustrates the system context of a first embodiment of theapparatus and method of the present invention.

The central control system (“CCS”) 201 is operatively coupled to aplurality of other systems and user interfaces. Operative coupling isthe preferred procedure to exchange information between systems. In thepresent invention, the systems are inter-connected via a combination ofwide area networks including the public switched telephone network,local area networks, such as an Ethernet network, token ring networksand wireless networks. Most systems, such as modern computers, include abuilt in interface to a local network, such as an Ethernet or 802.11bwireless network. The communications protocol used by these networksfollow an international standard, such as 802.11b, that enables thesesystems to exchange data using a pre-determined method. However, localarea network connectivity only ensures the integrity of data transfer.It is also necessary to specify the information to transfer, its sourcelocation and its intended location in the destination system. Eachsystem has its key information stored in pre-determined locations in itsdatabase. When the installation engineers configure the interfacebetween two systems they specify the pre-determined location of therequired information in the source system's database and thepre-determined location for that information in the destination system'sdatabase. The engineers also specify the pre-determined frequency ofinformation transfer (e.g., continuous, every day at 10:00 PM PT), thepre-determined format to use (e.g., synchronous, flat file ExtractTransform Load “ETL”) and the pre-determined error checking protocol touse. The combination of network connectivity and the configuration ofthe communication method by installation engineers enable systems to beoperatively coupled to the CCS.

-   -   The user interfaces are operatively coupled to the CCS 201. The        different types of users access the CCS through a plurality of        user interfaces. The user interfaces include the system        administrator interface 202, the entrepreneur interface 203, the        team member interface 204, the independent contractor interface        205 and the supplier interface 206 (collectively “the user        interfaces”). The user interfaces are the input and output        gateways for communications with the CCS 201.    -   The data storage system 207 is operatively coupled to the CCS.        The data storage system stores the plurality of data used by the        present invention.    -   The business intelligence system 208 is operatively coupled to        the CCS. The business intelligence system calculates and stores        a plurality of information about trends, patterns and        relationships in the databases used by the present invention.    -   The notification management system 209 is operatively coupled to        the CCS. The CCS sends an alert to the notification management        system whenever an event occurs that requires the attention of a        user or other entity. For example, after an independent        contractor offers support to a startup the CCS will instruct the        notification management system to alert the relevant        entrepreneur by sending an email, text message or alternative        notification.    -   The encryption system 210 is operatively coupled to the CCS. The        encryption system enables a symmetric encryption key, public        encryption key and private encryption key to be generated for        each user or transaction. It also provides an algorithm that is        used to encrypt and decrypt information. It supports a multitude        of encryption techniques including symmetric encryption that        uses the same key to encrypt and decrypt information as well as        asymmetric encryption that uses a public encryption key to        encrypt information and a private encryption key to decrypt the        same information.    -   The authentication system 211 is operatively coupled to the CCS.        The authentication system enables a user to authenticate whether        they have rights to access secure information.    -   The payment processor system 212 is operatively coupled to the        CCS. The payment processor system enables payments to be        transferred from buyer to seller. A number of service providers        offer payment processor systems that can be used by the present        invention, such as WePay and Stripe.    -   The administration system 213 is operatively coupled to the CCS.        The administration system enables a user to administer the CCS.        For example, the system administrator can use the administration        system to update the look, feel and content of the web and        mobile interfaces. The administration function also provides        forum services that support community discussions and enables        technical support and maintenance functions for the present        invention.    -   The workflow management system 214 is operatively coupled to the        CCS. The workflow management system enables the system        administrator to create and evolve the default lean startup        roadmap. It also allows entrepreneurs to customize the lean        startup roadmap to meet the unique needs of their startup.    -   The messaging system 215 is operatively coupled to the CCS. The        messaging system enables users to exchange communication        messages in real time. For example, an entrepreneur can send a        question to an independent contractor and that independent        contractor can respond immediately. In addition, multiple team        members and independent contractors can participate in a group        conversation using real time messaging where they can exchange        communications in multiple formats including text and files.    -   The forum system 216 is operatively coupled to the CCS. The        forum system enables users to create a bulletin board where        multiple users can exchange communication messages about a topic        specified by the user who created the forum. For example, an        entrepreneur may be facing a challenge related to encryption.        That entrepreneur can create a forum to explain the challenge.        Independent contractors with the relevant expertise can respond        with information to help resolve the challenge. Forums allow        users to exchange information in multiple formats including text        and files. Web hosts such as GoDaddy and Host Gator provide        forum solutions that can be used by the present invention. For        example, GoDaddy's Website Builder solution supports forums.        Other forum software solutions that can be used by the present        invention include MyBB, pphbb and punbb.    -   The recruitment system 217 is operatively coupled to the CCS.        The recruitment system enables users to setup skills based        questionnaires. Those questionnaires can be comprised of        multiple choice questions that facilitate both self-service        interviews and automated scoring of the answers. Alternatively,        non-multiple choice questions can be scored manually or a third        party natural language artificial intelligence procedure can be        used to score the answers. After each interview, the scores are        summarized into a percentage of the total possible score for        each skill in a skills summary. Clients can compare the skills        summary for an interviewee with the target skills profile for        the available job to facilitate hiring recommendations.    -   The artificial intelligence system 218 is operatively coupled to        the CCS. The artificial intelligence system understands a        natural language statement and makes a response to that        statement based upon at least a partial interpretation of the        statement. The recruitment system presents a question, the        interviewee offers an answer, the artificial intelligence system        understands the answer enough to match it with a database of        answers then makes a response usually in the form of a score. A        number of artificial intelligence systems are available that can        meet the needs of the present invention such as the one taught        in U.S. Pat. No. 4,670,848A.

FIG. 3 illustrates the network connectivity of a first embodiment of theapparatus and method of the present invention.

The user interfaces 301 include a computer 302 and a modem 303. Manycompanies make mobile and desktop computers that a user can use toaccess the CCS including Apple, Samsung, Hewlett Packard, and Toshiba.In addition, many companies make modems that can connect to the CCSincluding 3Com Corp., D-Link Systems, Inc., and US Robotics. The user'scomputer is connected to the CCS via the modem and a Global Network 304,such as the Internet. The user's modem can be connected to the GlobalNetwork using at least one of a plurality of services including publicor private networks such as the public switched telephone network,dedicated data line, cable service, cellular service, WiFi service,personal communication system (“PCS”), satellite network, and amicrowave connection. These types of connections are provided by aplurality of organizations including local and regional telephoneoperating companies, cable TV companies and other providers of privateand public networks.

The CCS 305 includes a local area network 308 that is connected to theglobal network 304 via a network interface unit (“NIU”) 307 and afirewall 306. The CCS is also connected to other systems via the localarea network 308 including the Data Storage System 309, BusinessIntelligence System 310, Encryption System 311, Authentication System312, Administration System 313, and the Workflow Management System 314.

The CCS 305 also includes a Virtual Private Network (“VPN”) modem 316that is connected to the Secure Notification System 321 and the PaymentProcessor System 323. Many companies make VPN modems that can be usedwith the present invention including Netgear, Linksys and Cisco. TheSecure Notification System 321 is connected to the CCS via the GlobalNetwork using a Virtual Private Network modem 320. In addition to theSecure Notification System 321, the Notification Management System 317includes a Public Notification System 319. The Public NotificationSystem 319 is connected to the Global Network using a Network InterfaceUnit 318. The preferred embodiment of the present invention can use aplurality of Public Notification Systems including email services andmobile services. The present invention can operate with many such emailservices including Yahoo, Hotmail and Gmail. Many organizations providesuch email services including Yahoo, Microsoft and Google. The PaymentProcessor System 324 includes a Payment Processor Service 323 that isconnected to the Global Network via a VPN modem 322. Many organizationsprovide such Payment Processor Services that can be used with thepresent invention including Paypal, Western Union, WePay, Stripe andVerisign.

FIG. 4 illustrates the key components of the CCS in a first embodimentof the apparatus and method of the present invention.

The Central Control System (“CCS”) includes a number of key componentsincluding the main hardware 401, the operating system 402, softwareapplications 403, input devices 404 and output devices 405. Theoperating system 402 is the interface between the applications and thehardware. It controls the execution of computer applications andprovides services to those applications. The preferred embodiment of thepresent invention can use one of a plurality of standard commercialoperating systems, such as Microsoft windows, Linux and UNIX. Theapplications 403 include software tools such as commercial anti virussoftware available from companies such as McAfee and Norton, and abrowser, such as Microsoft Internet Explorer, Chrome and Firefox. TheCCS also includes some unique code that implements some of its uniquefunctions described in this disclosure, such as coordinating datainterchange among the different systems illustrated in FIG. 2. Thisunique code can be programmed using one or more standard programminglanguages including java, javascript, PHP, HTML, C, C+, and visualbasic. Input devices 404 include a plurality of commercial options suchas a smartphone, keyboard, a camera, a mouse, and a microphone. Outputdevices 405 include a plurality of commercial options such as asmartphone, monitor and speakers. These standard commercial inputdevices 404 and output devices 405 are available from a plurality ofvendors such as CompUSA and Office Depot.

The main hardware 401 in the CCS can be a conventional smartphone orpersonal computer or a conventional server with sufficient memory andprocessing power. To one skilled in the art, it will be evident that thefunctionality of the CCS can be distributed over multipleinter-connected smartphones, multiple inter-connected personal computersor multiple inter-connected servers. The main hardware includes a numberof key components including the central processing unit (“CPU”) 406,clock 407, local bus 408, expansion bus 409, read only memory (“ROM”)410, dynamic random access memory (“DRAM”) 411, power management unit412, output management unit 413, network interface card 414 andcryptographic unit 415.

The central processing unit (“CPU”) 406 is the component of the CCS thatperforms most of the data processing. It interprets instructions,performs logical and arithmetic operations on data, and controls inputand output functions. The preferred embodiment of the present inventioncan use a commercial CPU from a plurality of vendors, such as a PentiumG3258 supplied by Intel and the FX-9590 supplied by AMD. The clock 407regulates the rate at which the CPU processes instructions. The CCS alsouses the clock to synchronize the operation of its key components. A CPUsuch as a Pentium G3258 can operate at a clock speed of 3.2 GHz. The CCSuses the local bus 408 to inter-connect its key components. These keycomponents exchange data via the local bus. The CCS uses the expansionbus 409 to enable expansion cards to exchange data with the CPU andmemory. Examples of commercial expansion cards are sound cards andgraphics cards. The expansion bus also enables input devices 404, suchas a mouse, to input data that can be used by the key components of theCCS. The read only memory (“ROM”) 410 includes the instructions that theCPU executes to perform its basic operations. The vendor of the computerplatform that comprises the hardware component of the CCS provides theinstructions that are stored in the ROM. When the CCS's power is removedthen restored, the instructions in the ROM remain unchanged. The dynamicrandom access memory (“DRAM”) 411 includes instructions that the CPUexecutes to perform selected tasks. The DRAM also stores the data thatis used by the instructions executed by the CPU. When the CCS's power isremoved then restored, the information in the DRAM is lost. The CCS usesthe power management unit 412 to supply and regulate the power requiredto operate the key components of the CCS. The CCS uses the outputmanagement unit 413 to interface with output devices, such as a monitor.The CCS uses the network interface card (“NIC”) 414 to interface withexternal networks, including an Ethernet network, public switchedtelephone network and a wireless network. The CCS uses the cryptographicunit 415 to support secure communications with external systems, such asthe payment processor system and secure notification management system.The vendor of the computer platform, which is used by the CCS, providesthe local bus, expansion bus, ROM, DRAM, power management unit, outputmanagement unit, network interface card, clock, CPU and cryptographicunit. Specific components, including the NIC, can be obtained fromalternate commercial vendors including CompUSA and Office Depot.

FIG. 5 illustrates the key components of the user interface in a firstembodiment of the apparatus and method of the present invention.

In a preferred embodiment of the present invention the user interfacedevice 301 is a conventional personal computer that includes, the mainhardware 501, the operating system 502, software applications 503, inputdevices 504 and output devices 505. The main hardware 501 in the userinterface device includes a number of key components including thecentral processing unit (“CPU”) 506, clock 507, local bus 508, expansionbus 509, read only memory (“ROM”) 510, dynamic random access memory(“DRAM”) 511, power management unit 512, output management unit 513,network interface card (“NIC”) 514 and cryptographic unit 515. Thesecomponents are substantially the same as the similarly named componentsin the CCS as illustrated in FIG. 4. They also perform substantially thesame functions and are available from the same vendors. The keydifferences are that the components in the CCS have higher performancerequirements than the equivalent components in the user interfacedevice. In addition, the user interface device includes, commercialsoftware applications such as a word processor application and graphicaldesign application. An example of a word processor application that canbe used by the present invention is Microsoft Word. An example of agraphical design application that can be used by the present inventionis Microsoft Visio. Examples of higher performance components for theCCS are a faster clock speed, a more powerful CPU and higher capacityDRAM.

FIG. 6 illustrates the key components of the Data Storage System in afirst embodiment of the apparatus and method of the present invention.

The data storage system 207 is a conventional hard disk drive thatincludes non-volatile, magnetic-based hard disk storage that storesdigitally encoded data. The data is retained in the data storage systemafter power is removed then restored. A plurality of suppliersmanufacture data storage systems that can be used by the presentinvention including EMC, Western Digital, Seagate, Maxtor, and Hitachi.The data storage system is comprised of a plurality of databases thatare described below. The present invention can use one of a plurality ofdatabase systems to house the databases including Oracle and SQLdatabase systems. The CCS stores the data in the Data Storage System inan encrypted format.

-   -   The CCS uses the CCS database 601 to store information about how        users are using of the CCS. The CCS database contains a        plurality of fields including a unique reference key for each        record in the CCS database, the unique reference key of each        user who has logged into the CCS and tracking information about        the functions of the CCS used by each user during each login        session.    -   The CCS uses the administration database 602 to store        information about the website, the mobile website, and the        mobile application for the CCS as well as information about the        maintenance and support of the CCS. The administration database        contains a plurality of fields including a unique reference key        for each record in the administration database, the type of        information, the actual information, and corresponding meta        data.    -   The CCS uses the entrepreneur database 603 to store information        about entrepreneurs. For each entrepreneur, the entrepreneur        database contains a plurality of fields including a unique        reference key for each record in the entrepreneur database, the        entrepreneur's identifier, location, contact phone numbers,        email address, login credentials for the CCS and information        about the entrepreneur's symmetric encryption key, public        encryption key, and private encryption key. This information        does not give the CCS access to the actual encryption keys.    -   The CCS uses the team member database 604 to store information        about team members. For each team member, the team member        database contains a plurality of fields that include a unique        reference key for each record in the user database, the team        member's identifier, location, contact phone numbers, email        address, login credentials for the CCS and information about the        team member's symmetric encryption key, public encryption key,        and private encryption key. This information does not give the        CCS access to the actual encryption keys.    -   The CCS uses the independent contractor database 605 to store        information about independent contractors. For each independent        contractor, the independent contractor database contains a        plurality of fields that include a unique reference key for each        record in the user database, the independent contractor's        identifier, location, contact phone numbers, email address,        login credentials for the CCS and information about the        independent contractor's symmetric encryption key, public        encryption key, and private encryption key. This information        does not give the CCS access to the actual encryption keys.    -   The CCS uses the supplier database 606 to store information        about suppliers. For each supplier, the supplier database        contains a plurality of fields that include a unique reference        key for each record in the supplier database, the supplier's        unique identifier or name, location, contact phone numbers,        email address, login credentials for the CCS and information        about the supplier's symmetric encryption key, public encryption        key, and private encryption key. This information does not give        the CCS access to the actual encryption keys.    -   The CCS uses the startup database 607 to store information about        each startup. The startup database contains a plurality of        fields including a unique reference key for each record in the        startup database, the name of the startup, the type of startup,        the product and services, the industry, the target market, the        current status, a unique reference key for the entrepreneur and        team members and suppliers, and a unique reference key for the        lean roadmap.    -   The CCS uses the audit database 608 to save and archive        transactional information about CCS activities such as        collaboration requests between entrepreneurs and contractors.        The audit database contains a plurality of fields including a        unique reference key for each record, information about each        activity performed by the CCS, the time that the activity        occurred, and the unique reference key of the person who        initiated the activity.    -   The CCS uses the terms and conditions database 609 to store a        plurality of terms and conditions including terms and conditions        of the fund, terms and conditions of use, and terms and        conditions between each startup and each supplier. The terms and        conditions database contains a plurality of fields including a        unique reference key for each record, the unique reference key        for the corresponding first entity, the unique reference key for        the corresponding second entity, date and time stamp, and the        actual terms and conditions.    -   The CCS uses the lean roadmap database 610 to store information        about each startup's lean roadmap. The lean roadmap database        contains a plurality of fields including a unique reference key        for each record, a name for the lean roadmap, a description of        the lean roadmap, the unique reference key for the corresponding        startup uses that lean roadmap, and the sequence of steps in the        lean roadmap description.    -   The CCS uses the matching rules database 611 to store        information about the matching rules that the present invention        uses to match startups and contractors. The matching rules        database contains a plurality of fields including a unique        reference key for each record, a name for the matching rule, a        description of the matching rule, the business intelligence        system algorithm used to match startups and contractors, and a        date and time stamp for matching rule.    -   The CCS uses the work order database 612 to store information        about each work order submitted by a team member. The work order        database contains a plurality of fields including a unique        reference key for each record, the unique reference key for the        startup, the unique reference key for the contractors, the        contractor's rate, and the number of work units, a time stamp,        deliverable, requirement, solution, solution approval and        feedback.    -   The CCS uses the excellence awards database 613 to store        information about each excellence award. The excellence awards        database contains a plurality of fields including a unique        reference key for each recipient of the award (e.g.,        entrepreneur or team member), the unique reference key for the        person who submitted the award (e.g., entrepreneur or team        member), the description of the activity that earned the award,        and the date and time stamp for the award.    -   The CCS uses the notification and messaging database 614 to save        and archive information about notifications and messages. The        notification database also stores links to templates for the        different types of notifications. A notification is a message        sent to a user to inform that user that an event has occurred,        such as the completion of a deliverable. For each notification,        the notification database contains a plurality of fields        including a unique reference key for each record, the type of        event that has caused the notification (e.g., an offer), the        unique reference key for the event that has caused the        notification (e.g., the unique reference key for a specific        order), the type of template to use for the notification, the        unique reference key for the user to be notified (e.g., unique        reference key for the vendor), the date and time of the event        that caused the notification, the date and time that the        notification was sent, the title of the notification, the        message within the notification, the unique reference key for        each user who shall receive a carbon copy of the notification        and the unique reference key for each user who shall receive a        blind copy of each notification.    -   The CCS uses the encryption database 615 to store information        about the symmetric encryption keys, private encryption keys,        and public encryption keys. The encryption database contains a        plurality of fields including a unique reference key for each        record, the unique reference key for each user and information        about the encryption keys. This information does not give the        CCS access to the actual encryption keys.    -   The CCS uses the workflow management database 616 to store        information about different workflows, such as the lean startup        roadmap. The workflow management system has its own database        that is described below. For each workflow submitted to the CCS,        the workflow management database contains a plurality of fields        including a unique reference key for each record, a name for the        workflow, a description of the workflow, the steps in the        workflow and the unique reference key for the type of workflow.    -   The CCS uses the campaign database 617 to store information        about fund raising campaigns. The campaign database contains a        plurality of fields including a unique reference key for each        record, the name of the campaign, a description for the        campaign, the unique reference key for the corresponding        startup, links to information that supports the campaign, the        terms and conditions for the funds, the timeframe for the        campaign, the total amount of money required, the proposed use        of the funds and timeframe and benefits, the amount of money        pledged so far and the users people who pledged the funds.    -   The CCS uses the payment processor database 618 to store        information about payments between buyers and sellers on the        platform. The payment processor system has its own database that        is described below. However, each payment that is submitted to        the CCS is stored in the payment processor database. For each        payment submitted to the CCS, the payment processor database        contains a plurality of fields including a unique reference key        for each record, the user's payment credentials, the amount of        the payment, the payment method, the type of transaction, the        date and time that the payment was submitted, whether the        payment was accepted or rejected and the date and time that the        payment was confirmed or rejected. Payments can be for a number        of purposes included payments from users to the system operator        for services provided, payments from startups to suppliers and        payments from service providers to the system operator.    -   The CCS uses the messaging database 619 to save and archive        messages. The messaging database also stores links to templates        for the different types of messages. A message is a        communication from one user to another user or a note saved by a        user. For each message, the messaging database contains a        plurality of fields including a unique reference key for each        record, the unique reference key for messaging thread (e.g.,        text messaging between an entrepreneur and a contractor), the        sequence in the thread for the message, and the date and time        for the message.    -   The CCS uses the forums database 620 to store information about        forums. The forums database contains a plurality of fields        including a unique reference key for each record, the name of        the forum, the purpose of the forum, the topic, and the audience        who can see the forum and participate.

FIG. 7 illustrates the key components of the Business IntelligenceSystem in a first embodiment of the apparatus and method of the presentinvention.

The Business Intelligence System 208 is operatively coupled to the CCS.Many companies supply business intelligence systems that can be used bythe present invention including Microstrategy and Oracle. The CCS usesthe business intelligence system to analyze data stored in the pluralityof databases that comprise the data storage system 207. The purpose ofthe analysis by the business intelligence system is to identify trends,patterns and relationships that may be hidden in the data stored in thedata storage system.

The present invention uses a commercial Business Intelligence System 208that is illustrated in FIG. 7. It includes a plurality of modulesincluding an extract, transform and data load “ETL” module 701, a datawarehouse module 702, an analytic tools module 703, a data mining module704, a reporting tools module 705 and a presentation layer module 706.The main purpose of a business intelligence system is to enableorganizations to capture, process and analyze vast amounts of data froma plurality of sources then identify trends, patterns and relationshipsthat can facilitate business decision-making.

-   -   The ETL module 701 is the interface between the Business        Intelligence System and the CCS. The main purpose of the ETL        module is to transfer data from the CCS to the data warehouse.        Using ETL tools to operatively couple a system, such as the        Business Intelligence System, to the CCS is explained above in        the description of FIG. 2.    -   The data warehouse module 702 is a database built in a        commercial storage system substantially the same as the data        storage system described in FIG. 6. The data warehouse module        contains a copy of a pre-determined subset of the total data        that is available in the data storage system 207. The system        administrator user specifies the data in the data storage system        that the system administrator wants to use for business        analysis. The installation engineer configures the ETL module to        extract that pre-determined data from the source database in the        data storage system, then configures the ETL module to transform        that data into a format that is compatible with the data        warehouse, then configures the ETL module to load the        transformed data into the pre-determined database locations in        the data warehouse module. The installation engineer also        configures the ETL module to repeat this extract, transform and        data load procedure periodically. Many vendors offer commercial        data warehousing solutions including Hyperion, Microstrategy and        Oracle.    -   The analytic tools module 703 includes standard on-line        analytical processing (“OLAP”) functionality. OLAP software        enables users to create various views and representations of        data in the data warehouse. OLAP functionality enables the        system administrator user to access, analyze and model business        issues and share the information that is in the data warehouse.        Many vendors offer commercial data warehousing and OLAP        solutions including Hyperion, Microstrategy and Oracle. The OLAP        council creates OLAP standards.    -   The data mining tools module 704 enables the system        administrator user to discover trends, patterns and        relationships in the data stored in the data warehouse module.        Data mining software is designed to analyze large volumes of        data using sophisticated data search techniques then apply        statistical methods to discover trends, patterns and        relationships in the data. Many vendors offer commercial data        mining software including Baan Software, Oracle, SAP, Sybase and        Tableau Software. The Data Mining Group is an independent,        vendor led consortium that develops data mining standards.    -   The reporting tools module 705 enables the system administrator        user to create reports that display the data stored in the data        warehouse as well as information that illustrates the trends,        patterns and relationships in the data stored in the data        warehouse module. Many vendors offer commercial reporting        software including Business Objects, Cognos, Crystal Reports and        Microstrategy.    -   The presentation layer module 706 includes graphics and        multimedia interfaces that enable information and reports to be        displayed in a user-friendly manner. The reporting tools        described above all include a presentation layer module.

FIG. 8 illustrates the key components of the notification managementsystem in a first embodiment of the apparatus and method of the presentinvention.

The notification management system 209 is operatively coupled to theCCS. The purpose of the notification management system is to send anotification whenever an event occurs that requires the attention of auser. The CCS sends a notification message via the notificationmanagement system to inform the recipient of the notification that a keyevent has occurred such as a payment has been made. The systemadministrator user configures the notification management system tomonitor a plurality of other events then alert the pre-determined userwhen the specific event occurs.

FIG. 8 illustrates the Notification Management System used by thepresent invention. This Notification Management System includes aplurality of modules including a notification template editor 801, anotification configuration settings module 802, a notification templatedatabase 803, at least one public email system 804, at least one othernotification system 805, a secure email system 806, a virtual privatenetwork (VPN) 807 and a wide area network 808.

-   -   The notification template editor 801 is a standard commercial        word processor that the system administrator user can use to        draft notification templates. The system administrator user then        saves those templates into the notification template database        803. The system administrator inserts bookmarks into the        notification template where information must be added to convert        the template into an actual notification message. For example,        the system administrator inserts a bookmark for the notification        address (such as an email address) of the pre-determined user to        whom the notification shall be sent.    -   The system administrator user uses the notification        configuration settings module 802 to configure and enable the        notifications. For example, in one embodiment of the present        invention the system administrator user will configure a        notification to be sent whenever a key lean roadmap deliverable        is completed. The configuration information will include a        plurality of information including the event (e.g., a completed        deliverable), the contact information for the user to be        notified, the title of the notification, information about the        deliverable, and related meta data.    -   The notification template database 803 is used to store        notification templates. For each notification template, the        notification template database contains a plurality of fields        including a unique reference key for each record, the unique        reference key for the type of event for which the notification        template shall be used, the title of the event, the standard        message in the notification, the unique reference key for each        user who shall receive the notification, the unique reference        key for each user who shall receive a carbon copy of the        notification and the unique reference key for each user who        shall receive a blind copy of the notification. When a        predetermined event occurs, the CCS will identify the        predetermined users to whom the notification shall be addressed,        the predetermined users who shall receive a copy of the        notification and the predetermined users who shall receive a        blind copy of the notification. The CCS passes this information        and a plurality of other information, such as the predetermined        template to use for the specific event, to the notification        management system that extracts information from the        notification and messaging database 614 to fill in the blanks in        the predetermined notification template.    -   The public email system 804 enables users to receive        notifications from the CCS by email. It also enables users to        send emails to the CCS. A plurality of public email systems are        available to users including yahoo mail, hotmail, and gmail.        When a user registers with the CCS, that user must input an        email address that the CCS will use to send notifications.    -   To one skilled in the art, it will be evident that the CCS can        use other notification systems 805 to notify users that an event        has occurred. Other possible notification systems include        instant messaging, text messages, telephone service, and        wireless services. When the user registers with the CCS, the        user can input their contact information for their alternative        notification systems.    -   The secure email system 806 enables users to receive secure        notifications from the CCS by email. It also enables users to        send secure emails to the CCS. A plurality of vendors provide        secure email services, such as Zix mail. When a user registers        with the CCS, the CCS will give that user a secure email        address. The CCS is connected to the secure email system by a        virtual private network (VPN) 807. Commercial telephone        companies such as Verizon provide virtual private networks.        These VPN circuits provide more security than a regular        telephone circuit. The other components of the notification        management system are interconnected by a combination of wide        and local area networks 808. Such networks are described above        in the discussion of FIG. 3.    -   When an event occurs that requires a notification that does not        include sensitive information, the CCS will send the        notification to the user's secure email address and also to the        user's public email address. When an event occurs that requires        a notification that does include sensitive information then the        CCS will send the notification to the user's secure email        address. The CCS will also send a different notification to the        user's public email address informing that user that a secure        notification message has been sent to that user's secure email        address. The user will then log in to the CCS to access the        secure notification.

FIG. 9 illustrates the key components of the Encryption System which isoperatively coupled to the Central Control System. The Encryption Systemused by the present invention is comprised of a plurality of modulesincluding a certificate authority service 901, a certificate creationsystem 902, a symmetric encryption key encryption system 903, anasymmetric key encryption system 904, encryption algorithms 905, anencryption algorithm processor 906, and an encryption database 907.

-   -   The certificate authority service 901 is independent of both        users who want to communicate. However, it is a source that is        trusted by both users and confirms that they both are who they        say they are. In addition, the certificate authority service        provides the public encryption keys to each user. In summary,        the certificate authority service authenticates the users and        the fact that the authorization has not been altered.    -   Authentication is used with encryption to create a secure        communication environment. Standard authentication systems        include user name and password, pass cards that use a magnetic        strip similar to that on a credit card, smart cards that have an        embedded chip, and digital signatures based on the Digital        Signature Standard (DSS) that uses the Digital Signature        Algorithm (DSA). More modern forms of encryption use biometrics        for authentication. Biometrics use biological information to        verify a user's identity. Biometric authentication methods        include fingerprint scans, retina scans, face scans and voice        identification. Biometric authentication eliminates many of the        risks associated with not knowing who is using an authenticated        input or output device. Biometric authentication therefore        provides an additional level of security over device level        authentication for secure personal communications.    -   The certificate creation system 902 generates a certificate for        each user in the form of a piece of code, or a large number,        that says that the user is trusted by the certificate authority.        When the entrepreneur, for example, sends an order to a        supplier, that entrepreneur also sends his public encryption key        and certificate to the supplier, to validate three things: 1)        that the certificate comes from a trusted party; 2) that the        certificate is currently valid; and 3) that the certificate has        a relationship with the present invention.    -   The symmetric key encryption system 903 generates a secret code        for each user. The encryption system uses this secret code, or        encryption key, to encrypt information. Modern encryption        systems use the advanced encryption standard (AES), which uses        128-, 192- or 256-bit encryption keys. These create more than        2¹²⁸ possible key combinations for the encryption key. For a        hacker trying to guess the encryption key, this is like trying        to find one specific grain of sand in the Sahara Desert. It        would take a hacker so long to guess the correct key combination        that this encryption standard is considered to be secure for the        foreseeable future. For symmetric key encryption, the same key        is used to encrypt and decrypt a message. The use of symmetric        encryption keys and asymmetric encryption keys in the present        invention is described below.    -   The asymmetric key encryption system 904 generates two secret        codes for each user, a public encryption key and a private        encryption key. When a first user wants to send an encrypted        message to a second user but does not want to risk sending the        encryption key then the asymmetric key encryption system is        used. The use of symmetric encryption keys and asymmetric        encryption keys in the present invention is described below. For        example, in the present invention, when the entrepreneur wants        to send a symmetric encryption key to a supplier, that        entrepreneur uses the public encryption key of the selected        supplier to encrypt the symmetric encryption key. The supplier        then uses his or her private encryption key to decrypt the        symmetric encryption key. This is possible because an encryption        algorithm is used where the algorithm, or function “F” is such        that, F(clear symmetric encryption key, buyer's public        encryption key)=encrypted symmetric encryption key and        F(encrypted symmetric encryption key, buyer's private encryption        key)=clear symmetric encryption key. Therefore, by using the        same algorithm (“F”) a user's private encryption key can be used        to decrypt the symmetric encryption key that was encrypted by        the same user's public encryption key (U.S. Pat. No. 8,374,354        B2). One advantage of the present invention is that the        encryption and decryption are performed at the user interface        preferably initiated by biometrics. For confidential        information, the present invention only has access to the        encrypted version of the symmetric encryption key and cannot        decrypt the symmetric encryption key. The symmetric encryption        key is used to encrypt and decrypt the information. In other        systems, encryption is used to secure the transmission of        digital media from the user to the system. This enables        confidential information to be decrypted by the system operator        which creates the risk of hacking supported by rogue employees        of the system operator.    -   A number of encryption algorithms 905 have been created that can        be used by the present invention. Symmetric key encryption        algorithms include The Data Encryption Standard (DES) was        adopted as a U.S. government standard in 1977 and as an ANSI        standard in 1981. Triple-DES is a way to make the DES        dramatically more secure by using the DES encryption algorithm        three times with three different keys, for a total key length of        168 bits. Also called “3DES,” this algorithm has been widely        used by financial institutions and by the Secure Shell program        (ssh). Blowfish is a fast, compact, and simple block encryption        algorithm invented by Bruce Schneier. The algorithm allows a        variable-length key, up to 448 bits, and is optimized for        execution on 32- or 64-bit processors. The algorithm is        unpatented and has been placed in the public domain. Blowfish is        used in the Secure Shell and other programs. Asymmetric key        encryption algorithms include the Rivest Shamir Adleman (RSA)        public encryption key algorithm that can be used for encrypting        and signing data and Elliptic Curve Cryptography (ECC) which        provides similar functionality to RSA for smaller devices like        cell phones. It requires less computing power than RSA. ECC        encryption systems are based on the idea of using points on a        curve to define the public/private encryption key pair. The        present invention can use these and other standard encryption        algorithms.    -   The encryption algorithm processor 906 is the code that is used        to encrypt and decrypt information. The present invention        includes its own code for these purposes and also can use other        code considered to comply with industry standards. By way of        example, sample code that was published by syntx.io includes the        following to encrypt a message using AES as the algorithm    -   public static final String encrypt(final String message, final        Key key, final IvParameterSpec iv) throws        IllegalBlockSizeException,    -   BadPaddingException, NoSuchAlgorithmException,    -   NoSuchPaddingException, InvalidKeyException,    -   UnsupportedEncodingException,    -   InvalidAlgorithmParameterException {        -   Cipher cipher=    -   Cipher.getInstance(“AES/CBC/PKCS5Padding”);        -   cipher.init(Cipher.ENCRYPT_MODE,key,iv);        -   byte[ ] stringBytes=message.getBytes( );        -   byte[ ] raw=cipher.doFinal(stringBytes);        -   return Base64.encodeBase64String(raw);    -   }    -   The same example from syntx.io published the following code to        decrypt the message:    -   public static final String decrypt(final String encrypted,final        Key key, final IvParameterSpec iv) throws InvalidKeyException,    -   NoSuchAlgorithmException, NoSuchPaddingException,    -   IllegalBlockSizeException, BadPaddingException, IOException,        InvalidAlgorithmParameterException {        -   Cipher cipher=Cipher.getInstance(“AES/CBC/PKCS5Padding”);        -   cipher.init(Cipher.DECRYPT_MODE, key,iv);        -   byte[ ] raw=Base64.decodeBase64(encrypted);        -   byte[ ] stringBytes=cipher.doFinal(raw);        -   String clearText=new String(stringBytes, “UTF8”);        -   return clearText;    -   }

It will be evident to one skilled in the art that more robust algorithmsare available for use, can be developed, and can be used by the presentinvention.

The encryption database 907 is substantially the same as the encryptiondatabase 615 in FIG. 6. It stores the encryption information required bythe other modules described above that comprise the encryption system.

FIG. 10 illustrates the key components of the Administration System 213which is operatively coupled to the Central Control System. TheAdministration System used by the present invention is comprised of aplurality of modules including a license database 1001, a settingsdatabase 1002, a user management database 1003, a CMS pages database1004, a transactions database 1005, and a reports database 1006.

-   -   The license database 1001 stores information about which users        are authorized to use the present invention. The license        database contains a plurality of fields including a unique        reference key for each record in the license database, the        unique reference key of each user, and licensing and payment        information for each user.    -   The settings database 1002 stores configuration information for        the present invention.    -   The user management database 1003 stores information about        users. This information includes the type of user, contact        information, and the user's status such as active or inactive.    -   The CMS pages database 1004 stores information about the web        site pages and mobile user interface for the present invention.        This module enables the system administrator to edit the content        on these pages. Example pages include “About Us”, “Frequently        Asked Questions”, “Home”, and the “User Agreement”.    -   The lean roadmap database 1005 stores information about startup        deliverables in the present invention. The lean roadmap database        is substantially the same as the lean roadmap database 610 in        the data storage system 207. The lean roadmap database in the        administration system enables the system administrator to manage        deliverables and resolve issues.    -   The reports database 1006 stores information about reports in        the present invention. These reports help the system        administrator manage the present invention. Example reports        include the amount of the available storage used, peak and        average CPU utilization in system servers, and peak and average        number of users.

FIG. 11 illustrates an overview of the Workflow Management System(“WMS”) in a first embodiment of the apparatus and method of the presentinvention. The Workflow Management System is used to guide the leanroadmap for startups 214 and is operatively coupled to the CCS. Manycommercial WMS options are available that can be used by the presentinvention. However, the present invention uses a modified version of theWMS taught in co-owned application Ser. No. 10/716,747 (Nov. 18, 2003).

-   -   The WMS enables the system administrator to create a workflow        that is the preferred procedure to complete lean startup        activities 1101.    -   The WMS enables the system administrator to modify the workflow        that is the preferred procedure to complete lean startup        activities 1102.    -   The WMS enables the system administrator to save the workflow        that is the preferred procedure to complete lean startup        activities 1103.    -   The WMS enables the system administrator to activate the        workflow that is the preferred procedure to complete lean        startup activities 1104. This activation process makes the        workflow accessible to users.    -   The WMS enables an entrepreneur to start the preferred procedure        to complete lean startup activities 1105.    -   The WMS enables the entrepreneur to open the selected preferred        procedure to complete lean startup activities 1106.    -   The WMS guides the entrepreneur through the preferred procedure        to complete lean startup activities 1107.    -   The WMS saves the information created at each completed step in        the process and also saves drafts for the incomplete steps 1108.        The user can complete the drafts at a later time.    -   The WMS enables the entrepreneur to resume the preferred        procedure to complete lean startup activities until the        procedure is complete 1109.

Preferred Embodiment of the Present Invention

FIG. 12 illustrates the procedure for users to sign-up as members in afirst embodiment of the apparatus and method of the present invention.

-   -   The user accesses the CCS 1201 then selects the sign-up option        1202. The user then accepts the predetermined terms and        conditions of use 1203. The user then inputs the requested user        details 1204. These details include name, contact information,        user name, password and the other meta data specified above for        the user database illustrated in FIG. 6. When the user accesses        the CCS after signing up as a member, that user will have to        input the user name and password to log into the CCS. The CCS        checks the information entered by the user at step 1204 for        completeness. If the information is incomplete 1205, the CCS        will offer the user the opportunity to complete the information        1206. If the user chooses to try again to complete the        information, the CCS returns to step 1204. If the user chooses        not to complete the sign up information, the CCS exits the        sign-up procedure 1207.    -   If the information entered by the user is complete 1205, the CCS        sends a confirmation request to the user 1208. The CCS will send        this confirmation request to the email address entered by the        user at step 1204. The user can also select to authenticate        using a text message rather than an email. The CCS asks the user        to confirm receipt of this request 1209. If the user confirms        receipt of the confirmation request as requested by the CCS, the        CCS will sign-up the user as a member 1210. If the user does not        confirm receipt of the confirmation request, the CCS will        determine whether the predetermined maximum number of reminder        requests have been exceeded 1211. If the CCS has already sent        the predetermined maximum number of confirmation requests, then        the CCS will exit the sign-up procedure 1207. If the CCS has        sent fewer than the predetermined maximum number of confirmation        requests, then the CCS will determine whether the predetermined        wait time has been exceeded before sending another confirmation        request to the user. When the predetermined wait time between        reminders has been exceeded 1212, the CCS will send another        confirmation request to the user 1208. This will return the CCS        to step 1208 in the sign-up procedure.

FIG. 13 illustrates the preferred procedure to send a message from afirst user 1301 to a second user 1302 through the CCS. When the firstuser and second user register on the system they download the CCS frontend application onto their computer 301. The CCS application is createdusing standard programming languages such as java, javascript, PHP,HTML, C, C+, and visual basic. The CCS also gives the first user andsecond user their own symmetric encryption key, private encryption keyand public encryption key as described above for the encryption system.The first user and the second user both use the CCS to make their publicencryption keys available to other users. When the first user wants tosend a message to the second user, the CCS application in the firstuser's computer 301 generates a new symmetric encryption key 1303 forthis transaction. The CCS then uses the second user's public encryptionkey 1304 to encrypt the symmetric encryption key 1305 and create anencrypted symmetric encryption key 1306. The CCS 1307 then transfers theencrypted symmetric encryption key from the first user to the seconduser. The CCS front end application on the second user's computerreceives the encrypted symmetric encryption key 1308 then uses thesecond user's private encryption key 1309 to decrypt the encryptedsymmetric encryption key and recover the symmetric encryption key 1310that was generated by the CCS application on the first user's computerfor this transaction.

The CCS application on the first user's computer also uses the samesymmetric encryption key 1305 to encrypt the target message 1311 andform an encrypted message 1312. The CCS 1307 then transfers theencrypted message from the first user to the second user. The CCS'sfront end application on the second user's computer receives theencrypted message 1313 then uses the second user's symmetric encryptionkey 1310 to decrypt the encrypted message and recover the originalmessage 1314 that was sent by the CCS application on the first user'scomputer. The symmetric encryption key and message cannot be accessed byemployees or partners of the CCS platform which minimizes the risk ofunauthorized decryption.

Asymmetric encryption is slower than symmetric encryption. The CCSapplication therefore uses the public encryption key and privateencryption key to encrypt and decrypt the symmetric encryption keybecause the symmetric encryption key is typically much smaller than theuser's message. This is a secure method for the CCS to transfer thesymmetric encryption key from the first user to the second user. Thissolution also enables the CCS application to use the faster symmetrickey encryption to encrypt and decrypt the target message that istypically much larger than the symmetric encryption key.

FIG. 14 illustrates the preferred procedure to input and output a secureauthorization 1401, such as a prescription for medical products, anauthentication certificate for digital media or a reference file forbiometric authentication. The CCS application on a first user's computergenerates a unique symmetric encryption key 1402 to encrypt eachauthorization message 1403. The CCS front end application on the user'sdevice generates a different symmetric encryption key for each message.The CCS application on the first user's computer then decomposes theauthorization message into a number of subcomponents 1404. A number oftools are available to split a file into subcomponents, such as WinRarand HJSplit. For example, WinRar allows the user to specify the size ofeach subcomponent. The example in FIG. 14, decomposes the message 1404into 5 subcomponents Sub1 1405, Sub2 1406, Sub3 1407, Sub4 1408, andSub5 1409 in that order. It also sets the “last subcomponent flag” to“False” for Sub1 1405, Sub2 1406, Sub3 1407, and Sub4 1408 but sets the“last subcomponent flag” to “True” for Sub5 1409 because Sub5 1409 isthe last subcomponent of message 1404. It also sets the counter=1 forSub1 1405, counter=2 for Sub2 1406, counter=3 for Sub3 1407, counter=4for Sub4 1408 and counter=5 for Sub5 1409. The CCS application on thefirst user's computer randomly selects three computers, Comp412 1414,Comp987 1419, and Comp682 1424, from a predetermined list of membercomputers. Each organization that wants to use this dynamic process todecompose encrypted messages can propose a computer to participate inthe consortium of member computers. After the system administrator vetsthe organization and vets the proposed computer then the vetted computeris added to the list of member computers. The CCS application on thefirst user's computer, writes the first subcomponent 1405 of thedecomposed encrypted authorization message and the counter value(e.g., 1) and the “last subcomponent flag” (e.g., “False”) fromsubcomponent1 (Sub1) to computer 412 (Comp412) 1414. It also writes thesame subcomponent1 (Sub1), counter value and “last subcomponent flag” tocomputer 987 (Comp987) 1419 and the same subcomponent1 (Sub1), countervalue and “last subcomponent flag” to computer 662 (Comp662) 1424.

Computer 412 (Comp412) 1414 then randomly selects another computer fromthe predetermined list of member computers, namely computer 993(Comp993) 1415. Computer 412 (Comp412) 1414 then instructs the CCSapplication on the first user's computer to copy subcomponent2 (Sub2),the counter value (e.g., 2) and the “last subcomponent flag” (e.g.,“False”) 1406 to computer 993 (Comp993) 1415. When Computer 412(Comp412) 1414 makes this request, it increments its own counter by 1(e.g., 1+2=2) to know which subcomponent (e.g., Sub2) to request fromblock 1404 to be sent to computer 993 (Comp993) 1415. Similarly,Computer 987 (Comp987) 1419 randomly selects another computer from thepredetermined list of member computers, namely computer 199 (Comp199)1420. Computer 987 (Comp987) 1419 then instructs the CCS application onthe first user's computer to copy subcomponent2 (Sub2), the countervalue (e.g., 2) and the “last subcomponent flag” (e.g., “False”) 1406 tocomputer 199 (Comp199) 1420. Further, Computer 662 (Comp662) 1424randomly selects another computer from the predetermined list of membercomputers, namely computer 111 (Comp111) 1425. Computer 662 (Comp662)1424 then instructs the CCS application on the first user's computer tocopy subcomponent2 (Sub2), the counter value (e.g., 2) and the “lastsubcomponent flag” (e.g., “False”) 1406 to computer 111 (Comp111) 1425.

Computer 993 (Comp993) 1415 then randomly selects another computer fromthe predetermined list of member computers, namely computer 567(Comp567) 1416. Computer 993 (Comp993) 1415 then instructs the CCSapplication on the first user's computer to copy subcomponent3 (Sub3),the counter value (e.g., 3) and the “last subcomponent flag” (e.g.,“False”) 1407 to computer 567 (Comp567) 1416. When Computer 993(Comp993) 1415 makes this request, it uses its own counter+1 (e.g.,2+1=3) to determine which subcomponent (e.g., Sub3) to request fromblock 1404 to be sent to computer 567 (Comp567) 1416. Similarly,Computer 199 (Comp199) 1420 randomly selects another computer from thepredetermined list of member computers, namely computer 867 (Comp867)1421. Computer 199 (Comp199) 1420 then instructs the CCS application onthe first user's computer to copy subcomponent3 (Sub3), the countervalue (e.g., 3) and the “last subcomponent flag” (e.g., “False”) 1407 tocomputer 867 (Comp867) 1421. Further, Computer 111 (Comp111) 1425randomly selects another computer from the predetermined list of membercomputers, namely computer 573 (Comp573) 1426. Computer 111 (Comp111)1425 then instructs the CCS application on the first user's computer tocopy subcomponent3 (Sub3), the counter value (e.g., 3) and the “lastsubcomponent flag” (e.g., “False”) 1407 to computer 573 (Comp573) 1426.

Computer 567 (Comp567) 1416 then randomly selects another computer fromthe predetermined list of member computers, namely computer 113(Comp113) 1417. Computer 567 (Comp567) 1416 then instructs the CCSapplication on the first user's computer to copy subcomponent4 (Sub4),the counter value (e.g., 4) and the “last subcomponent flag” (e.g.,“False”) 1408 to computer 113 (Comp113) 1417. When Computer 567(Comp567) 1416 makes this request, it uses its own counter+1 (e.g.,3+1=4) to determine which subcomponent (e.g., Sub4) to request fromblock 1404 to be sent to computer 113 (Comp113) 1417. Similarly,Computer 867 (Comp867) 1421 randomly selects another computer from thepredetermined list of member computers, namely computer 188 (Comp188)1422. Computer 867 (Comp867) 1421 then instructs the CCS application onthe first user's computer to copy subcomponent4 (Sub4), the countervalue (e.g., 4) and the “last subcomponent flag” (e.g., “False”) 1408 tocomputer 188 (Comp188) 1422. Further, Computer 573 (Comp573) 1426randomly selects another computer from the predetermined list of membercomputers, namely computer 333 (Comp333) 1427. Computer 573 (Comp573)1426 then instructs the CCS application on the first user's computer tocopy subcomponent4 (Sub4), the counter value (e.g., 4) and the “lastsubcomponent flag” (e.g., “False”) 1408 to computer 333 (Comp333) 1427.

Computer 113 (Comp113) 1417 then randomly selects another computer fromthe predetermined list of member computers, namely computer 123(Comp123) 1418. Computer 113 (Comp113) 1417 then instructs the CCSapplication on the first user's computer to copy subcomponent5 (Sub5),the counter value (e.g., 5) and the “last subcomponent flag” (e.g.,“True”) 1409 to computer 123 (Comp123) 1418. When Computer 113 (Comp113)1417 makes this request, it uses its own counter+1 (e.g., 4+1=5) todetermine which subcomponent (e.g., Sub5) to request from block 1404 tobe sent to computer 123 (Comp123) 1418. Similarly, Computer 188(Comp188) 1422 randomly selects another computer from the predeterminedlist of member computers, namely computer 777 (Comp777) 1423. Computer188 (Comp188) 1422 then instructs the CCS application on the firstuser's computer to copy subcomponent5 (Sub5), the counter value (e.g.,5) and the “last subcomponent flag” (e.g., “True”) 1409 to computer 777(Comp777) 1423. Further, Computer 333 (Comp333) 1427 randomly selectsanother computer from the predetermined list of member computers, namelycomputer 331 (Comp331) 1428. Computer 333 (Comp333) 1427 then instructsthe CCS application on the first user's computer to copy subcomponent5(Sub5), the counter value (e.g., 5) and the “last subcomponent flag”(e.g., “True”) 1409 to computer 331 (Comp331) 1428.

Block1 1410 is a copy of the encrypted authorization message distributedacross five random computers. Block2 1411 is a second copy of theencrypted authorization message distributed across five different randomcomputers. Block3 1412 is a third copy of the encrypted authorizationmessage distributed across five more random computers. None of thecomputers in each block know all of the other computers in the block.For example, Comp993 1415 only knows that Comp567 1416 is the nextcomputer in the chain after itself for Block1. It does not know thatComp113 1417 is the next computer after Comp567 1416. This makes thesolution more secure because a hacker would have to break into manyindependent computers to recover the encrypted information then thathacker would need to figure out how to reconstruct the messages and alsofigure out how to decrypt the information. This additional security isappropriate for the storage of referenceable personal identifiableinformation such as customer biometrics and prescription information.After a pre-determined period of time, one day say, the CCS applicationon the first user's computer randomly selects another computer 1429 froma predetermined list of member computers. The CCS application on thefirst user's computer, writes the first subcomponent of the decomposedencrypted authorization message from subcomponent1 (Sub1), the countervalue (e.g., 1) and the “last subcomponent flag” (e.g., “False”) 1405 tocomputer 772 1429. Similar to above, computer 772 (Comp772) 1429randomly selects another computer from the predetermined list of membercomputers, namely computer 623 (Comp623) 1430 then instructs the CCSapplication on the first user's computer to copy subcomponent2 (Sub2),the counter value (e.g., 2) and the “last subcomponent flag” (e.g.,“False”) 1406 to computer 623 (Comp623) 1430. Similar to above, computer623 (Comp623) 1431 randomly selects another computer from thepredetermined list of member computers, namely computer 327 (Comp327)1431 then instructs the CCS application on the first user's computer tocopy subcomponent3 (Sub3), the counter value (e.g., 3) and the “lastsubcomponent flag” (e.g., “False”) 1407 to computer 327 (Comp327) 1431.Similar to above, computer 327 (Comp327) 1431 randomly selects anothercomputer from the predetermined list of member computers, namelycomputer 449 (Comp449) 1432 then instructs the CCS application on thefirst user's computer to copy subcomponent4 (Sub4), the counter value(e.g., 4) and the “last subcomponent flag” (e.g., “False”) 1408 tocomputer 449 (Comp449) 1432. Similar to above, computer 449 (Comp449)1432 randomly selects another computer from the predetermined list ofmember computers, namely computer 563 (Comp563) 1433 then instructs theCCS application on the first user's computer to copy subcomponent5(Sub5), the counter value (e.g., 5) and the “last subcomponent flag”(e.g., “True”) 1409 to computer 563 (Comp563) 1433. This flag indicatesthat subcomponent5 is the final subcomponent that comprises theauthorization message 1401.

Block4 1413 is a fourth copy of the encrypted authorization messagedistributed across five random computers. The CCS instructs the CCSapplication on the first user's computer to delete Bock 1 1410 bydiscarding subcomponent1 (Sub1) from computer 412 (Comp412) 1414.Computer 412 (Comp412) 1414 then instructs Computer 993 (Comp993) 1415to discard subcomponent2 (Sub2) from computer 993 (Comp993) 1415.Computer 993 (Comp993) 1415 then instructs Computer 567 (Comp567) 1416to discard subcomponent3 (Sub3) from computer 567 (Comp567) 1416.Computer 567 (Comp567) 1416 then instructs Computer 113 (Comp113) 1417to discard subcomponent4 (Sub4) from computer 113 (Comp113) 1417.Computer 113 (Comp113) 1417 then instructs Computer 123 (Comp123) 1418to discard subcomponent5 (Sub5) from computer 123 (Comp123) 1418. In theexample illustrated in FIG. 14, on Day 1 Block1, Block2 and Block3 formthree copies of the decomposed messages. On Day 2, Block4 is created andBlock1 is deleted. This process of creating a new block and deleting anold block continues until the message is no longer required. This causesthe three copies of the decomposed message to keep moving dynamicallythroughout the network of member computers making the information moredifficult to find for a hacker.

In order for the CCS application on the second user's computer (such asa pharmacist reviewing a prescription, an intellectual property userreviewing an authentication certificate or a user authenticating abiometric parameter) to reconstruct the authorization message, the CCSapplication on the first user's computer (such as the prescribing doctoror intellectual property owner) sends a unique authorization identifier(“authorization ID”) to the second user (pharmacist or intellectualproperty user). Alternatively, the first user (e.g., the doctor orintellectual property owner) can give the authorization identifier tothe patient or intellectual property reseller who can forward it to thepharmacist or intellectual property user. The pharmacist or intellectualproperty user uses the unique authorization identifier to request theauthorization (e.g., request the prescription or authenticationcertificate). The CCS verifies the unique authorization identifier thencopies subcomponent1 (Sub1) from computer 772 (Comp772) 1429 to thesecond user's computer 1435. Similarly, computer 772 (Comp772) 1429knows that computer 623 (Comp623) 1430 is the next computer in Block4and instructs computer 623 (Comp623) 1430 to write subcomponent2 (Sub2)to the second user's computer 1436. Similarly, computer 623 (Comp623)1430 knows that computer 327 (Comp327) 1431 is the next computer inBlock4 and instructs computer 327 (Comp327) 1431 to write subcomponent3(Sub3) to the second user's computer 1437. Similarly, computer 327(Comp327) 1431 knows that computer 449 (Comp449) 1432 is the nextcomputer in Block4 and instructs computer 449 (Comp449) 1432 to writesubcomponent4 (Sub4) to the second user's computer 1438. Similarly,computer 449 (Comp449) 1432 knows that computer 563 (Comp563) 1433 isthe next computer in Block4 and instructs computer 563 (Comp563) 1433 towrite subcomponent5 (Sub5) to the second user's computer 1439. Computer563 (Comp563) 1433 knows that it is the final computer in the chainbecause its “last subcomponent flag” is set to “True” indicating thatsubcomponent5 is the final subcomponent that comprises the authorizationmessage 1401. The second user can alternatively reconstruct the messagefrom the computers in Block3 or Block2 in addition to Block4.

The CCS application on the second user's computer then uses the samedecomposition application, such as WinRar or HJSplit, to reconstruct theencrypted authorization message 1440. The CCS application on the firstuser's computer uses the second user's public encryption key 1441 toencrypt the symmetric encryption key 1402. The first user then uses theCCS to send the encrypted symmetric encryption key to the second user.The CCS application on the second user's computer then uses her privateencryption key 1442 to decrypt the symmetric encryption key 1443. TheCCS application on the second user's computer then uses the symmetricencryption key 1443 to decrypt the authorization message 1444.

The example in FIG. 14, illustrates three copies of the authorizationmessage one in each of Block1 1410, Block2 1411 and Block3 1412. In thepresent invention, the number of replicated messages can be reduced to 1or 2 or increased to more than 3 to provide more or less redundancy inorder to match the specific needs of each business requirement.

FIG. 15 illustrates a high level summary of the preferred embodiment ofthe present invention. The system administrator (“System Admin”),entrepreneur and independent contractor each create a profile 1501. Thesystem administrator creates a fund and inputs the terms and conditionsfor the fund 1502. Those terms and conditions specify a number ofconditions including the governance rules of the fund, the performanceexpectations of the startup, the benefits for the stakeholders in thefund and the operating fees for the fund. One of the conditions is thatthe fund provides a number of work units to each accepted startup thatthe startup can use to attract assistance from independent contractors.The system administrator also creates and updates the lean roadmap whichis the preferred procedure to start a startup 1503. This preferredprocedure is comprised of the minimal number of activities required tovalidate the business model, build the minimal viable product then gainthe first customers. The system operator has worked with a number ofstartup experts to determine the preferred procedure (e.g., sequence oflean activities) to start a startup. The goal of this preferredprocedure is to minimize startup costs and accelerate the timeline fromidea to customer acquisition. The system administrator creates andupdates the match making rules 1504. The business intelligence systemuses these rules to compare the goals and needs of startups with theskills and interests of independent contractors. The entrepreneurs andindependent contractors enter this information into their profile. Infact, an individual user can create an entrepreneur profile and anindependent contractor profile 1505. The business intelligence systemuses analysis techniques, such as regression analysis, to identifytrends, patterns and relationships. In this case, the businessintelligence system identifies relationships between the needs ofstartups and the interests of independent contractors to recommendopportunities for collaboration. The success of these collaborations isreflected in the excellence awards that entrepreneurs and independentcontractors provide to each other. The business intelligence system usesthis information as feedback to update the match making rules. Theentrepreneur creates a team and gives team members permissions to accessthe startup's information. The entrepreneur completes the startupapplication and submits that application for evaluation 1506. The systemadministrator reviews and approves the startup's application 1507.Entrepreneurs can search for independent contractors to seek assistanceand independent contractors can seek startups that they would like tohelp 1508. Entrepreneurs and independent contractors then communicateabout how they can work together then make a commitment 1509.Entrepreneurs then specify their requirements, such as a system design,development work, a sales goal, a marketing plan, business development,etc. Independent contractors propose a solution to each requirement andan estimated number of work units to provide the solution 1510. Eachapproved startup receives a number of work units from the fund. Theentrepreneur reviews and accepts the estimate from the independentcontractor 1511. The independent contractor then provides the solutionthat the entrepreneur reviews and then accepts when it meetsexpectations 1512. While completing these deliverables, the startup isexecuting its roadmap with the help of the independent contractor 1513.After the entrepreneur accepts a deliverable that has been completed,the independent contractor submits a work order that specifies thecompleted deliverable and corresponding work units which theentrepreneur reviews and approves 1514. The CCS forwards the approvedwork order to the fund. In return, the CCS makes a matching number ofbonus work units available to the independent contractor which theindependent contractor can donate to any startup 1515. In response tosubmitting an approved work order, the fund also provides an opportunityfor the independent contractor to participate in the fund, including; anoption to acquire a specific class of shares in the fund, an actualclass of shares in the fund, cash, cash equivalents, an asset, barter,debt and convertible debt 1516. Depending on the type of participationafforded the independent contractor, the fund facilitates the exchangeof like kind participation between independent contractors 1517. Theindependent contractor can search for startups that have merit thenoffer bonus work units to a startup 1518. If the startup accepts theoffer then that startup can use the bonus work units to acquire workorder help from any independent contractor 1519. Entrepreneurs cansubmit an excellence award for independent contractors in the form of astar rating with a description of the excellent work. Similarly,independent contractors can submit an excellence award for entrepreneursin the form of a star rating with a description 1520. Entrepreneurs canrun a campaign to raise funds from independent contractors who are alsoaccredited investors 1521. Suppliers can add their offerings to theshopping cart 1522. Examples of offerings include web site hostingservices, laptops for employees and productivity software. Entrepreneurscan use their funds to purchase goods and services from suppliers viathe shopping cart 1523. The system operator will negotiate substantialdiscounts for the startup for the goods and services that are availablein the shopping cart. The system administrator's responsibilities alsoinclude maintaining the app and web site, such as backing up thedatabase and resolving trouble tickets 1524. Users can also create andmoderate forums 1525. A forum will have a topic, such as a startup orspecific roadmap deliverable. These forums will therefore also serve asa knowledge base for the specified topic 1526. The present inventionwill also help startups pool their negotiating power to obtain improvedterms and conditions from suppliers, as well as leverage each other'sassets to minimize costs and time to market.

The present invention also enables users to input, edit and displayinformation about events, including conferences, demo days, meet ups,and webinars. The CCS is the means to manage this information that isstored in the CCS database 601. The CCS is also the means to manageinformation about campaigns that is stored in the Campaigns Database617. Entrepreneurs can use campaigns to raise money but can also usecampaigns to prove interest in their startup by convincing independentcontractors to commit their valuable time in return for equity in one ofthe present invention's funds. These types of campaigns enable theoperator of the present invention to leverage the wisdom-of-the-crowdwhen determining which startups to fund. For example, if an entrepreneurcan convince a large number of respected independent contractors tocommit their time to her startup for “sweat equity” then that startup isdeemed by the operator of the present invention to be more likely tosucceed. By committing their valuable time, these respected independentcontractors are effectively endorsing the startup. Using thisinformation as additional input to improve the selection process issupported by a number of studies which show that the wisdom-of-the-crowdcan be more effective at making decisions under uncertainty than a smallnumber of experts. Consequently, adding the wisdom-of-the-crowd toexpert opinion is expected to increase the success rate for selectingstartups compared with a traditional seed stage venture capitalselection process that relies on expert opinion alone. The presentinvention also enables organizations to create company pages that arestored in the Supplier Database 606. This enables organizations todisplay corporate information including information about their goals,mission, jobs, consulting assignments, projects, products, services,news, events, etc. Organizations that pay for a company page also getaccess to restricted information and services offered by the presentinvention. This includes access to feedback from startups on workassignments completed by independent contractors and the ability ofcompany users to send messages to other users even when those otherusers have not accepted a connection request. Usually, users must sendand accept connection requests before they can send messages to eachother. Of course, users who have not established a formal connectionwith each other can inter-communicate via forums. The present inventionalso enables users to upload, into the CCS database 601, informationabout communal resources that they want to make available for use byother users. This information also includes the conditions of use forthose communal resources. The communal resources include hardware andsoftware, systems and modules, as well as services. Communal resourcesalso include links to useful information, links to informativeaudio/video sources on the Internet and links to information aboutproductivity tools. Opportunities include the option for independentcontractors to sign up to provide services as beta testers, boardmembers, early adopters, endorsers and focus group participants. Theseelections by each user are stored in that user's profile in theContractor Database 605. When an entrepreneur needs a beta tester, boardmember, early adopter, endorser or focus group participant, he cansearch through the list of users who have opted in to provide theseservices. In addition, the business intelligence system is the means tomatch the requirements of the startups with the preferences of theindependent contractors to match supply with demand for these opt inservices. Other opportunities for independent contractors include theability of users to offer communal assets that can be used by otherusers; the option for independent contractors to form ad-hoc teams tobid for projects posted by client companies on their company page; theoption for client companies to post jobs on their company page and forusers to apply for those jobs; and the option for recruiters or hiringcompanies to specify the candidate profile for a target job then thebusiness intelligence system will seek independent contractors thatmatch that profile. In this case, recruiters or hiring companies canspecify the level of proficiency required for each target skill, such ascommunications, technical knowledge, decision making, etc. The businessintelligence system will match the target skills profile with the actualskills profile stored in the Contractor Database 605 for each user. Eachindependent contractor can generate a skills profile by answeringskill-based questions managed by the invention taught in co-owned patentapplication Ser. No. 15/089,553 (Apr. 3, 2016). This invention supportsself-service questionnaires as well as facilitated interviews thatgenerate a skills profile for the interviewee. The CCS is the presentinvention is operatively coupled to the CCS taught in co-owned patentapplication Ser. No. 15/089,553. When an independent contractorcompletes a work activity, or gig, for a startup, the entrepreneurprovides feedback and also provides an excellence award in the form of ascore. This excellence award is a personal work net promoter score,which indicates whether an entrepreneur would recommend that independentcontractor to other entrepreneurs or potential clients and potentialemployers. After a client specifies their skills profile for a targetjob candidate they can also specify the target personal work netpromoter score. Most job sites do not have actual work feedback aboutcandidates or a personal work net promoter score to offer recruiters tosupplement the candidate's standard resume. This is a clear andnon-obvious advantage of the present invention over state of the art jobsites. By way of comparison, the standard recruiting process is to posta job, receive resumes, filter candidates, interview, select then hire.The process offered by the present invention is to specify a targetprofile for a job candidate, automatically filter candidates based onmatching their actual profiles to the target profile then interview andhire. The present invention also enables users to upload and recommendself-improvement and career advancement information to the CCS databasefrom which other users can benefit. This information may include linksto web sites, articles or other sources. Users can like, dislike, followand unfollow these recommendations. This enables users to search fortarget recommendations, filter based on popularity then follow so theycan receive alerts. The present invention also provides a shopping cartthat includes group buying, startup launch deals offered byentrepreneurs, a product service exchange for users, a list ofrecommended suppliers, recommended apps and recommended apps thatoperate on the platform that is the present invention. The group buyingoption is the co-owned Utility Patent U.S. Pat. No. 8,548,868 whichenables one user to write a purchase order for whatever they want to buythen other like-minded users can join their order to increase volumethen suppliers compete in a reverse auction for the high volume purchaseorder.

In summary, a client can use its company page to input a target profilefor a target candidate to hire. This profile can include a list ofskills and the preferred percentage of the maximum possible score foreach skill. Entrepreneurs can input requirements for work to becompleted. Independent contractors can provide a solution, in the formof a work product, to one or more of these requirements. Theentrepreneur can provide feedback in the form of an assessment of thework activity and an assessment of the performance of the independentcontractor in completing the solution to the requirement. This feedbackcan include a personal work net promoter score which is a high levelquantification of the feedback profile. The independent contractor alsocompletes a skills survey using the system taught in co-owned patentapplication Ser. No. 15/089,553 (Apr. 3, 2016). This includesquestionnaires comprised of multiple choice questions, whose answers canbe scored automatically, and questionnaires comprised of non-multiplechoice questions, whose answers require manual scoring or can be scoredby an artificial intelligence procedure or bot. Acceptable bot solutionsare taught in multiple disclosures including U.S. Pat. Nos. 7,249,117B2, 8,818,926 B2, 7,861,252 B2. The calculated skills profile for eachindependent contractor is saved in their independent contractor'sprofile in the present invention as is the user's feedback thatcomprises that user's feedback profile. The client organization cansearch the list of independent contractors for candidates that match theclient's target skills profile and feedback profile for a job and thebusiness intelligence system can use multi-variate analyses, like aregression analysis, to identify automatically candidate profiles thatare a good match to the client's target profile. This will createautomatic candidate recommendations to the client based on the client'starget skills profile and target personal work net promoter score. Theclient can then select the best candidates to interview and hire from apre filtered list of matching candidates. In addition, the systemoperator can charge a higher fee for candidates that have higher skillsprofile scores and higher personal work net promoter scores.

The CCS 201 is operatively coupled to the Administrator Interface 202which is the means for the system administrator to access the CCS. TheCCS is operatively coupled to the entrepreneur interface 203 which isthe means for an entrepreneur to access the CCS. The CCS is operativelycoupled to the team member interface 204 which is the means for a teammember to access the CCS. The CCS is operatively coupled to theindependent contractor interface 205 which is the means for anindependent contractor user to access the CCS. The CCS is operativelycoupled to the supplier interface 206 which is the means for suppliersto access the CCS. The CCS is operatively coupled to the Data StorageSystem 207 that is the means to store the data used by the CCS. The CCSis operatively coupled to the Business Intelligence System 208 that isthe means to match startups and independent contractors. The CCS isoperatively coupled to the Notification Management System 209 that isthe means to generate and send proactive and reactive notifications tousers. For example, the CCS sends a notification to the entrepreneurwhen an independent contractor submits a request to provide support andsend a notification to an independent contractor when an entrepreneursubmits a request for support. The CCS also sends a notification to thesystem administrator when an entrepreneur submits a startup applicationthen submits a notification to the entrepreneur when the systemadministrator approves or rejects the application. The CCS also sends anotification to the entrepreneur when an independent contractor submitsa work order then submits a notification to the independent contractorwhen the entrepreneur approves or rejects the work order. The CCS alsosends a notification to the independent contractor when the CCS awardsbonus work units to the independent contractor and also when the fundprovides options to the independent contractor. The CCS also sends anotification to the startup when an independent contractor offers bonuswork units then submits a notification to the independent contractorwhen the startup approves or rejects the offer. The CCS also sends anotification to the entrepreneur when an independent contractor makes anexcellence award then submits a notification to the independentcontractor when the entrepreneur makes an excellence award. The CCS alsosends a notification to the entrepreneur when an independent contractor,who is an accredited investor, makes a commitment to a campaign. The CCSalso sends a notification to a supplier when a startup purchases thesupplier's goods and services. The CCS also sends a notification to auser when someone adds a comment to a forum that the user is following.The CCS notifies independent contractors when an exchange, of fundinterests, that they have requested has been approved and consummated.The CCS is operatively coupled to the encryption system 210 that is themeans to encrypt and decrypt confidential information exchanged betweenusers and between users and the CCS. The CCS is operatively coupled tothe Authentication System 211 that is the means to authenticate a user'smost confidential information, such as payment information. The CCS isoperatively coupled to the Payment Processor System 212 that is themeans to authorize and capture payments for the CCS. A paymentauthorization is an interrogation of the user's account to ensure theuser has the means to pay. A payment capture is the final transfer ofthe funds from the source account to the destination account. The CCS isoperatively coupled to the Administration System 213 that is the meansto administer the CCS. The system administrator user logs into the CCSand configures parameters such as the meaning of each of the five starsin an excellence award. The system administrator user also enhances theCCS as new features are requested by users and implemented by the systemadministrator. The CCS is created using standard programming languagessuch as java, javascript, PHP, HTML, C, C+, and visual basic which isthe means to enhance the CCS. The CCS can be hosted by a web host suchas Godaddy or Host Gator. These web hosts are the means for the systemadministrator to administer the CCS. The web hosts offer a plurality ofservices such as backing up the databases, managing content pages usingtools like Wordpress, and providing forum services. For example, GoDaddyenables clients to add forums to their website that lets web visitorscreate discussions and also post comments in discussion threads. The CCSis also the means for the system administrator to manage users who wantto use the present invention and to manage trouble tickets that havebeen raised by users. The CCS is operatively coupled to the WorkflowManagement System 214 that is the means to manage the lean startuproadmap. The CCS is operatively coupled to the Messaging System 215 thatis the means to facilitate communication among users, such as betweenentrepreneurs and independent contractors. The CCS is operativelycoupled to the Forum System 216 that is the means to facilitatediscussions among users about a specific topic. The user who creates theforum also moderates the forum.

The present invention has a plurality of potential revenue streamsincluding future sales of shares in the startup, transaction fees forsupplier sales via the shopping cart, subscription fees by startups,licensing fees for technologies, advertising, fees for company pages,recruitment commissions and the sale of trend information generated bythe business intelligence system. Other income includes fees fromprofessional services organizations who want to target startups andindependent contractors. This include job agencies, insurance companies,law firms, accountants, software developers, etc. Payments can be madeusing a plurality of methods including credit cards, debit cards,electronic funds transfer, digital cash, checks and barter. In addition,a plurality of options exist for the timing of payments. It will beevident to one skilled in the art that one or more of the steps in thepreferred procedure can be eliminated in specific situations withoutaffecting the usefulness of the present invention.

As described above, company pages allow organizations to access feedbackon work completed by independent contractors, send messages to users whoare not connections, post projects, post jobs, post information abouttarget job candidates, and post information about their company. A newuse, and new functionality added to this disclosure, is an “acceleratoras a service” feature. Organizations can create and sponsor a fund andcan also view startup progress/status and startup value information.Each fund is valued by aggregating the value of all startups in thatfund. The organization can input a multitude of information about afund, including its start and end date, a list of startup companies inthe fund's portfolio, information about the fund managers, and its focuson an industry, market, geographic region or cause. For example, anautomobile company can sponsor a fund that invests in startups in theautomobile industry. A lifestyle organization can sponsor a fund thatinvests in startups that serve a target market. A city, county or statecan sponsor a fund that invests in startups that will locate in itsgeographic target area. A non-profit can sponsor a fund that invests instartups that serve the needs of a specific cause, such as votingtechnologies and procedures or community outreach. When an entrepreneursubmits an application for their startup, they can specify the fund fromwhich they want to receive the “sweat equity” investment. The presentinvention supports a plurality of funds. The organization who sponsors afund can choose which startup applications to accept. Independentcontractors then negotiate with entrepreneurs to provide work items forthe accepted startups. The entrepreneur accepts the work item andprovides feedback. In return for acceptance of the work item, theindependent contractor receives a participation in the organization'ssponsored fund, such as shares, share options or other considerations.The entrepreneur can input and update status information about theirstartup, including financial and other performance information that canbe used to ascertain a valuation. The present invention processes thisinformation in the BIS to calculate one or more estimates of the valuefor each startup in a fund, and by aggregation, a value for each fund.After a set period of time, such as three years, the organization canclose their fund to new startups and float the fund on a financialmarket as a startup backed security. This allows all stakeholders in thefund to have the option to liquidate their shareholdings irrespective ofthe liquidity of the individual startups in the fund's portfolio. Intotal, the present invention allows the organization to receive thebenefits of an accelerator without having to provide the usualinvestment dollars to fund startups and without incurring the annualcosts to operate the accelerator. Rather, the organization leverages thepresent invention to meet the investment costs through sweat equitycontributions from independent contractors. Also, the present inventionmeets the organization's annual accelerator operating costs as anextension of the present invention's normal operating costs. However,the sponsorship paid by the organization for the accelerator as aservice feature is a new revenue stream for the present invention. TheCCS 201 is the means of allowing organizations to create a fund andassign startups to that fund. The startup application process isdescribed above. The process for independent contractors to provideservices to startups and receive shares in the fund is described above.The CCS 201 is the means for Startups in a fund to input information,including certified financial information about their current commercialstatus. The BIS 208 is the means to analyze the financial informationand estimate the value of each startup. The value information forstartups is stored in the startup database 607. The value informationfor funds is stored in the CCS database 601. Other organizations cancreate company pages as described above to access this information andmake their own value assessments for each startup in a fund's portfoliobased on the status information for each startup, and in aggregate, makea value assessment about each fund. This is similar to calculating avalue for a mortgage backed security then trading that security on asecondary market. A number of patent applications have been filed forsystems that value companies, such as US20020174081A1 andUS20040024674A1. Also, a number of patent applications have been filedfor systems that support mortgage back securities, such as U.S. Pat. No.8,694,399 B2 for pricing and US20100280937 A1 for trading. Anyoneskilled in the art will recognize that similar methods can be applied topricing and trading startup backed securities. The present inventioninterfaces with trading platforms that trade asset backed securities or,in this case, startup backed funds. These trading platforms are treatedlike an automated user by the present invention when they accessvaluation information for startups and funds. This enables users of thetrading platform to trade shares in the fund which provides liquidityfor fund shareholders even if the fund's startups are not liquid.

Anyone skilled in the art will also recognize that the method andapparatus of the present invention has many applications and advantages,and that the present invention is not limited to the representativeexamples and variations disclosed herein. In addition, the scope of thepresent invention covers conventional variations and modifications, tothe components of the present invention, which are known to those whoare skilled in the art.

I claim:
 1. A computer implemented method for outsourcing a startupaccelerator fund associated with an organization, said methodcomprising: receiving, from said organization, a first plurality ofinformation to create said startup accelerator fund to invest in aplurality of startup businesses, wherein said startup accelerator fundcomprises a first plurality of work units, wherein a work unit is asweat equity investment from said startup accelerator fund into astartup business, wherein said startup business uses said work unit topay for a sweat equity contribution from an independent contractor;receiving, from said startup business, an application to join saidstartup accelerator fund; receiving, from said organization, an approvalof said application; transferring a second plurality of work units tosaid startup business as said sweat equity investment from said startupaccelerator fund based on said approval, wherein said second pluralityof work units is transferred from said first plurality of work units;receiving a requirement from said startup business to complete adeliverable based on said second plurality of work units; receiving,from said independent contractor, an estimate to complete saidrequirement; receiving, from said startup business, an acceptance ofsaid estimate; receiving, from said startup business, an acceptance ofsaid deliverable based on said acceptance of said estimate; receiving afeedback from said startup business including said acceptance of saiddeliverable; transferring, to said independent contractor, a thirdplurality of work units, from said second plurality of work units, basedon said feedback; converting said third plurality of work units into aplurality of share options in said startup accelerator fund, wherebysaid organization signs up to a service that supports a plurality ofstartup accelerator funds; transmitting a non-confidential notificationto a public email address of a user, based on an event, including apayment to said independent contractor, wherein a first confidentialmessage associated with said event is transmitted to a secure emailaddress of said user; securing a plurality of information based on,encrypting a confidential message, including said first confidentialmessage, and decomposing an encrypted version of said confidentialmessage into a block of linked subcomponents that are distributedrandomly across a first plurality of member computers, wherein saidplurality of information includes a plurality of authenticationinformation and a plurality of authorization messages for a plurality ofusers and payments; and recovering said confidential message, bydecrypting said encrypted version of said confidential message afterrecombining said encrypted version of said confidential message from itslinked but randomly distributed subcomponents.
 2. The method accordingto claim 1, wherein said third plurality of work units is a percentageof said first plurality of work units that comprise said startupaccelerator fund.
 3. The method according to claim 1, wherein saidplurality of share options in said startup accelerator fund is at leastone of an option to acquire a specific class of shares in said startupaccelerator fund or an actual class of shares in said startupaccelerator fund.
 4. The method according to claim 1, wherein saidfeedback includes an assessment, from said startup business, of aplurality of work activities completed by said independent contractor.5. The method according to claim 1, wherein said method furthercomprises: copying said block of linked subcomponents randomly to asecond plurality of member computers to form a plurality of copies ofsaid block of linked subcomponents; copying periodically an oldest blockof linked subcomponents randomly to a third plurality of membercomputers to create a newest block of linked subcomponents; and deletingsaid oldest block of linked subcomponents after said creation of saidnewest block of linked subcomponents.
 6. The method according to claim5, wherein: securing said plurality of information, further comprisesencrypting said confidential message based on at least one of a user'spublic encryption key and a symmetric encryption key; and recoveringsaid confidential message, further comprises decrypting said encryptedversion of said confidential message based on at least one of saiduser's private encryption key and said symmetric encryption key, whereinsaid user's private encryption key matches said user's public encryptionkey.
 7. The method according to claim 6, wherein said user applies afirst biometric signature to initiate a process that encrypts anddecomposes said confidential message into said block of linkedsubcomponents and said user applies a second biometric signature toinitiate a recovery of said confidential message from said block oflinked subcomponents.
 8. A system for outsourcing a startup acceleratorfund associated with an organization, said system comprising: at leastone memory configured to store computer program code instructions; andat least one processor configured to execute said computer program codeinstructions to: receive, from said organization, a first plurality ofinformation to create said startup accelerator fund to invest in aplurality of startup businesses, wherein said startup accelerator fundcomprises a first plurality of work units, wherein a work unit is asweat equity investment from said startup accelerator fund into astartup business, wherein said startup business uses said work unit topay for a sweat equity contribution from an independent contractor;receive, from a startup business, an application to join said startupaccelerator fund; receive, from said organization, an approval of saidapplication; transfer a second plurality of work units, to said startupbusiness, as said sweat equity investment from said startup acceleratorfund based on said approval, wherein said second plurality of work unitsis transferred from said first plurality of work units; receive arequirement from said startup business to complete a deliverable basedon said second plurality of work units; receive, from said independentcontractor, an estimate to complete said requirement; receive, from saidstartup business, an acceptance of said estimate; receive, from saidstartup business, an acceptance of said deliverable based on saidacceptance of said estimate; receive a feedback from said startupbusiness including said acceptance of said deliverable; transfer, tosaid independent contractor, a third plurality of work units, from saidsecond plurality of work units, based on said feedback; convert saidthird plurality of work units into a plurality of share options in saidstartup accelerator fund, whereby said organization signs up to aservice that supports a plurality of startup accelerator funds; transmita non-confidential notification to a public email address of a user,based on an event, including a payment to said independent contractor,wherein a first confidential message associated with said event istransmitted to a secure email address of said user; secure a pluralityof information based on an encryption of a confidential message,including said first confidential message, and a decomposition of anencrypted version of said confidential message into a block of linkedsubcomponents that are distributed randomly across a first plurality ofmember computers, wherein said plurality of information includes aplurality of authentication information and a plurality of authorizationmessages for a plurality of users and payments; and recover saidconfidential message, by a decryption of said encrypted version of saidconfidential message after a recombination of said encrypted version ofsaid confidential message from its linked but randomly distributedsubcomponents.
 9. The system according to claim 8, wherein said at leastone processor is further configured to enable said third plurality ofwork units to be a percentage of said first plurality of work units thatcomprise said startup accelerator fund.
 10. The system according toclaim 8, wherein said at least one processor is further configured toenable said plurality of share options in said startup accelerator fundto be at least one of an option to acquire a specific class of shares insaid startup accelerator fund and an actual class of shares in saidstartup accelerator fund.
 11. The system according to claim 8, whereinsaid feedback includes an assessment, from said startup business, of aplurality of work activities completed by said independent contractor.12. The system according to claim 8, wherein said at least one processoris further configured to: copy said block of linked subcomponentsrandomly to a second plurality of member computers to form a pluralityof copies of said block of linked subcomponents; copy an oldest block oflinked subcomponents periodically and randomly to a third plurality ofmember computers to create a newest block of linked subcomponents; anddelete said oldest block of linked subcomponents after said creation ofsaid newest block of linked subcomponents.
 13. The system according toclaim 12, wherein said at least one processor is further configured to:encrypt said confidential message based on at least one of a user'spublic encryption key and a symmetric encryption key; and decrypt saidencrypted version of said confidential message based on at least one ofsaid user's private encryption key and said symmetric encryption key,wherein said user's private encryption key matches said user's publicencryption key.
 14. The system according to claim 13, wherein said atleast one processor is further configured to enable said user to apply afirst biometric signature to initiate a process to encrypt saidconfidential message then decompose it into said block of linkedsubcomponents and enable said user to apply a second biometric signatureto initiate a recovery of said confidential message.
 15. Anon-transitory computer readable medium storing computer-executableinstructions that, when executed by a processor, cause said processor toperform operations for outsourcing a startup accelerator fund associatedwith an organization, said operations comprising: receiving, from saidorganization, a first plurality of information to create said startupaccelerator fund to invest in a plurality of startup businesses, whereinsaid startup accelerator fund comprises a first plurality of work units,wherein a work unit is a sweat equity investment from said startupaccelerator fund into a startup business, wherein said startup businessuses said work unit to pay for a sweat equity contribution from anindependent contractor; receiving, from a startup business, anapplication to join said startup accelerator fund; receiving, from saidorganization, an approval of said application; transferring a secondplurality of work units to said startup business as said sweat equityinvestment from said startup accelerator fund based on said approval,wherein said second plurality of work units is transferred from saidfirst plurality of work units; receiving a requirement from said startupbusiness to complete a deliverable based on said second plurality ofwork units; receiving, from said independent contractor, an estimate tocomplete said requirement; receiving, from said startup business, anacceptance of said estimate; receiving, from said startup business, anacceptance of said deliverable based on said acceptance of saidestimate; receiving a feedback from said startup business including saidacceptance of said deliverable; transferring, to said independentcontractor, a third plurality of work units, from said second pluralityof work units, based on said feedback; converting said third pluralityof work units into a plurality of share options in said startupaccelerator fund, whereby said organization signs up to a service thatsupports a plurality of outsourced startup accelerator funds;transmitting a non-confidential notification to a public email addressof a user, based on an event, including a payment to said independentcontractor, wherein a first confidential message associated with saidevent is transmitted to a secure email address of said user; securing aplurality of information based on encrypting a confidential message,including said first confidential message, and decomposing an encryptedversion of said confidential message into a block of linkedsubcomponents that are distributed randomly across a first plurality ofmember computers, wherein said plurality of information includes aplurality of authentication information and a plurality of authorizationmessages for a plurality of users and payments; and recovering saidconfidential message, by decrypting said encrypted version of saidconfidential message after recombining said encrypted version of saidconfidential message from its linked but randomly distributedsubcomponents.
 16. The non-transitory computer readable medium of claim15, wherein said third plurality of work units is a percentage of saidfirst plurality of work units that comprise said startup acceleratorfund.
 17. The non-transitory computer readable medium of claim 15,wherein said plurality of share options in said startup accelerator fundis at least one of an option to acquire a specific class of shares insaid startup accelerator fund and an actual class of shares in saidstartup accelerator fund.
 18. The non-transitory computer readablemedium of claim 15, wherein said operations further comprise: copyingsaid block of linked subcomponents randomly to a second plurality ofmember computers to form a plurality of copies of said block of linkedsubcomponents; copying an oldest block of linked subcomponentsperiodically and randomly to a third plurality of member computers tocreate a newest block of linked subcomponents; and deleting said oldestblock of linked subcomponents after said creation of said newest blockof linked subcomponents.
 19. The non-transitory computer readable mediumof claim 18, wherein said operations further comprise: encrypting saidconfidential message based on at least one of a user's public encryptionkey and a symmetric encryption key; and decrypting said encryptedversion of said confidential message based on at least one of saiduser's private encryption key and said symmetric encryption key, whereinsaid user's private encryption key matches said user's public encryptionkey.
 20. The non-transitory computer readable medium according to claim19, wherein said operations further comprise enabling said user to applya first biometric signature to initiate a process to encrypt saidconfidential message then decompose it into said block of linkedsubcomponents and enabling said user to apply a second biometricsignature to initiate a recovery of said confidential message.