Our ideal would be collaboration with a firm with established strength in the cybersecurity market. However, both short term investment and full buyout would be considered.
If a full buyout were to be negotiated, it should be structured to accomplish a smooth technology transfer. We envision some period of mentoring technical personnel re documents and source code.
In the short term, we have the experience and skills to operate the firm, provided we had in hand sufficient funds to:
Strengthened by short term investment, our hope is that we can drive up the firm valuation, all the while seeking the appropriate cybersecurity connection to broaden the firm's offerings to a full range of devices and to build a sustainable management team.
- staff up and transfer the technology by mentoring capable technical persons in our documentation and source code;
- collaborate with our service provider (The Ridgefield Group) to polish the delivery of product;
- carry out carefully targeted free sampling of Extreme Encryption; and
- devise public relations initiatives to build exposure.
Documentation on hand is extensive and the source code is well commented. Nonetheless there is risk in the investment in the sense that a full understanding of the technology is limited to one key man -- the inventor. The more quickly additional technical staff understand the technology, the less the risk in investment. Note that Marpex Inc. carries no debt of any description, apart from a cumulative loan (under $200k) from its primary shareholder.
For either partial investment or buyout, we seek a credible investor group with a history of integrity in its dealings.
- Port the Windows product family to a full range of devices and computers;
- Professionalize the interfaces;
- Work together to develop marketing plans;
- Launch the full product family with generous marketing support;
- License and support third parties to embed our technology in their software offerings;
- Optionally, sell outright the Extreme Encryption™ technology to the United States Government;
- Full ownership of MarpX Good Privacy, MarpX Better Privacy, and Extreme Encryption™, including U.S. Patent Application No. 15816865 with associated technical notes and source code;
- Its creative inter-disciplinary problem solving, writing, teaching, and mentoring skills;
- Its production source code, research source code, and technical notes re applications built on its encryption technology;
- Feature addition, short term: Enable the user to automate the bulk encryption and decryption of file collections in preparation for storage in the cloud and retrieval. This feature uses already fully functional command line versions of each of MarpX Good Privacy, MarpX Better Privacy, and Extreme Encryption™.
- Feature addition, medium term: Enable the user to search offline entire collections of encrypted content, in order to expedite the identification of files and their retrieval from the cloud. This feature uses MarpX Precision Search / Research technology. Its strengths include: (a) treatment of headings at all levels as significant in the search for meaning; and (b) filtering of meaningless hits. (The technology enables the user to specify how close words must be together, even within massive collections of text.) See MarpX precision search examples via the MarpX.com site map and also more on specifications.
- Contributions to team design; and
- Provisional access to the remaining four years of Pryvit technology, U.S. Patent 6,757,699, invented by Marpex Inc. with rights currently owned by Franciscan University of Steubenville.
- Bureau of Industry and Security Export Administration Regulations pertain to encryption products. Note that MarpX Better Privacy has been ruled to be ECCN EAR99. All potential first sales to a customer must be reviewed against both the list of embargoed countries and the Export Consolidated Screening List.
- Marpex Inc. owns a separate patented precision search technology. While this technology may be used in collaborative projects, ownership of this technology remains with Marpex Inc.
- We are committed to the dignity and worth of the customer. Actual encryption steps and assignment of keys remain always in the control of the product user. Both back doors and third party handling of encryption undermine user privacy and defeat the product purpose.
- There have been truly egregious violations of privacy of the users of apps which incorporate SDKs (Software Development Kits) that communicate personal information to third party servers. See for example the lead print edition headline of the February 24, 2019 Wall Street Journal. We oppose communication of user file or message content to any server anywhere where Marpex Inc. is involved.
If your organization brings integrity, a service orientation, high reputation in the cybersecurity ecosystem, quality marketing and software teams, and resources and experience in relevant markets, let's talk. Contact Steve Feher at 740 317-4847. Steve's backup is Colonel John Scott, Esq. at 740 275-4505.
P.S. We would love the opportunity to explore with a partner tech team the possibility that we could together apply our technologies to dynamic data in database management systems. That would be the ultimate in online security.