Our Story
Learn why we created VerifyMC, how everyone is connected, and how VerifyMC stops, blocks, combats, prevents, and guards against next-generation cyber thieves to keep everyone safe.
The Why & How
THE WHY INCLUDES YOU
The Why. We developed this technology to stop multi-prong cyber and phishing attacks that were getting through all the big tech companies. We saw the pain and misery. There are two parts to the answer: WHY and HOW.
Before we get to the why, let's ask the question many of you are thinking now: “Why hasn’t someone else done what you are doing?" We asked ourselves the same question, and we will answer a little further down.
First, the why is that we saw the people it hurt, the businesses it has destroyed, and the exponential growth because so few ever get caught. Second, we had the knowledge to develop the intellectual property that enables us to do what we do.
And at the same time, we saw no motivation among the largest technology companies to take any action to completely stop it.
Imagine a large corporation announcing at the next shareholders' meeting, “We invented technology that will cut our revenue in half.” And their bonuses would shrink. You think?
Our goal is to make the technology available in a format that pays for itself by providing a service everyone needs, and gives them a "leg up" in an AI-centric world. In that format, we want to fund all the sheriff's departments in the US, so maybe we can catch some of these criminals.
We will do this in phase one, with patent-pending technology and “security services” within pre-AI BOTS. In phase two, we will introduce a way to instantly share the IP addresses and domains of cyber terrorists within seconds, stopping attacks before they spread, while sending the information to local law enforcement officials. Yes, we made “the thing” work. Phase three: make it so cheap that anyone can use it. Making a profit off someone else's misery seems wrong to us in Texas.
And, no, the Patent Application doesn't call it “The Thing,” we call it a “SPARC KEY.” ...continued...keep reading...

Freight Carriers, Truckers, Freight Brokers, and Customers suffer the same from cyber thieves all over the world.
SPARC KEY: System and Method for Spatiotemporal Polymorphic Authentication and Recognition Connected KEY (SPARC KEY) - Utilizing 4D SOGTI Indexing
And, no, the Patent Application does not call it “The Thing,” we call it a “SPARC KEY.” System and Method for Spatiotemporal Polymorphic Authentication and Recognition Connected KEY (SPARC KEY) Utilizing 4D SOGTI Indexing. The patent filing will use a more precise name.
In both offensive and defensive modes, we examine 90 distinct digital, analog, and physical points. We call them Spatial Outlying Geometric Timed Identifiers. We combined them with a Temporal ID to create a 4D spatiotemporal index that identifies the fraud and the thieves. We protect our own systems from future innovation by cyber thieves by integrating a physical, polymorphic key into every BOT, physical or virtual, that processes and serves as the gateway between potential threats and its users.
Something physical helps protect something digital, with our own AI as the arbitrator in between.
AGAIN, WHY DID WE DO THIS?
By using conventional methods, WE ARE NOT STOPPING THE NEW GENERATION OF CYBER ATTACKS. They get through. THE ODDS SAY SO. It will cost us all a lot of money. The odds always work in the thief's favor! Why" Because we are all human, and they only need to 'get it right,' one time. We have seen this in big and little companies for two decades, and it is getting worse. The ones that say, "Not me, I'll catch it," they always get taken; overconfidence. Except for a few, they fall into the trap of overconfidence. With AI, it will only get worse.
With AI, it will only get worse. ...continued...keep reading....
How Verify MC Works Inside Your Business
THE HOW INCLUDES YOU
The How? In some ways, explaining the “How” is the hardest part. How do we explain something extremely complicated against a backdrop of mega-technology companies that seem powerless to stop the new generation of threats? Keep reading, we can and will.
But first, ask yourself whether we are sure that large companies that make their money from fighting fraud want a knockout blow? Is the CFO asking for a new product that offers no add-on products or services, discourages, and might curb the flow of their prime benefactor, who keeps their customers coming? And would they go a step further and help local law enforcement maybe catch them? In case their stock prices and shareholders hold too much influence, we thought we should fix it.
THE BEGINNING OF HOW - All digital thieves share several traits. We know that and a lot more about them. We also learned a lot by helping those who have been attacked. The basics? We look at 91 different points, digital, analog, and physical, then we track them over time using a BOT, and assign values based on an algorithm, to start. Comparing this with the known and creating what scientists call a benchmark, or baseline, we have a starting point, a reference. We use predictive algorithms we invented and decades of experience. We practice absolute 100% privacy with the data we handle, the opposite of all vendors, and make all this possible. With a SPARC KEY added, we go to work to stop the bad guys.
Now, hold that thought and let me explain one thing: part of our system lives on a web page and can operate on its own. In trucking, that can be all they need. For authorities, we can explain why certain cyberattacks are successful and perhaps help break open some cases. 99.9% are never caught.
Back to the explanation. The BOT is hardware—more on that. But first, technology had to catch up. About ten years ago, we started working on the problem. To scale it, we needed technology, and Ubuntu* made everything possible. Canonical Corporation’s mission was to deliver "Linux for Human Beings" by offering a stable, secure, and easy-to-use operating system. In many ways, they made what we are doing possible. And you thought we were going to say, “AI was key!” Nope, it helps, and SuperGrok’s contribution takes Verify MC to the next level in a small, compact, powerful system.
..continued...keep reading....

We look at 91 different digital, analog, and physical points to determine what is fake and what is real. Which is the image?

Ubuntu OS powers all BOTS, AGENTS, Docker Virtual, and Pre-AI BOTS VIRTUAL, AND PRE-AI RUN ON UBUNTU
*Ubuntu, and the Ubuntu logo are the copyright of Canonical Corporation

Ubuntu OS powers all our BOTS, AGENTS, Docker Virtual, and Pre-AI BOTS.
*Ubuntu, and the Ubuntu logo are the copyright of Canonical Corporation

10+
Years in the making
THE HOW AND WHAT TECHNOLOGY, HARDWARE MAKE UP VERIFY MC AND OPERATION
VERIFY MC BOTS OUT PERFORM AI IN THE JOB THEY DO
THE HOW CONTINUED
- The RISC processor and the capability to craft the
Ubuntu* Linux OS on a platform to fit into any business made scaling possible, and Verify MC today. For solo truckers and workers, we are taking a different approach: housing the BOT for them and offering a free digital fingerprint. Some services for Freight Brokers and Carriers can be done without a BOT. Explaining a BOT.
To use an analogy,
Verify
MC is like a collapsible nightstick that law enforcement all use today. For two hundred years, no one innovated. The "nightstick," or the "baton," was made of wood and did its job, with limitations. In 1980, Kevin Parson invented the compact, friction-locked system. It changed everywhere. A
compact female police officer can now take down a robber twice her size, with her new nightstick. The technology to replace the nightstick had been available for five decades, and no one did anything about it before Kevin.
We give you a better nightstick to stop cyber-terrorists!
-
Hardware
HARDWARE - Together, the hardware, operating system, our applications, and a Patent-Pending SPARC KEY form a BOT. The BOT, depending on the unit, is about 4 inches square; some will be 8 inches by 4 inches with a similarly sized touchscreen. A BOT can sit in a computer room, the CFO’s desk, or the Accounting Group's conference table
-
User Interaction
USER INTERACTION - Not much! BOTS work in the background, and one function they can do, if you let them, is file all your incoming email and attachments from vendors while notifying you of the fake. It does a lot more, but that's the basics. BOTS can provide insight and help in many ways. You can interact with a BOT by sending it an email to check whether it is not on the accounting distribution list to receive invoices. See transportation, accounting, and law enforcement for more details.
-
Web Components
WEB COMPONENTS - Each BOT comes with a custom web page for receiving and scanning documents, verifying individuals, and creating a digital fingerprint. Some services do not need a BOT and are web-based. Smaller clients and solo practitioners can use our virtual solution. A more detailed explanation is coming up on the Web Components & Solo Page.
-
Getting Verify MC Hardware Running
Getting Verify MC Hardware Running - To get Verify MC up and running, we will speak with you by phone or in person to better understand how you operate. Yes, we don’t rely solely on email and a website. You are the most important person in our business, in our organizational tree, A CUSTOMER. A customer who, if you need us at midnight any day, can text or call. More on that later. Most installs are alike, most use Microsoft, and the same services. If you are facing a challenge, we can use web tools to respond right away.
-
Setting Up Verify MC BOTS On-Site
Setting Up Verify MC BOTS On-Site- A BOT is set up on-premise, and you add the BOT to your accounting distribution email list or to another desktop's mail account. Each BOT comes with two software programs: eM Client to receive email and Bitdefender for internal protection and virus scanning. Any competent IT person can set it up. Most questions get set up by sending the BOT a registration form. What we look at goes beyond viruses, and modern cyberattacks don’t use them. BOTS can operate over wireless so as not to be directly on your network. We can use it to inspect a suspect file for a malformed virus. Plug the BOT in, power it up, and give it access to incoming mail and attachments. We know IT departments fear new things; they can run almost anywhere to avoid creating concern.
Now You're Going To Ask
"Why can't the others do what you do? And you would be right in asking that question."
What Beta User Say About Us
Joe Jason





