Tower Raiders

(Game Concept Document)

Developer

Leonard Lay


Warning!

Attention alien invaders. You may have succeeded in capturing most of the planet of Updon, however you will find that the central fortress which houses the seat of our planetary government will not be so easy to defeat. As long as this tower still stands you will never rule our land. Go ahead and send your hoards against us. We will stand strong and you will be repelled…

What is Tower Raiders?

Tower Raiders is a new genre of strategy game called “reverse tower-defense.” It is meant to be enjoyed either as a stand-alone desktop game or as an online game for those who would rather command the advancing hoards rather than defend some silly tower. Some say, “the best offense is a good defense.” We say, “we’ll crush your silly defense to dust and dance on the rubble!”

What is a “reverse tower-defense” game?

A “tower defense” game involves the player building up defenses to repel an increasingly strong advancing hoard of enemies. Tower Raiders is a “reverse tower-defense” game. In this genre the player adopts the persona of the commander of the advancing army. As the commander, the player will send troops to bypass the defenses and destroy the tower.

That sounds awesome! Tell me more about Tower Raiders.

The commander starts off with command of an army of low level foot soldiers that are sent to the tower in waves. The first level tower will be defended by 4 defense posts with low level weapons. Each defense post has a weapon with a specific attack, power, range, speed and refresh rate. Level victory is achieved when the tower gets 5 points of damage. Each successive level will have some combination of additional defense posts, stronger weapons, and a tougher tower (requires more hit points of damage for victory). But lest our fearless commander lose hope, as victories are achieved stronger, faster and more powerful soldiers will join your army to aid in your planetary conquest.

The commander builds the advancing army by deciding which troops to put into each attack wave. The commander then determines the frequency of troop deployment (within a reasonable range of time). The commander must strategically deploy troops to defeat or bypass the defenses and capture the tower for each level. As your troops advance your army gets more money from your supporters back home. This money can be used to upgrade your soldiers with more powerful weaponry, more hit points, or faster speed during the current level. Once the tower is destroyed, the commander gets medals based on how decisive the victory was over the defenses. These medals can be used to gain new, more powerful troops as well as to perform permanent upgrades to your army’s destructive power. Once the commander has led the armies to victory over the tower on each of the 10 planets, total victory is achieved. The galaxy becomes unified under a strong leader. Resistance is meaningless.

However, if the commander runs out of troops before delivering the final blow to the enemy tower at any level, the army is defeated. But no worries, go home, lick your wounds, amass a new army and try again. In fact, once a level is defeated you can go back and play it again at any time for more medals.

Conceptual screen shot of one of the higher levels. The red-orange circles represent the enemy defense armaments. The gray dots are the player’s troops moving towards the tower in the lower left of the image. The green dashed lines represent whatever method the defense armaments use to destroy or block the player’s troops.

Tower Raiders Assets:

  • 2D images of
  • 10 towers
  • Healthy
  • Damaged
  • Destroyed
  • 30 defense structures
  • Attack
  • Destroyed
  • 15 troop types
  • Advancing
  • Attack
  • Defense
  • Death
  • Health bars
  • Background scenery (location map)
  • Ranged weapon ordinance
  • Audio
  • 10 Background themes (one for each planet)
  • 30 defense weapon sounds
  • 15 troop battle sounds
  • 15 troop destruction sounds
  • Explosion sounds

So how much would Tower Raiders cost to make?

Let’s start off with some assumptions about costs. Let’s assume that programmers cost $80/hour (that will either be contract, no benefits, or full time, including payroll taxes and benefits). The graphic designers make about $23/hour. The sound engineers make about $30/hour.

If we assume that each graphic takes about 1 hour to produce, then for 205 graphic assets, we could expect to pay about $5000.

For the planetary theme songs let’s assume 4 hours each, so that adds an additional $1200.

The other sounds could take about 1 hour each, so $2100.

The programming needs to be completed in 10 weeks to allow time for testing. Therefore the coding portion would cost $32000.

Testing would take about 2 weeks and cost about $6400.

Marketing, packaging and distribution would be an additional $40000.

That brings the total to about $86700.

NON-DISCLOSURE AGREEMENT

This Non-disclosure Agreement (this "Agreement") is made effective as of August 26,

2012 (the "Effective Date"), by and between Leonard Lay (the "Owner"), of 3313

Northridge Ct, Ellenwood, Georgia 30294, and Jeffrey Chastine (the "Recipient"), of Southern Polytechnic State University, Georgia.

The Owner is engaged in the business of developing game software. The Recipient is a college professor in the school of Computer and Software Engineering at SPSU. Information will be disclosed to Jeffrey Chastine to offer Leonard Lay feedback and a grade for a class project as well as for a possible future commercial game. The Owner has requested that the Recipient will protect the confidential material and information which may be disclosed between the Owner and the Recipient. Therefore, the parties agree as follows.

I. CONFIDENTIAL INFORMATION. The term "Confidential Information" means any information or material which is proprietary to the Owner, whether or not owned or developed by the Owner, which is not generally known other than by the Owner, and which the Recipient may obtain through any direct or indirect contact with the Owner.

A. "Confidential Information" includes without limitation:

- business records and plans

- product design information

- computer programs and listings

- source code and/or object code

- copyrights and other intellectual property and other proprietary information.

B. "Confidential Information" does not include:

- matters of public knowledge that result from disclosure by the Owner;

- information rightfully received by the Recipient from a third party without a duty of confidentiality;

- information independently developed by the Recipient;

- information disclosed by operation of law;

- information disclosed by the Recipient with the prior written consent of the Owner; and any other information that both parties agree in writing is not confidential.

II. PROTECTION OF CONFIDENTIAL INFORMATION. The Recipient understands and acknowledges that the Confidential Information has been developed or obtained by the Owner by the investment of significant time, effort and expense, and that the Confidential Information is a valuable, special and unique asset of the Owner which provides the Owner with a significant competitive advantage, and needs to be protected from improper disclosure. In consideration for the receipt by the Recipient of the Confidential Information, the Recipient agrees as follows:

A. No Disclosure. The Recipient will hold the Confidential Information in confidence and will not disclose the Confidential Information to any person or entity without the prior written consent of the Owner.

B. No Copying/Modifying. The Recipient will not copy or modify any Confidential Information without the prior written consent of the Owner.

C. Unauthorized Use. The Recipient shall promptly advise the Owner if the Recipient becomes aware of any possible unauthorized disclosure or use of the Confidential Information.

D. Application to Employees. The Recipient shall not disclose any Confidential Information to any employees of the Recipient, except those employees who are required to have the Confidential Information in order to perform their job duties in connection with the limited purposes of this Agreement. Each permitted employee to whom Confidential Information is disclosed shall sign a non disclosure agreement substantially the same as this Agreement at the request of the Owner.

III. UNAUTHORIZED DISCLOSURE OF INFORMATION - INJUNCTION.

If itappears that the Recipient has disclosed (or has threatened to disclose) Confidential Information inviolation of this Agreement, the Owner shall be entitled to an injunction to restrain the Recipientfrom disclosing the Confidential Information in whole or in part. The Owner shall not be prohibitedby this provision from pursuing other remedies, including a claim for losses and damages.

IV. NON-CIRCUMVENTION. During the term of this Agreement, Recipient will not attemptto do business with, or otherwise solicit any business contacts found or otherwise referred byOwner to Recipient for the purpose of circumventing, the result of which shall be to prevent theOwner from realizing or recognizing a profit, fees, or otherwise, without the specific writtenapproval of the Owner. If such circumvention shall occur the Owner shall be entitled to anycommissions due pursuant to this Agreement or relating to such transaction.

V. RETURN OF CONFIDENTIAL INFORMATION. Upon the written request of the

Owner, the Recipient shall return to the Owner all written materials containing the ConfidentialInformation. The Recipient shall also deliver to the Owner written statements signed by theRecipient certifying that all materials have been returned within five (5) days of receipt of therequest.

VI. RELATIONSHIP OF PARTIES. Neither party has an obligation under this Agreement topurchase any service or item from the other party, or commercially offer any products using orincorporating the Confidential Information. This Agreement does not create any agency,partnership, or joint venture.

VII. NO WARRANTY. The Recipient acknowledges and agrees that the Confidential

Information is provided on an "AS IS" basis. THE OWNER MAKES NO WARRANTIES,EXPRESS OR IMPLIED, WITH RESPECT TO THE CONFIDENTIAL INFORMATIONAND HEREBY EXPRESSLY DISCLAIMS ANY AND ALL IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENTSHALL THE OWNER BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, ORCONSEQUENTIAL DAMAGES IN CONNECTION WITH OR ARISING OUT OF THEPERFORMANCE OR USE OF ANY PORTION OF THE CONFIDENTIALINFORMATION. The Owner does not represent or warrant that any product or business plansdisclosed to the Recipient will be marketed or carried out as disclosed, or at all. Any actions takenby the Recipient in response to the disclosure of the Confidential Information shall be solely at therisk of the Recipient.

VIII. LIMITED LICENSE TO USE. The Recipient shall not acquire any intellectual propertyrights under this Agreement except the limited right to use as set forth above. The Recipientacknowledges that, as between the Owner and the Recipient, the Confidential Information and allrelated copyrights and other intellectual property rights, are (and at all times will be) the propertyof the Owner, even if suggestions, comments, and/or ideas made by the Recipient are incorporatedinto the Confidential Information or related materials during the period of this Agreement.

IX. INDEMNITY. Each party agrees to defend, indemnify, and hold harmless the other partyand its officers, directors, agents, affiliates, distributors, representatives, and employees from anyand all third party claims, demands, liabilities, costs and expenses, including reasonable attorneysfees, costs and expenses resulting from the indemnifying party's material breach of any duty,representation, or warranty under this Agreement.

X. ATTORNEY FEES. In any legal action between the parties concerning this Agreement, theprevailing party shall be entitled to recover reasonable attorneys fees and costs.

XI. GENERAL PROVISIONS. This Agreement sets forth the entire understanding of theparties regarding confidentiality. The obligations of confidentiality shall survive 6 month(s) from thedate of disclosure of the Proprietary Information. Any amendments must be in writing and signedby both parties. This Agreement shall be construed under the laws of the State of Georgia. ThisAgreement shall not be assignable by either party. Neither party may delegate its duties under thisAgreement without the prior written consent of the other party. The confidentiality provisions ofthis Agreement shall remain in full force and effect at all times after the effective date of thisAgreement. If any provision of this Agreement is held to be invalid, illegal or unenforceable, theremaining portions of this Agreement shall remain in full force and effect and construed so as tobest effectuate the original intent and purpose of this Agreement.

IN WITNESS WHEREOF, this Non-disclosure Agreement by and between Leonard Lay andJeffrey Chastine has been executed and delivered in the manner prescribed by law as of the datefirst written above.

OWNER:

Leonard Lay

By: ______

Leonard B Lay

Owner

MoNarch Enterprises

Address:

3313 Northridge Ct

Ellenwood, Georgia 30294

RECIPIENT:

Jeffrey Chastine

By: ______

Jeffrey Chastine

Professor

Southern Polytechnic State University

© This is a RocketLawyer.com Legal Document ©