ROATI Technologies Inc.
a Purely Hardware Solution for the
Malware Protection of Computers
September 18, 2018
We have discovered a Purely Hardware Solution for the Malware protection of our computer systems and is reliably accomplished without the need or use of Malware detection software.
We discovered a new computer principle; which led us to the developed a new class of computer components; which enabled us to develop a new computer architecture; which makes it possible for us to protect against any Malware attached to an information data file. This protection includes any malicious Malware which has yet to be discovered by Malware detection software companies, which would easily bypass existing detection software and would maliciously infect your computer or system.
This document highlights how we are able to accomplish this previously thought to be an impossible level of Malware protection and our route to commercialization.
I have over 30 years in electronic component technical sales and sales management, was instrumental in the supply of components used in three satellites circling the globe, received Canadian military security clearance, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.
All incoming information data files, if they are or they are not infected with a Malware, are all automatically processed the same way. This pre-processing stage is the first stage of several which all contribute to the safe usage and sharing of that data with others, without the fear of a Malware infecting your computer or system and spreading to others.
Because of a major change in our systems architecture, under normal operating conditions, it is absolutely impossible for any Malware infection to infect our systems main BIOS or Hard Drive.
This high a level of Cyber Security is made possible because of our discovery of a new computer principle. This new computer principle, is that which led us to the development a new class of computer components, which enabled us to develop a new computer architecture. Our new computer architecture is which enables the new way of how our computers process information data internally, which in turn enables the above statements to become a Cyber Security reality.
The ROATI principle has been recently proven in our lab and was successfully used within our new class of computer components. Because of the above discoveries and developments, our line of computers and servers do not need or use Malware detection software.
I have had it confirmed by Silicone Valley Giants that components can be altered or built to our unique specifications.
Because of the hard to believe nature of the above statements, in order to demonstrate our new technology to funding agencies, although with limited financial resources, I am self-funding the development of a basic Proof of Concept email server.
How it works:
The basic ROATI system consists of three isolated and independent computers working in tandem, all contained within one housing.
The first stage computer, is where all incoming data files are received, "Malware infected or not". Once received, they may be pre-processed for saving or opening. This stage is configured in such a way as to absolutely prevent any malicious Malware from entering our main BIOS or Hard Drive.
The second stage, is where all information data files are passed through our new class of computer components. It is here where an information data file, even if it was infected by a Virus or Malware, is securely processed and transferred to the third stage computer as a "no-longer Malware infected information data file".
The third stage, depending on the ROATI model, may be one of our PCs or Network Servers. We have added a new hardware security feature, specifically designed to prevent the un-desirable USB or CD introduction of a Malware by: 1/ a malicious employee 2/ the un-intentioned detrimental activity of a good employee or 3/ the purposeful introduction of a Malware by a non-employee, outside hacker, yet normal USB and CD usage in enabled through a new security protocol. This feature is designed for the IT professional for network protection or for the security aware PC owner.
There is no longer a concern for downloading a file for doing off-site work on a lap-top, home computer or on another business computer, of which any of them may be Malware infected. Any newly infected work may be confidently uploaded back onto a ROATI protected system, without the fear of that new infection being uploading with that work.
The loading or updating of software is controlled under a new strictly controlled protocol. Details will be released once patent and copyright protection have been secured or will more likely be revealed as part of our product launch.
Because of the hard to believe nature of what we discovered, in order to obtain funding for commercial product development, I need to prove technology to funding agencies. I am self-funding the development of a basic Proof of Concept email server, although with very limited financial resources.
There are three main steps:
if the hardware can be built.
We needed to break through their customer service firewall in order to obtain access to senior design engineers. For each supplier, it has taken a good part of the last two years. But by being persistent and by using different approaches, recently we were able to get through to all the important engineers we needed to talk to and were able to obtain confirmation for our unique component designs.
2/ Build a Proof of
Should sufficient funding not be received, then I would seek out investors, a large Canadian bank has expressed interest once our POC email server is built.
Our final Challenge:
Our final challenge is to open a "no-longer Malware infected data file", without running any text based malicious scripts, while still being able to run desirable scripts, which are important for efficient computer usage.
We know how to overcome the script issue and are in the process of incorporating the solution. Once our script and hardware issues have been resolved, then our Proof of Concept Server will be ready to be built.
Anywhere a malicious Malware infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the costly and destructive release of confidential corporate data or sensitive personal data.
In short, anywhere in the world where information data needs to be Malware protected, including any unknown and yet to be discovered Malware, which would bypass existing Malware detection software.
Further research is needed to determine if the ROATI Principle can be applied to the IOT, IIOT, embedded products and industrial process control. Early indications are promising.
we can and cannot do:
We cannot prevent the access to our line of computers because of poor password management or poorly designed software. This is the domain of IT professionals or the responsibility of the PC user.
This may be hard to believe but personal wealth is not my primary objective, although personal wealth will be a consequence of my activity.
It is absolutely my primary objective to develop within the Ontario Technology Corridor, an industry supporting our Canadian manufactured ROATI Technologies Ultra Cyber Secure Computer Systems to the world.
No matter how much it is my objective to support the Canadian economy, this objective can only be achieved in the long term, with a well managed and highly profitable company.
Once successful and with strong corporate management in place, I may then devote time to providing a higher level of support to entrepreneurs, which is currently not being provided. To use my wealth to help them to succeed for the betterment of our Canadian economy. To build a business led new business hub for entrepreneurs, with the support of successful companies who share my vision.
This . . is . . my . . mission . . and a big part of my dream since an eight year old child.
Please read the following not as a complaint, but rather as an expression of our pride, as to what we have been able to accomplish so far.
We are slow to market because we are self-funding with very limited financial resources, we have received little to no support for our research and no support for the specialized technical expertise needed for completion. Yet we battle on since federally incorporating Sept 21, 2016. Because of my background in business and hardware, plus our perseverance and creativity, happily I can say we are close to demonstrating our technology, a technology which was thought to be impossible to achieve. Today we stand at the doorstep of an evolutionary shift in Cyber Security
With pride I can say, "we have been able to accomplish so much, with so little".
Here is a final thought for you, while we are slow to market, because of our limited financial resources, Canada and the Worlds Cyber Space remains under - preventable attack.
has been around since the very beginning of time.
me the knowledge and the experience gained in over
846-1233 EST, - 4 GMT, -5 UTC Phones
answered 8:00 am - 9:00 pm, 7 days per week.
Phones answered 8:00 am - 9:00 pm, 7 days per week.