Hardware Solution for

Malware Protecting Computers

ROATI  Technologies  Inc.

  October 3, 2018 

Introduction:

We discovered a purely hardware solution for the Malware protection of data files and has been reliably accomplished without the need or use of Virus or Malware detection software.  

The following series of events has led us to this point in our development:

- we discovered a new computer principle

- which led us to the development of a new class of computer components

- which enabled us to develop a new computer architecture

- which makes it possible for us to protect against "any" Malware attached to an information data file. 

This also includes the reliable protection against any Malware which has yet to be discovered, which would easily bypass existing detection software and Malware infect your computer or network.

Currently we are self funding a proof of concept email server to prove technology to funding agencies.

This document highlights how we are able to accomplish this high a level of Malware protection and our route to commercialization.

 

My Background:

I have over 30 years in electronic component technical sales and sales management, was instrumental in the supply of components used in three satellites circling the globe, received Canadian military security clearance, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.

 

Overview:

All incoming information data files, if they are or if they are not infected with a malicious Virus or Malware, are all automatically processed the same way.  All incoming files enter via the first stage, which is our pre-processing stage and one of several stages, which all contribute to safe file usage and sharing of that data file with others, without the fear of a Virus or Malware infecting your computer or network.

Under normal operating conditions, it is absolutely impossible for "any" Malware to infect our systems main BIOS or Hard Drive. 

The ROATI principle has been recently proven in our lab and was successfully used within our new class of computer components.

I have had it confirmed by Silicone Valley Giants that components can be altered or built to our unique specifications. 

Because of the hard to believe nature of the above statements, in order to demonstrate our new technology to funding agencies, although with limited financial resources, I am self-funding the development of a basic Proof of Concept email server.

 

How it works:

The basic ROATI system consists of three isolated and independent computers working in tandem, all contained within one housing.

The first stage computer, is where all incoming data files are received, "Malware infected or not".  Once received, they may be pre-processed for saving.  This stage is configured in such a way as to absolutely prevent "any" malicious Malware from entering our main BIOS or Hard Drive. 

The second stage, is where all information data files are passed through our new class of computer components.  It is here where an information data file, even if it was infected by a Virus or Malware, is securely processed and transferred to the third stage computer as a "no-longer Malware infected information data file".  

The third stage, depending on the model, may be one of our PCs or Network Servers. 

For the third stage we have added a hardware security feature, specifically designed to prevent the un-desirable USB or CD introduction of a Malware by: 1/ a malicious employee  2/ the un-intentioned but detrimental activity of a good employee or 3/ the introduction of a Malware by an outside hacker.  Yet, normal USB and CD usage is enabled through a new security protocol.  This feature is designed for the IT professional for network protection or for the security aware PC owner.

The loading or updating of software is controlled under a different security protocol.  Details will be released once patent and copyright protection have been secured or will more likely be revealed as part of our product launch.

There is no longer a concern for doing off-site work on a lap-top or home computer which may be Malware infected.  Any newly infected work may be confidently uploaded back onto a ROATI protected system, without the fear of that new infection being uploading with that work.

 

Our plan:

Because of the hard to believe nature of what we discovered, in order to demonstrate our new technology to funding agencies, although with limited financial resources, I am self-funding the development of a basic Proof of Concept email server.

There are three main steps:

   1/   Determine if the hardware can be built.
I have spent the good part of two years confirming the availability of components with Silicone Valley giants.  This has been quite the challenge as we are a new, unknown and unproven company.  

We needed to break through their customer service firewall in order to obtain access to senior design engineers.  For each supplier, it has taken a good part of the last two years.  But by being persistent and by using different approaches, recently we were able to get through to all the important engineers we needed to talk to and were able to obtain confirmation for our unique component designs. 

    2/   Build a Proof of Concept server.
Much of the hardware has been purchased and modified.  Once some hardware procurement and minor design challenges have been resolved, then our Proof of Concept server can be finished and we will be ready to demonstrate our newly developed Cyber Secure Computer technology.

    3/   Demonstrate technology.
We will hire an independent ethical hacker and request government cyber security specialists to do aggressive Malware penetration tests of our Proof of Concept email server.  Armed with their documented proof that Malware protection was actually accomplished without the need or use of Virus or Malware detection software, we will then apply to funding agencies for commercial product development.  

 

Our final Challenge:

Our final challenge is to open a "no-longer Malware infected data file", without running any text based malicious scripts, while still being able to run desirable scripts, which are important for efficient computer usage.  

We know how to overcome the script issue and are in the process of incorporating the solution.  Once our script and hardware issues have been resolved, then our Proof of Concept Server will be ready to be built.  

 

Markets:

Anywhere a malicious Malware infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the costly and destructive release of confidential corporate data or sensitive personal data.  

In short, anywhere in the world where data needs to be Malware protected, including any unknown and yet to be discovered Malware, which would bypass existing Malware detection software.

Further research is needed to determine if the ROATI Principle can be applied to the IOT, IIOT, embedded products and industrial process control.  Early indications are promising.

 

What we Can and Cannot do:

We cannot prevent the access to our line of computers because of poor password management or poorly designed software.  This is the domain of IT professionals or the responsibility of the PC user.  


All "we can do" is to provide systems which:

  • Absolutely prevent any Malware infections from entering our systems main BIOS or Hard Drive.

  • Safely process all incoming information data, Malware infected or not-infected.

  • Enable the safe opening or sharing of Malware infected emails or attachments, as not-infected

  • Allow for the safe visiting of Malware infected web sites, without infecting our system.

  • Protect against any unknown or yet to be discovered Malware, which would easily bypass existing detection software.

  • and by reliably doing so without the need or use of Virus or Malware detection software.  

My Mission:

My primary objective is to develop within the Ontario Technology Corridor, an industry supporting our Canadian manufactured Cyber Secure Computer Systems to the world.  

This objective can only be achieved with a well managed and profitable company.

This . .  is . .  my . .  mission . .  and the focus of my entrepreneurial journey since a child.

 

Conclusion:

Please read the following not as a complaint, but rather as an expression of our pride, as to what we have been able to accomplish so far.

We are slow to market because we are self-funding with very limited financial resources, we have received little to no support for our research and no support for the specialized technical expertise needed for completion.  Yet we battle on since federally incorporating Sept 21, 2016.   Because of my background in business and hardware, plus our perseverance and creativity, happily I can say we are close to demonstrating our technology, a technology which was thought to be impossible to achieve.  Today we stand at the doorstep of an evolutionary shift in Cyber Security

With pride I can say, "we have been able to accomplish so much, with so little".  

Here is a final thought for you, while we are slow to market, because of our limited financial resources, Canada and the worlds Cyber space remains under - preventable attack. 

Safe computing.


Ralph Kachur,
President,
ROATI Technologies Inc.  


Protecting Electronic Information
     
with Ultra Cyber Secure Computers       

 

I'm often asked:
How can you develop this when thousands of computer professionals
have not?


My answer is:

Gravity has been around since the very beginning of time.
It took Isaac Newton, over 300 years ago to see
the obvious.

For me the knowledge and the experience gained in over 
30 years of electronic component technical sales,
was helpful. 

 

ROATI  Technologies  Inc.
1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8
Canada

(905) 846-1233   EST,   - 4 GMT,  - 5 UTC
(800) 458-3089   USA  &  Canada

Phones answered  8:00 am - 9:00 pm, 7 days per week. 

www.roati.com 

ralph@roati.com