Development of a new

Class of Computer Components,

Cyber Secure Computer Architecture &

Cyber Secure Process for Updating Software 

Malware Detection Software Not Needed or Used

Path from Research to Commercialization

ROATI  Technologies  Inc.

January 10, 2019


Introduction :

Malware protection for the following is accomplished without the need or use of malware detection software.

Because of our research over the last two years, we have discovered a new way to safely protect against malware attacks resulting from a variety of internet activities, such as searching, video streaming, opening infected emails, or when clicking a link in that email to a malware infected web site.  Also when a malware infected information data file is first presented to our system, we are able to safely open, edit or save that information data file, as a no longer infected data file.   

We have developed two very important cyber security innovations.  They are our discovery and in house development of a new class of computer components, which led to the development of a new malware secure computer architecture for our Input/Output (I/O) systems.  

Additionally, we have added security features which prevents a malware from obtaining access to our systems main BIOS, processing and internal storage media areas and is also accomplished without the need or use of malware detection software.   

The above has led us to a radical redesign of the computers circuitry and how information is processed within our line of ROATI Technologies, protected computer based products

As a consequence of our research into malware secure computer design, we have devised a new way to securely distribute " malware safe software".  This new process is considerably safer for updating software than using the malware infested internet.  

Once we obtain intellectual Property (IP) protection for our new method to securely distribute "malware safe software" and its support electronic products, which will be made in Canada, we can then provide this as a service which we can be monetized, thus providing us a consistent revenue stream.  Plus this new method for distributing "malware safe software" can quickly, easily and securely be distributed to all our local and international customers. 

After two years of research, the core principal of my hypotheses was recently proven in our lab by manually moving files through our various stages by using a human decision making process.  We need to computer automate the process by building a very basic proof of concept email server, which would include the above described malware security innovations.  We are on the brink of an evolutionary shift in cyber security.  We now need government assistance to turn our discoveries into economic benefits for Canada.


Problem and Resolution:

The problem lies in the need to use of  "detection software"  to detect the presence of a "known malware",  which is the Achilles Heel of current malware protection systems.  The proof, is in the thousands of "yet to be discovered", new malware which are being unleashed every day, which easily bypass detection software. 

When a "yet to be discovered" malware hits the cyber sphere, one can only hope for a very slow spreading of that malware on its journey toward your computer.  It would be to late by now, if it that new malware had already infested the computer which you are now using to read this page and hopefully a RansomWare encryption was not in process.  Currently one can only hope for a timely discovery of that new malware, the detection software company you selected can find a quick and effective patch, a prompt update is made available to their customers and if you are lucky, a timely update to protect your system. 

All this does not occur instantly.

The costs and havoc caused by malware attacks on the economies of the world, is well documented and is forecasted to grow even larger in 2019.

I have felt for for several years, there just had to be a better way.  

This caused my journey into researching why and how the various the parts of a computer communicate with each other and how a malware enters a system.  It was when I discovered a new computer principle, which lead to the development of our new class of computer components, which in turn started the development of our line of malware secure, computer based products.

Our resolution is in what I have discovered and am developing;  which is a safe, reliable and hardware based solution for the malware protection of our computer based products, which does not need or use malware detection software, resulting in our protecting against malware infestations while using the internet, opening emails and to enable the safe opening, using and saving of a previously infected information data file as, no longer infected.   The basics of our path to market are explain below.


My Mission:

To develop within the Ontario Technology Corridor, an industry supporting our Canadian manufactured cyber secure computer systems, computer based products and software to the world.


My Background:

I have over 30 years of experience in Canada, Europe and the USA; in electronic component technical sales, sales management, project management and as an SME business consultant;  I was instrumental in the supply of components used in three satellites circling the globe, have held Canadian military security clearance for a special project, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects. 



All incoming information data files and internet activity, if they are or not infected with a malware, are all processed the same way.  All incoming files enter through our first stage, which is our pre-processing stage and one of several stages, which all contribute to the high level of malware protection we will provide.

Under normal operating conditions, it is absolutely impossible for "any" malware to infect our systems main BIOS or hard drive. 

A considerable amount of work has taken place over the last two years and recently I have had it confirmed by Silicone Valley Giants that components can be altered or built to our unique specifications.  

Now we need to turn my research into a Canadian based industry, selling and supporting Canadian made malware secure computers, computer based products and software to the world. 


The following is basically the above with more detail and background.


To those who Doubt:

I recognize it may be hard to trust my statements.  Many will feel my statements are outright "impossible". 

To those who doubt, as part of our initial product launch and media campaign, we will have ROATI Technologies computers set up at various public locations throughout North American.  Both professional and novice Black Hat Hackers will be given complete access to attempt a malware penetration.

Prior to the above product launch and media campaign, I will provide to computer academics the first full technical disclosure of this new technology and I will provide them a complete explanation of, what I had to overcome as to what was thought to be outright "impossible" and express my appreciation to those who looked at my discoveries with an open mind and able to see opportunity for Canada. 

The academics are those who will be teaching the future creators of solutions, to what was thought to be outright "impossible".


How it works:

The basic ROATI Technologies system consists of three isolated and independent computers working in tandem, all contained within one housing.  The various stages communicate with each other through a new class of computer components which we developed in house.

   The first stage:
is where all incoming data files are received, "malware infected or not".  Once received, they may be pre-processed for second stage processing for saving to our third stage.  

Under normal operating conditions the first stage is configured in such a way as to absolutely prevent "any" malicious malware from entering our systems main BIOS or hard drive / solid state drive.  

In this section is where many of our architecture changes and normal internet and information I/O processing systems are located and one of several reasons for the high level of malware security we are able to achieve.

   The second stage:
is where all information files are passed through our new class of computer components.  It is here where internet activity, video streaming, emails and information data file transfers, even if they were infected by a virus or malware, are securely processed and may be transferred to the third stage computer as "no-longer malware infected". 

   The third stage:
may be thought of as what one would consider an existing design for a PC or server, but is different.  It is similar in that it is in this stage where most of our general computer processing, and long term storage media is located.  This stage is also where certain important security processes are located. 

For this stage we added a new security feature, which is designed to prevent an external storage media, such as a USB or CD, to introduce a malware, via: 1/ a malicious employee,  2/ the un-intentioned but detrimental activity of a good employee  or  3/ the onsite introduction of a malware by an outside hacker.  

Normal usage of an external storage media is enabled through a new security protocol.  This feature is designed for the IT professional to protect their network or for the security aware PC user.

   All stages:
For all stages the loading or updating of, "malware safe software", is controlled under a new and secure protocol.  Details will be released once our patent and copyright protections have been secured or will more likely be revealed as part of our product launch.


Our plan:

In order to demonstrate our new technology to obtain funding for commercial product development, I first need government support for a very basic proof of concept email server.

There are four main steps:

   1/   Disclose the core secret to a trusted government employee.
Due to my need to obtain government support and because my statements are likely hard to believe, I will need to disclose the core secrets of the technology and the basics of my business plan, to a trusted government employee.  Once disclosed the opportunity for Canada will become abundantly obvious.  

I am very cautions as to who I will disclose this to, because of the temptation and opportunity for great personal wealth to another and my concern for the potential loss to the Canadian economy if my secrets are improperly disclosed, especially since I have not yet obtained my intellectual property protection.  Therefore, I would prefer to only disclose my secrets to a person I have met and I am totally confident that my secrets will not be disclosed to any other.   I trust you, the reader, will appreciate my caution.  However, my position is open for discussion, especially toward moving this project forward.

   2/   Determine if the hardware can be built.

I have spent the good part of two years researching component variations with Silicone Valley giants.  This has been quite the challenge as we are a new, unknown and unproven company.  

It was difficult to break through their customer service firewalls in order to obtain access to senior design engineers.  However, we were finally able to get through to all the important engineers we needed to talk to and were able to obtain confirmation for our unique component designs. 

    3/   Build a Proof of Concept server.
Some standard components have been purchased.  Certain solvable computer PCB design challenges need professional advice.  I have proven the core principle in my lab, I have confirmed custom components, I have self-funded our research and our development to date, plus I have attempted to self-finance a proof of concept server.  The cost of custom components for prototyping, circuit board design and some software development are beyond our ability to self-fund, therefore we are facing the need for government assistance.

    4/   Demonstrate technology.
I have an independent ethical hacker who will do aggressive malware penetration testing.  Also I will request government cyber security specialists to do aggressive malware penetration testing.  Likely I will approach the Canadian Centre for Cyber Security branch of the Communications Security Establishment. 

As we will then be armed with their "documented proof" that malware protection was actually accomplished without the need or use of virus or malware detection software, it will become obvious to all the very high level of malware protection we will be able to provide to the world and to Canada.  Also it will be abundantly obvious the economic benefit for Canada.  It is at this point that I will then make application to funding agencies for commercial product development.



Anywhere a malicious malware infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the release of sensitive corporate or personal information

In short, anywhere in the world where the exchange of information data needs to be malware protected.

Further research is needed to determine if a combination of our new computer principle, our new class of computer components and new computer architecture, can be applied to the IOT, IIOT, embedded products and industrial process control.  Early indications are promising, especially for SCADA and process control.


What we Can and Cannot do:


"We cannot" prevent access to our computers because of poor password management or poorly designed software.  These are the responsibilities of IT professionals or the security aware PC user. 

All "we can do" is to provide systems which can: 

  • absolutely prevent a malware from entering our systems main BIOS or Hard Drive / Solid State Drive,

  • allow for the safe opening of infected emails and safely allow for links to infected web sites,

  • allow for safe general internet activity, including video streaming,

  • allow for the safe opening, using and saving of, infected information data files, as no longer infected, 

  • securely process desirable text based scripts, while preventing undesirable text based script attacks,

  • prevent the unauthorized access and introduction of a malware to our processing and internal storage media areas with an external storage media such as a USB or CD,

  • any malware infection obtained while doing off site work, may be confidently uploaded back onto our systems, without the fear of that new malware being uploaded to our protected system with that work,

  • if a hacker obtains a users password, that hacker will only have access to what that user has access to.  Any attempt for a malware entry will be prevented, resulting in being protected against a potential system wide malware attack.  This feature has strong potential for application for enterprise systems.

  • reliably doing all the above, without the need or use of Virus or malware detection software,

  • and to allow for a safer way to load, "malware safe software" and updates.



Due to the new way to use and operate our computer based products, it is recommended that new users take a 10 minute online course for proper use and operation.  

For IT professionals and service personnel, they will be offered a longer training program.  For the IT professional there are new security procedures, hardware security features and new ways to securely load software and updates.  For service personnel, there is a major change to our systems architecture, new component functions, a new class of computer components and test points for ease of service diagnostics. 



Since we federally incorporated September 21, 2016, it has taken us a considerable amount of hard work to take our research to the development stage to which we have been able to achieve .   

We are at the door step of an evolutionary shift in cyber security and need government assistance to help make our discoveries and innovations an economic benefit for Canada

With pride I can say, "that so far, we have been able to accomplish so much, with so little".  

Here is a final thought for you, while we are slow to market, because of our limited financial resources much of Canada and the worlds' Cyber space remains under -  preventable attack.

I most sincerely invite your phone call to discuss the above.   Our contact information is below.

Safe computing.


Ralph Kachur, 
ROATI Technologies Inc.

Protecting Electronic Information

with a Hardware Based solution

Proudly designed by and will be made by Canadians   

I am often asked:

How can you develop this when thousands of computer professionals
have not?

My answer is :

Gravity has been around since the very beginning of time.
It took Isaac Newton, over 300 years ago to see
the obvious.

For me the knowledge and the experience gained in over
30 years of electronic component technical sales,
was helpful.

The above information is supplied for the purpose of indicating what we are attempting to achieve in malware protection.  No commercial or personal decisions of any kind should be based on the above.  The above states our objectives and may change prior to commercial release without notice.  We hold no responsibility what so ever to maintain the above statements and comments as accurate or possible.  

The above are our declared objectives, which we are heavily invested in attempting to achieve. However, we would not be so heavily invested for as long as we have been, unless we felt the above to be possible and achievable; for much has already been achieved.  

Now we need help to turn our discoveries into a commercial reality for Canada.

ROATI  Technologies  Inc.

1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8

(905) 846-1233 EST,  -4  GMT
(800) 458-3089   USA  &  Canada

Phones answered

8:00 am - 9:00 pm 13 hours / day,  7 days / week
9:00 am - 5:00 pm Atlantic to Hawaii / Alaska time zones.

≥ 1 hour all time zones