ROATI  Technologies Inc.

Ultra Cyber Secure Computers


Summary :  

We can safely receive and open "binary infected files" which are automatically convert to "no-longer binary infected files".  This includes the safe visiting of infected web sites.  Also the safe opening and saving of infected emails and their attachments.  All this is accomplished without the need or use of Virus or Malware detecting software.  

As preposterous as this may sound, in our lab I have proven the ROATI principle actually works.  The ROATI principle is that which enables the above to become a commercial reality.  

Over an eight month period I have had it confirmed by Silicone Valley giants that components can be altered or manufactured to my specification. Currently I am self funding the development of a Proof of Concept (POS) email server, in order to demonstrate our new technology to funding agencies.  Once funding for commercial product development is received, then we will become ready to supply to the world, Canadian manufactured Ultra Cyber Secure systems.


How it works :

The basic ROATI system consists of three isolated and independent computers working in tandem, all contained within one housing.

It is in the first isolation stage in which all files, "infected or not", are received and may be opened.   This stage is configured in such a way as to block any malicious infections such as a Virus or Malware from entering the systems main BIOS or Hard Drive.  

All files are then passed through our interrogation stage, which is a new class of computer components which we have developed in house.  It is here where files are passed to the third isolated computer as "no-longer binary infected files". 

Depending on the model, the third stage may be either a basic desktop or network server.  This stage also contains certain features to limit the activity of malicious employees and the accidental or purposeful introduction of an infection to the system via USB or CD.

By developing the ROATI line of Ultra Cyber Secure systems, we will effectively eliminate hackers primary tool used for their malicious RansomWare, Virus, Malware, Trojan-Horse and other forms of unscrupulous attacks. 


My Background :

I have over 30 years in electronic component technical sales and sales management, was instrumental in the supply of components used in three satellites circling the globe, have received Canadian Military security clearance, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.


Our plan :

In order to obtain the necessary funding for commercial product development, we need to proof technology by first building a Proof Of Concept (POC) email server.

To demonstrate a POC Server there are three main stages.

1/   Determine if the hardware can be built.
I have spent over eight months researching suppliers and have had it confirmed by Silicone Valley Giants that components can be built to my specification.  

    2/   Build a POC internet server.
Hardware has been purchased and modified.  Once some design challenges have been resolved then our POC server can be completed and ready to demonstrate technology.

    3/   Demonstrate technology.
Once a POC email server has been built and hard tested by contracted independent ethical hackers and government cyber specialists, I will then be able to demonstrate that we have proof of our Ultra Cyber Secure Computer design.  Armed with hard proof, I will then make application to funding agencies for commercial product development.


Markets :

Anywhere a malicious electronic infection can infect a computers BIOS or hard drive.

Further research is needed to determine if the ROATI Principle can be applied to the IOT, IIOT and embedded products.  Early indications are promising.


Conclusion :

We cannot completely control password management, malicious employees, or other internal control systems.  This is the domain of IT professionals.  

All we can do is :

  • prevent a binary infestation from entering our systems main BIOS or Hard Drive, 

  • safely use and save "binary infected files" as "no-longer binary infected files", 

  • when visiting infected websites, prevent a system wide binary infection,

  • safely open and save infected emails and their attachment 

  • and by doing the above without the need or use of Virus or Malware detection software.  

Opening a binary infected file is longer a problem for us.  Saving that previously infected file, without running a text based scrip, while still being able to run desirable scripts, is our final challenge.  I know how to overcome this issue.  Once resolved, the ROATI principle will then be ready to become a commercial reality.  

It is my primary objective to develop within the Ontario Technology Corridor, a manufacturing industry supplying Ultra Cyber Computer systems to the world.

Since our inception of September 2016, we have accomplished much with little.  However, we are slow to market because we are self funding with limited capital and have received little to no support for research and for needed specific technical expertise in certain areas. While we are slow to market, Canada and the Worlds Cyber Space remains under preventable attack.

Please be in contact if you wish to know more, or you would like to take part in an evolutionary shift in Cyber Security.

Ralph Kachur,
ROATI Technologies Inc.  

Protecting Electronic Information
with Ultra Cyber Secure Computers


I'm often asked:
How can you develop this when
thousands of computer professionals have not?

My answer is:

Gravity has been around
since the very beginning of time.
It took Isaac Newton, over 300 years ago
to see the obvious.

For me the knowledge and the experience gained
in over 30 years of electronic component technical sales,
was helpful

ROATI  Technologies Inc.
1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8

(905) 846-1233   
EST,   - 5 GMT
(800) 458-3089  
USA  &  Canada 

       Updated  -  June 20, 2018  -  Rev 31