ROATI  Technologies Inc.

in development of

Ultra Cyber Secure Computers

  August 20, 2018  

Introduction:

We prevent all Virus and Malware infected data from entering our new line of computer systems.  This is accomplished by automatically converting all incoming data to no-longer infected data.

We have developed a new class of computer components, which has enabled us to develop new methods as to how computers communicate internally, which results in our being able to safely receive and process data, even if that data was Malware infected when originally presented to our system.

The following document may sound preposterous, however we have proven the following in our lab and is accurately written.

Our development of a new class of computer components, enables us to no longer need or use Malware detection software.  Malware detection software will only protect against a known Malware.  We do not need to be fearful of any unknown and yet to be discovered Malware, which would bypass existing detection software products.  Undiscovered Malware can easily infect most computers on the market today, of which you are most likely using one to read this document.   Because of our new class of computer components and support software, we can now safely receive and process data, even if that data was Malware infected when originally presented to our system.

The development of our Ultra Cyber Secure Computer Systems enable us to safely open and process:

   -  infected and not infected, data

   -  infected and not infected, emails and data attachments

   -  infected and not infected, web sites

   -  we accomplish the above without the need or use of Virus or Malware detection software

This document highlights how we accomplish this and our route to commercialization.

 

My Background:

I have over 30 years in electronic component technical sales and sales management, was instrumental in the supply of components used in three satellites circling the globe, received Canadian military security clearance, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.

 

Summary:

All incoming data files, if they are or they are not infected with a Malware infection, are all automatically processed the same way and converted to a "no-longer Malware infected data file".  This enables their safe usage and the safe sharing of that data with others, without the fear of a Malware spreading to others or infecting your system.

Because of a major change in our systems architecture, under normal operating conditions, it becomes impossible for any Malware infection, to infect our systems main BIOS or Hard Drive.  This includes Malware infections which may attempt to enter via USB, CD, internet, Wi-Fi, Bluetooth, etc. 

This high a level of Cyber Security is made possible because of our discovery of a new computer principle.  This new computer principle, is that which led us to the development a new class of computer components, which in turn enabled us to develop new methods as to how computers communicate internally, safely receive and process data, which in turn enables the above statements to become a Cyber Security reality.  

This level of Cyber Security is accomplished without the need or use of any Virus or Malware detection software.

The ROATI principle has been recently proven in our lab and was successfully used within our new class of computer components. 

I have had it confirmed by Silicone Valley Giants that components can be altered or built to our unique specifications

Because of the hard to believe nature of the above statements, in order to demonstrate our new technology to funding agencies, although with limited financial resources, I am self-funding the development of a basic Proof of Concept email server.

 

How it works:

The basic ROATI system consists of three isolated and independent computers working in tandem, all contained within one housing.

The first stage computer, is where all incoming data files are received, "Malware infected or not".  Once received, they may be opened or pre-processed for saving.  This stage is configured in such a way as to absolutely prevent all malicious Malware infections from entering the main BIOS or Hard Drive.  Any software and software updates for this stage are loaded under a new and strictly controlled safety protocol and a major departure from currently accepted software loading procedures.

The second stage, is where all data files are passed through our new class of computer components.  It is here where a data file, even if it was infected by a known or even an unknown malicious Virus or Malware, is securely processed and transferred to the third stage computer as a "no-longer Malware infected data file".  Virus and Malware detection software is not needed or used.

The third stage, depending on the ROATI model, may be one of our PCs or Network Servers.  We have added a new hardware security feature, specifically designed to prevent the undesirable USB and CD activity by:   1/ a malicious employee   2/ the un-intentioned but detrimental activity of a good employee or  3/ the purposeful introduction of a Malware by a non-employee, outside hacker.  This feature is designed for the IT professionals for network protection or for the security aware PC owner.

There is no longer a concern for downloading a file for doing off-site work on a lap-top, home or on another business computer which may be Malware infected.  Any newly infected work may be confidently uploaded back onto a ROATI protected system, without the fear of that new infection being uploading with that work.

The loading or updating of software is controlled under a new strictly controlled procedure.  Details will be released once patent and copyright protection has been secured or will more likely be released as part of our product launch.

 

Our plan:

In order to obtain the necessary funding for commercial product development, although we have limited financial resources, we need to prove our technology by, self-funding a basic Proof of Concept email server. 

There are three main steps:

    1/   Determine if the hardware can be built.
I have spent the good part of two years confirming the availability of components with Silicone Valley giants.  This has been quite the challenge as we are an unknown, new and unproven company.  Also we are not a well-known computer manufacturer with a large research budget supporting innovation.

We first needed to break through their customer service firewall in order to obtain access to senior design engineers.  For each supplier, it has taken a good part of the last two years.  But by being persistent, recently we were finally able to get through to all of the important engineers we needed to talk to.

When talking to those component engineers, it was often difficult for them to comprehend why we would make such design changes.   However, we were able to eventually obtain confirmation for our unique component designs and were able to do this without revealing our reasons, which could have revealed the secrets of our new technology. 

    2/   Build a Proof of Concept server.
Much of the hardware has been purchased and modified.  Once some hardware procurement and design challenges have been resolved, then our Proof of Concept server can be finished and we will be ready to demonstrate our newly developed computer design and Cyber Secure technology.

    3/   Demonstrate technology.
We will hire independent ethical hackers and request government cyber security specialists to do aggressive Malware penetration tests of our Proof of Concept email server.  Armed with their documented proof that our Malware protection was actually accomplished without the need or use of Virus or Malware detection software, we will then apply to funding agencies for commercial product development.

 

Our final Challenge:

Our final challenge is to open our "no-longer Malware infected data file", without running any potentially maliciously text based scripts, while still being able to run desirable scripts, which are important for efficient computer usage.  

We know how to overcome the script issue and we are in the process of incorporating the solution.  Once resolved, our Proof of Concept Server will be ready to be built.  Once built and demonstrated, then we will have finally overcome our first major corporate hurtle.  Then we will most certainly be ready to step onto the fast track to becoming a commercial reality.

 

Markets:

Anywhere a malicious Malware infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the costly and destructive release of confidential corporate data or sensitive personal data.

Further research is needed to determine if the ROATI Principle can be applied to the IOT, IIOT, embedded products and industrial process control.  Early indications are promising.

 

What we can do:

We cannot totally control password management or other internal control systems.  This is the domain of IT professionals or the responsibility of the desktop PC owner.  However, for all third stages, we provide simple to use, new hardware Cyber Security control features and procedures, which "THEY" are responsible to implement in order to maintain the Ultra High Level of Cyber Security expected of a ROATI protected system.


All "WE" can do is to provide systems which:

  • prevent any Malware infection from entering our systems main BIOS or Hard Drive

  • automatically convert all incoming data to "no-longer Malware infected data" 

  • when visiting websites, prevent Malware infections from entering our system

  • enable the safe opening or sharing of Malware infected emails or data attachments, as they will be "no-longer Malware infected"

  • and by doing so without the need or use of Virus or Malware detection software.  

The opening or sharing of Malware infected data, is no-longer problem for us.  Once we are market ready, Malware infected data will no-longer be a problem for our customers.

 

Conclusion:

It is my primary objective to develop a Cyber Security industry, within the Ontario Technology Corridor, supporting the supply of Canadian manufactured Ultra Cyber Secure Computer Systems to the world.

Please read the following paragraph, not as a complaint, but rather as an expression of our pride, as to what we have been able to accomplish so far.

We are slow to market because we are self-funding with limited financial resources, we have received little to no support for our research and no support for the specialized technical expertise needed for completion.  Yet we battle on since federally incorporating Sept 21, 2016.   Because of my background in business and hardware, plus our perseverance and creativity, happily I can say we are close to demonstrating our technology, a technology thought to be impossible to achieve.  Today we stand at the doorstep of an evolutionary shift in Cyber Security.  

With pride I can say, "we have been able to accomplish so much, with so little".  

Here is a final thought for you, while we are slow to market, because of our limited financial resources, Canada and the Worlds Cyber Space remains under - preventable attack. 

Safe computing.


Ralph Kachur,
President,
ROATI Technologies Inc.  


Protecting Electronic Information
     
with Ultra Cyber Secure Computers       

 

I'm often asked:
How can you develop this when thousands of computer professionals
have not?


My answer is:

Gravity has been around since the very beginning of time.
It took Isaac Newton, over 300 years ago to see
the obvious.

For me the knowledge and the experience gained in over 
30 years of electronic component technical sales,
was helpful
.
 

 

ROATI  Technologies  Inc.
1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8
Canada

(905) 846-1233   EST,   - 5 GMT
(800) 458-3089   USA  &  Canada

Phones answered  8:00 am - 9:00 pm, 7 days per week.

www.roati.com 
ralph@roati.com 

If you have read this far, you must be interested.  I understand that the above may be hard to believe.  Be assured it is true.  I sincerely invite your phone call to discuss.