Development of a new
Class of Computer Components,
Cyber Secure Computer Architecture &
Cyber Secure Process for Updating Software
Malware Detection Software Not Needed or Used
Path from Research to Commercialization
ROATI Technologies Inc.
January 10, 2019
Malware protection for the following is accomplished without the need or use of malware detection software.
Because of our research over the last two years, we have discovered a new way to safely protect against malware attacks resulting from a variety of internet activities, such as searching, video streaming, opening infected emails, or when clicking a link in that email to a malware infected web site. Also when a malware infected information data file is first presented to our system, we are able to safely open, edit or save that information data file, as a no longer infected data file.
We have developed two very important cyber security innovations. They are our discovery and in house development of a new class of computer components, which led to the development of a new malware secure computer architecture for our Input/Output (I/O) systems.
Additionally, we have added security features which prevents a malware from obtaining access to our systems main BIOS, processing and internal storage media areas and is also accomplished without the need or use of malware detection software.
The above has led us to a radical redesign of the computers circuitry and how information is processed within our line of ROATI Technologies, protected computer based products
As a consequence of our research into malware secure computer design, we have devised a new way to securely distribute " malware safe software". This new process is considerably safer for updating software than using the malware infested internet.
Once we obtain intellectual Property (IP) protection for our new method to securely distribute "malware safe software" and its support electronic products, which will be made in Canada, we can then provide this as a service which we can be monetized, thus providing us a consistent revenue stream. Plus this new method for distributing "malware safe software" can quickly, easily and securely be distributed to all our local and international customers.
After two years of research, the core principal of my hypotheses was recently proven in our lab by manually moving files through our various stages by using a human decision making process. We need to computer automate the process by building a very basic proof of concept email server, which would include the above described malware security innovations. We are on the brink of an evolutionary shift in cyber security. We now need government assistance to turn our discoveries into economic benefits for Canada.
Problem and Resolution:
The problem lies in the need to use of "detection software" to detect the presence of a "known malware", which is the Achilles Heel of current malware protection systems. The proof, is in the thousands of "yet to be discovered", new malware which are being unleashed every day, which easily bypass detection software.
When a "yet to be discovered" malware hits the cyber sphere, one can only hope for a very slow spreading of that malware on its journey toward your computer. It would be to late by now, if it that new malware had already infested the computer which you are now using to read this page and hopefully a RansomWare encryption was not in process. Currently one can only hope for a timely discovery of that new malware, the detection software company you selected can find a quick and effective patch, a prompt update is made available to their customers and if you are lucky, a timely update to protect your system.
All this does not occur instantly.
The costs and havoc caused by malware attacks on the economies of the world, is well documented and is forecasted to grow even larger in 2019.
I have felt for for several years, there just had to be a better way.
This caused my journey into researching why and how the various the parts of a computer communicate with each other and how a malware enters a system. It was when I discovered a new computer principle, which lead to the development of our new class of computer components, which in turn started the development of our line of malware secure, computer based products.
Our resolution is in what I have discovered and am developing; which is a safe, reliable and hardware based solution for the malware protection of our computer based products, which does not need or use malware detection software, resulting in our protecting against malware infestations while using the internet, opening emails and to enable the safe opening, using and saving of a previously infected information data file as, no longer infected. The basics of our path to market are explain below.
To develop within the Ontario Technology Corridor, an industry supporting our Canadian manufactured cyber secure computer systems, computer based products and software to the world.
I have over 30 years of experience in Canada, Europe and the USA; in electronic component technical sales, sales management, project management and as an SME business consultant; I was instrumental in the supply of components used in three satellites circling the globe, have held Canadian military security clearance for a special project, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.
All incoming information data files and internet activity, if they are or not infected with a malware, are all processed the same way. All incoming files enter through our first stage, which is our pre-processing stage and one of several stages, which all contribute to the high level of malware protection we will provide.
Under normal operating conditions, it is absolutely impossible for "any" malware to infect our systems main BIOS or hard drive.
A considerable amount of work has taken place over the last two years and recently I have had it confirmed by Silicone Valley Giants that components can be altered or built to our unique specifications.
Now we need to turn my research into a Canadian based industry, selling and supporting Canadian made malware secure computers, computer based products and software to the world.
The following is basically the above with more detail and background.
To those who Doubt:
I recognize it may be hard to trust my statements. Many will feel my statements are outright "impossible".
To those who doubt, as part of our initial product launch and media campaign, we will have ROATI Technologies computers set up at various public locations throughout North American. Both professional and novice Black Hat Hackers will be given complete access to attempt a malware penetration.
Prior to the above product launch and media campaign, I will provide to computer academics the first full technical disclosure of this new technology and I will provide them a complete explanation of, what I had to overcome as to what was thought to be outright "impossible" and express my appreciation to those who looked at my discoveries with an open mind and able to see opportunity for Canada.
The academics are those who will be teaching the future creators of solutions, to what was thought to be outright "impossible".
How it works:
The basic ROATI Technologies system consists of three isolated and independent computers working in tandem, all contained within one housing. The various stages communicate with each other through a new class of computer components which we developed in house.
Under normal operating conditions the first stage is configured in such a way as to absolutely prevent "any" malicious malware from entering our systems main BIOS or hard drive / solid state drive.
In this section is where many of our architecture changes and normal internet and information I/O processing systems are located and one of several reasons for the high level of malware security we are able to achieve.
For this stage we added a new security feature, which is designed to prevent an external storage media, such as a USB or CD, to introduce a malware, via: 1/ a malicious employee, 2/ the un-intentioned but detrimental activity of a good employee or 3/ the onsite introduction of a malware by an outside hacker.
Normal usage of an external storage media is enabled through a new security protocol. This feature is designed for the IT professional to protect their network or for the security aware PC user.
In order to demonstrate our new technology to obtain funding for commercial product development, I first need government support for a very basic proof of concept email server.
There are four main steps:
the core secret to a trusted government employee.
I am very cautions as to who I will disclose this to, because of the temptation and opportunity for great personal wealth to another and my concern for the potential loss to the Canadian economy if my secrets are improperly disclosed, especially since I have not yet obtained my intellectual property protection. Therefore, I would prefer to only disclose my secrets to a person I have met and I am totally confident that my secrets will not be disclosed to any other. I trust you, the reader, will appreciate my caution. However, my position is open for discussion, especially toward moving this project forward.
2/ Determine if the hardware can be built.
I have spent the good part of two years researching component variations with Silicone Valley giants. This has been quite the challenge as we are a new, unknown and unproven company.
It was difficult to break through their customer service firewalls in order to obtain access to senior design engineers. However, we were finally able to get through to all the important engineers we needed to talk to and were able to obtain confirmation for our unique component designs.
3/ Build a Proof of Concept server.
As we will then be armed with their "documented proof" that malware protection was actually accomplished without the need or use of virus or malware detection software, it will become obvious to all the very high level of malware protection we will be able to provide to the world and to Canada. Also it will be abundantly obvious the economic benefit for Canada. It is at this point that I will then make application to funding agencies for commercial product development.
Anywhere a malicious malware infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the release of sensitive corporate or personal information.
In short, anywhere in the world where the exchange of information data needs to be malware protected.
Further research is needed to determine if a combination of our new computer principle, our new class of computer components and new computer architecture, can be applied to the IOT, IIOT, embedded products and industrial process control. Early indications are promising, especially for SCADA and process control.
What we Can and Cannot do:
Due to the new way to use and operate our computer based products, it is recommended that new users take a 10 minute online course for proper use and operation.
For IT professionals and service personnel, they will be offered a longer training program. For the IT professional there are new security procedures, hardware security features and new ways to securely load software and updates. For service personnel, there is a major change to our systems architecture, new component functions, a new class of computer components and test points for ease of service diagnostics.
Since we federally incorporated September 21, 2016, it has taken us a considerable amount of hard work to take our research to the development stage to which we have been able to achieve .
We are at the door step of an evolutionary shift in cyber security and need government assistance to help make our discoveries and innovations an economic benefit for Canada.
With pride I can say, "that so far, we have been able to accomplish so much, with so little".
Here is a final thought for you, while we are slow to market, because of our limited financial resources, much of Canada and the worlds' Cyber space remains under - preventable attack.
I most sincerely invite your phone call to discuss the above. Our contact information is below.
Gravity has been around since the very beginning of time.
For me the knowledge and the experience gained in over
The above information is supplied for the purpose of indicating what we are attempting to achieve in malware protection. No commercial or personal decisions of any kind should be based on the above. The above states our objectives and may change prior to commercial release without notice. We hold no responsibility what so ever to maintain the above statements and comments as accurate or possible.
The above are our declared objectives, which we are heavily invested in attempting to achieve. However, we would not be so heavily invested for as long as we have been, unless we felt the above to be possible and achievable; for much has already been achieved.
Now we need help to turn our discoveries into a commercial reality for Canada.