and Detailed Explanation
< Summary > : April 8, 2021
Malware Ransomware attacks happen because current software techniques are just not working.
The problem is not the software, the problem is how the basic computers process that data.
ROATI Technologies made a major discovery, leading us to a redesign as to how our computers processes data. This computer redesign enables a considerably higher level of malware security than is currently available for PCs and servers.
For ROATI x86 Malware Secure Computers, new, old and custom, software and operating systems are equally well protected.
may sound impossible to some. This level of security is actually accomplished without
the need or use of Detection Software, Encryption, VPN, or Analytics.
The enabling technology has been proven in
Our computer redesign is a major technological leap forward for the malware protection of information data and represents a significant economic opportunity for Canada.
We are an underfunded company, building a Proof of Concept (PoC) for a president of major Canadian bank president, who offered to fund our commercial product development for a small equity stake, contingent upon a PoC demonstration. Building a PoC while being under funded, is proving to be a challenge.
You are invited to reach out to help us. We will be receptive to any help, to move this technology forward.
Support offered today, will be expressed in a more meaningful way tomorrow, once we are market ready.
This is a ground floor opportunity, please step up to help us today.
< Detail > :
A Malware is a “Malicious Software” which is specifically
designed to disrupt, damage or gain unauthorized access to a computer
system. e. g. Virus,
Ransomware, Worm, Botnet, Trojan etc.
Our discovery is a new hardware based computer
not another software improvement.
Request: I most sincerely invite your inquiries.
The Canadian Internet Registration Authority (www.cira.ca)
, in 2020 forecasted
that cyber attacks are expected to annually cost the economies of the
world $6 Trillion dollars by 2021. Malware is a major
contributor to that costly and expected cyber mayhem.
detection software companies, such as McAfee and Norton, do a valiant job
at trying to prevent a malware attack, the fact is, they first need to
detect the presence of a new and never before discovered malware.
By the time a new malware is actually discovered, there is a time
delay for developing a patch, that patch is then uploaded to their web
sites and eventually uploaded to an end users computer. Because of
these delays, Malware attacks happen.
overcome these delays, detection software companies use analytics to look
for “known” behavior patterns of malware.
Despite their best efforts to analyze "known" behaviors, Malware
infections still get in. The
proof is in the many Ransomware attacks which regularly happen.
the cloud, although generally considered safe, malware attacks still
My Background: During
my 30+ years in electronic component technical sales, sales management and
project management, I have been exposed to a breadth of electronic design
technologies. Including working on the supply of electronic components
used in three satellites circulating the globe.
My highest profile satellite was working with the engineers for the
supply of the CCD imaging sensor, which was used in the European Space
Agency satellite, which produced from outer space the first images of the
Aurora Borealis, hovering like a crown above earths North Pole.
I was a speaker at the International Cyber Security and Information Security Conference. Also I am honored to have been invited as a keynote speaker at the, International Forensic Sciences Conference 2021, in Osaka Japan. I have had an article published in the Canadian military technology magazine Vanguard. The article was on the need for the government to form a new department to take a second look at rejected funding applications www.roati.com/vanguard.
8, 2016 I discovered a new computer principle, which led me to the design
of a New Class of Computer Components, which led me to the design of a new
section/process for computers which is our Virus Blocking Interface
Hardware (VBIH), which in turn led me to a new way for the basic computer
to "safely" process information files without the need or use of
Detection Software. Realizing the significance of this
discovery, I federally incorporated ROATI Technologies Inc.,
September 21, 2016.
is an acronym for Ralphs
Onto A Technology
Proof of Discovery: I presented a malware infected Word document to the input of the VBIH, the output was the same Word document, but “no longer malware infected”.
As impossible as this may sound, this was
without the need or use of Detection Software, Encryption, VPN or Analytics.
This is significant.
This is an internal proof of discovery. To prove this discovery to the world, I need to build a Proof of Concept (PoC) to prove that, what I say what my redesigned computer can do, can actually be done.
Malware Secure Computer Design:
The ability of our VBIH to “safely” process a Malware Infected
information files, has enabled a major redesign of the computers
architecture, enabling this previously never thought possible, high level of
Description: A ROATI computer
consists of four "physically isolated and independent zones";
Input, Output, Neutral and Processing Zones.
Each of these "physically independent" and isolated zones safely
communicate with each other through the VBIH of the Neutral Zone.
The four independent zones work together to form one computer,
which safely communicates with the Malware Infected outside world.
above is a typical off the shelf type of computer, consisting of the
"inner connected" input, output and processing and storage
stages. They are all electrically attached to and directly communicate with each
other, allowing for a malware to obtain entry, be processed, stored, do
its damage, then that malware is shared with others and that malware
easily spreads, inflicting its malicious damage.
The Malware Infected World: is the malware infested world of the internet, incoming storage media such as USB, CD, Wi-Fi, Bluetooth, the Cloud, unsecured computers on a network, etc.
The Input Zone: of a ROATI computer, “safely” works with both clean and malware infected user data files. Modern computers used today, consider opening a malware infected file as dangerous, we do not. In fact, we can and do "safely" use Malware Infected user data files. For us processing a Malware infected file is an advantage. This will seem counterintuitive to those who do not know how a ROATI Computer works.
The Output Zone:
is the isolated output section where "only" malware safe
data is exported.
The Neutral Zone:
is the isolated section consisting of the
Virus Blocking Interface Hardware (VBIH) and support
the core to the new way by which we can safely process both clean and
malware infected information data. When either a clean or a malware
infected information file is presented to the input, the
output is always "no longer infected". This new
newly discovered way to process information files is accomplished without
the need or use of detection software, encryption, VPN or analytics.
The VBIH is the core to our discovery.
of the way the VBIH process files, it
is impossible for a malware to get into the Processing Zone,
from an email, internet activity, including an external hackers attempting
to install a malware to exploit a Zero day Vulnerability.
The Processing Zone: can be thought of as your standard computer. You may use modern off the shelf software, modern o/s, your own custom software, heritage software and older operating systems. New and old, software and operating systems are equally well protected.
An additional hardware feature is
prevents the introduction of a malware by a malicious employee, a clumsy
employee or an onsite hacker. Access
for software updates are controlled only by authorized personnel under a
new and specific security protocol.
A new level of malware protection for our Data.
start of a computer manufacturing industry in Canada
thousands of high tech jobs.
exporting of our Canadian manufactured computers, will help contribute to
reducing our trade deficit and will help to bring in new foreign capital,
which will be re-invested into supporting Canadian technology.
new industry will help Canada to becoming an even stronger technology and
corporate taxes and wealth generated for Canadians will help to compensate
for the governments climbing deficit, due to the COVID-19 pandemic.
Deficit spending has been needed to protect the economy and to provide
support for those who have been adversely affected.
< Conclusion > :
A little bit of help today, will help ROATI Technologies provide all the above and more.
ROATI computer discovery, is a major technological leap forward for the
Cyber protection of information data and represents a significant economic
benefit for Canada.
are on the precipice of an evolutionary shift in Cyber Security.
I invite you to contact me to discuss rolling up our sleeves
together. This is a ground floor opportunity, please be in contact.
this page as a Word Document, Download