Hardware Solution for
Malware Protecting Computers
ROATI Technologies Inc.
October 16, 2018
We discovered a purely hardware solution for the Malware protection of information data files and was reliably accomplished without the need or use of Virus - Malware detection software.
This also includes the reliable protection against any Malware which has yet to be discovered, which would easily bypass existing detection software and infect your computer or network.
Currently we are self funding a proof of concept email server to prove technology to funding agencies.
This document highlights how we are able to accomplish this high a level of Malware protection and our route to commercialization.
I have over 30 years in electronic component technical sales and sales management, was instrumental in the supply of components used in three satellites circling the globe, received Canadian military security clearance, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.
All incoming information data files, if they are or if they are not infected with a malicious Virus or Malware, are all automatically processed the same way. All incoming files enter via the first stage, which is our pre-processing stage and one of several stages, which all contribute to safe file usage and sharing of that data file with others, without the fear of a Virus or Malware infecting your computer or network.
Under normal operating conditions, it is absolutely impossible for "any" Malware to infect our systems main BIOS or Hard Drive.
The ROATI principle has been recently proven in our lab and was successfully used within our new class of computer components.
I have had it confirmed by Silicone Valley Giants that components can be altered or built to our unique specifications.
Because of the hard to believe nature of the above statements, in order to demonstrate our new technology to funding agencies, although with limited financial resources, I am self-funding the development of a basic Proof of Concept email server.
How it works:
The basic ROATI system consists of three isolated and independent computers working in tandem, all contained within one housing. The various stages communicate with each other via a new class of computer components developed in house.
The first stage computer, is where all incoming data files are received, "Malware infected or not". Once received, they may be pre-processed for saving. This stage is configured in such a way as to absolutely prevent "any" malicious Malware from entering our main BIOS or Hard Drive.
The second stage, is where all information data files are passed through our new class of computer components. It is here where an information data file, even if it was infected by a Virus or Malware, is securely processed and transferred to the third stage computer as a "no-longer Malware infected information data file".
The third stage, depending on the model, may be one of our PCs or Network Servers.
For the third stage we have added a hardware security feature, specifically designed to prevent the un-desirable USB or CD introduction of a Malware by: 1/ a malicious employee 2/ the un-intentioned but detrimental activity of a good employee or 3/ the introduction of a Malware by an outside hacker. Normal USB and CD usage is enabled through a new security protocol. This feature is designed for the IT professional for network protection or for the security aware PC owner.
The loading or updating of software is controlled under a different security protocol. Details will be released once patent and copyright protection have been secured or will more likely be revealed as part of our product launch.
There is no longer a concern for doing off-site work on a lap-top or home computer which may be Malware infected. Any newly infected work may be confidently uploaded back onto a ROATI protected system, without the fear of that new infection being uploading with that work.
Because of the hard to believe nature of what we discovered, in order to demonstrate our new technology to funding agencies, although with limited financial resources, I am self-funding the development of a basic Proof of Concept email server.
There are three main steps:
if the hardware can be built.
We needed to break through their customer service firewall in order to obtain access to senior design engineers. For each supplier, it has taken a good part of the last two years. But by being persistent and by using different approaches, recently we were able to get through to all the important engineers we needed to talk to and were able to obtain confirmation for our unique component designs.
2/ Build a Proof of
Our final Challenge:
Our final challenge is to open a "no-longer Malware infected data file", without running any text based malicious scripts, while still being able to run desirable scripts, which are important for efficient computer usage.
We know how to overcome the script issue and are in the process of incorporating the solution. Once our script and hardware issues have been resolved, then our Proof of Concept Server will be ready to be built.
Anywhere a malicious Malware infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the costly and destructive release of confidential corporate data or sensitive personal data.
In short, anywhere in the world where data needs to be Malware protected, including any unknown and yet to be discovered Malware, which would bypass existing Malware detection software.
Further research is needed to determine if the ROATI Principle can be applied to the IOT, IIOT, embedded products and industrial process control. Early indications are promising.
we Can and Cannot do:
We cannot prevent the access to our line of computers because of poor password management or poorly designed software. This is the domain of IT professionals or the responsibility of the PC user.
My primary objective is to develop within the Ontario Technology Corridor, an industry supporting our Canadian manufactured Cyber Secure Computer Systems to the world.
This . . is . . my . . mission.
Please read the following not as a complaint, but rather as an expression of our pride, as to what we have been able to accomplish so far.
We are slow to market because we are self-funding with very limited financial resources, we have received little to no support for our research and no support for the specialized technical expertise needed for completion. Yet we battle on since federally incorporating Sept 21, 2016. Because of my background in business and hardware, plus our perseverance and creativity, happily I can say we are close to demonstrating our technology, a technology which was thought to be impossible to achieve. Today we stand at the doorstep of an evolutionary shift in Cyber Security
With pride I can say, "we have been able to accomplish so much, with so little".
Here is a final thought for you, while we are slow to market, because of our limited financial resources, Canada and the worlds Cyber space remains under - preventable attack.
has been around since the very beginning of time.
me the knowledge and the experience gained in over
846-1233 EST, - 4 GMT Phones
answered 8:00 am - 9:00 pm, 7 days per week.
Phones answered 8:00 am - 9:00 pm, 7 days per week.