ROATI Technologies Inc.
in development of
Ultra Cyber Secure Computers
August 12, 2018
We completely prevent all Malware infected data from entering our line of computer systems. This is accomplished by automatically converting all incoming data to no-longer infected data when data is presented to any input port. This is made possible because of our development of our new class of computer components, support software and procedures, which results in our sytems not needing or using Virus and Malware detection software.
The development of our new cyber secure hardware, software and procedures enables :
- the safe opening and processing of, previously infected data
- the safe opening and processing of, previously infected emails and attachments
- the safe visiting and processing of, infected web sites
We have developed a new approach as to how computers communicate and process data.
This document highlights how we accomplish this and our route to commercialization.
My Background :
I have over 30 years in electronic component technical sales and sales management, was instrumental in the supply of components used in three satellites circling the globe, received Canadian military security clearance, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.
All incoming data files, if they are or they are not infected with a Malware infection, are all automatically processed the same way and converted to a "no-longer Malware infected data file". This enables their safe usage and the safe sharing of that data with others, without the fear of a Malware spreading to others or infecting your system.
Because of a major change in our systems architecture, under normal operating conditions, it becomes impossible for any Malware infection, to infect our systems main BIOS or Hard Drive. This includes Malware infections which may attempt to enter via USB, CD, internet, WiFi, bluetooth, etc.
This high a level of Cyber Security is made possible because of our discovery of a new computer principle. This new computer principle, is that which led us to the development a new class of computer components, which in turn enables the above statements to become a Cyber Security reality.
As preposterous as this may sound, this level of Cyber Security is accomplished without the need or use of Virus or Malware detection software.
The ROATI principle has been recently proven in our lab and was successfully used within our new class of computer components.
I have had it confirmed by Silicone Valley Giants that components can be altered or built to our unique specifications.
Because of the hard to believe nature of the above statements, in order to demonstrate our new technology to funding agencies, I am self funding the development of a basic Proof of Concept email server.
How it works :
The basic ROATI system consists of three isolated and independent computers working in tandem, all contained within one housing.
The first stage computer, is where all data files, "Malware infected or not" are received. Once received, they may be opened or pre-processed for saving. This stage is configured in such a way as to absolutely prevent all malicious Malware infections from entering the BIOS or Hard Drive. Software updates for this stage are controlled under a new and strict protocol.
The second stage, is where all data files are passed through our new class of computer components. It is here where a data file, even if it was Malware infected, is securely processed, Malware removed and transferred to the third computer as a "no-longer Malware infected data file".
The third stage, depending on the ROATI model, may be one of our Personal Computers or Network Servers. In addition to a new software safety control protocol for all third stage computers, we added a new hardware security feature, specifically designed to prevent the undesirable USB and CD activity by: 1/ a malicious employee 2/ the un-intentioned but detrimental activity of a good employee or 3/ the purposeful introduction of a Malware by a non-employee, outside hacker.
There is no longer a concern for downloading a file for doing off-site work on a lap-top, home or on another business computer which may be Malware infected. Any newly infected work may be confidently uploaded back onto a ROATI protected system, without the fear of that new infection being uploading with that work.
The loading or updating of software is controlled under a new procedure. Details will be released once patent and copyright protection has been secured or more likely during product launch.
Our plan :
In order to obtain the necessary funding for commercial product development, we need to prove our technology by, self funding a basic Proof of Concept email server. There are three main steps.
Our final Challenge :
Our final challenge is to open that "no-longer Malware infected data file", without running potentially maliciously text based scripts, while still being able to run desirable scripts, which are important for efficient computer usage.
We know how to overcome the script issue and we are in the process of incorporating the solution. Once resolved, then our Proof of Concept Server will be ready to be built. Once built and demonstrated, then we will have finally overcome our first major corporate hurtle and we will be about to step onto the fast track to becoming a commercial reality.
Anywhere there is concern where a malicious Malware infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the release of confidential corporate or personal data.
Further research is needed to determine if the ROATI Principle can be applied to the IOT, IIOT, embedded products and industrial process control. Early indications are promising.
we can do :
We cannot totally control password management or other internal control systems. This is the domain of IT professionals or the responsibility of the desktop PC owner. However, for all third stages, we provide simple to use, new hardware Cyber Security control features and procedures, which "THEY" are responsible to implement in order to maintain the Ultra High Level of Cyber Security expected of a ROATI protected system.
The opening or sharing of Malware infected data, is no-longer problem for us. Once we are market ready, Malware infected data will no-longer be a problem for our customers.
It is my very absolute and primary objective to develop within the Ontario Technology Corridor, a Cyber Security industry supporting and supplying Canadian manufactured Ultra Cyber Secure Computer Systems to the world.
Please read the following paragraph as an expression of our pride, as to what we have been able to accomplish so far.
We are slow to market because we are self funding with limited capital, we have received little to no support for our research and no support for the specialized technical expertise needed for completion. Yet we battle on since federally incorporating Sept 21, 2016. Because of our background in business and hardware, plus our perseverance and creativity, I can say with pride we are close to demonstrating that proof of technology, a technology which was thought to be impossible to achieve. Today we stand at the doorstep of an evolutionary shift in Cyber Security. We have been able to accomplished so much, with so little.
Here is a final thought for you, while we are slow to market, because of our limited financial resources, Canada and the Worlds Cyber Space remains under - preventable attack.
has been around since the very beginning of time.
me the knowledge and the experience gained in over