ROATI  Technologies Inc.

in development of

Ultra Cyber Secure Computers


Summary :

All incoming files, if they are "binary infected or not" are all automatically converted to a "no-longer binary infected file" for the safe opening, saving or the sharing of that file with others, as a "no-longer binary infected file"

It is 100% impossible for any binary infections to enter our systems main BIOS or Hard Drive.  This includes any binary infections which may attempt to enter via the internet, CD, USB , WiFi, bluetooth, emails and their attachments. 

As preposterous as this may sound, this level of Cyber Security is accomplished without the need or use of Virus or Malware detection software. 

We are able to provide this high a level of Cyber Security because of the discovery of a new class of computer components, which we developed in house.  

The ROATI principle is that which enables the above to become an Ultra Cyber Secure reality.  It has been proven in house that the ROATI principle does work. 

We have had to make major changes to many standard computer components, plus newly designed component never used in computers before.  It has been confirmed, by Silicone Valley giants, that components can be either altered or manufactured to our unique specifications. 

Because of the hard to believe nature of the above statement, in order to demonstrate our new technology to funding agencies, I am self funding the development of a basic Proof of Concept email server.  


How it works :

The basic ROATI system consists of three isolated and independent computers working in tandem, all contained within one housing.

The first stage computer is where all files, "binary infected or not", are received, may be opened or pre-processed for saving.  This stage is configured in such a way as to 100% prevent any malicious infections such as a Virus or Malware (binary infection) from entering the BIOS or Hard Drive of this first stage computer.

The second stage is where files are passed through a new class of computer components which we have developed in house.  It is through this stage where a file is safely transferred to the third computer as a "no-longer binary infected file".  

The third stage, depending on the model, may be one of our desktop PCs or network servers.  All computers used in this stage, have security features which are designed to prevent the undesirable USB or CD activities of an un-intentioned or malicious employee or the purposeful infection by an undesirable intruder.   

It is no longer a problem when down loading a file, for doing off site work on a lap-top, home or other business system which may be infected.  Any newly binary infected work may be confidently uploaded back onto a ROATI protected system, without the fear of that binary infection being uploading with that work.

Users of a ROATI protected system will be protecting their data by effectively eliminating hackers primary tool used for their malicious RansomWare, Virus, Malware, Trojan-Horse and other forms of unscrupulous attacks.


My Background :

I have over 30 years in electronic component technical sales and sales management, was instrumental in the supply of components used in three satellites circling the globe, have received Canadian Military security clearance, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.


Our plan :

In order to obtain the necessary funding for commercial product development, we need to prove our technology by first building a basic Proof of Concept email server, of which there are three main steps.

    1/   Determine if the hardware can be built.
I have spent over eight months researching suppliers and have had it confirmed by Silicone Valley Giants that components can be altered or built to our specifications.  

    2/   Build a POC internet server.
Hardware has been purchased and modified.  Once some hardware design challenges have been resolved then our Proof of Concept server can be completed and ready to demonstrate technology.

    3/   Demonstrate technology.
Once a Proof of Concept email server has been hard tested by contracted independent ethical hackers and government cyber specialists, I will then have demonstrated the high level of Cyber Security which a ROATI protected system provides.  Once armed with their documented proof and their recommendations, I will then apply to funding agencies for commercial product development.


Markets :

Anywhere there is concern where a malicious binary infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the release of confidential corporate or personal data

Further research is needed to determine if the ROATI Principle can be applied to the IOT, IIOT and embedded products.  Early indications are promising.


Conclusion :

We cannot totally control password management, malicious employees, or other internal control systems.  This is the domain of IT professionals or the responsibility of the PC owner.  However, we do provide simple to use and new Cyber Security control features and procedures, which  "THEY"  are responsible to implement in order to maintain the High Level of Cyber Security expected of a ROATI protected system.

All  "WE"  can do is to provide systems which:

  • prevents a binary infection from entering our systems main BIOS or Hard Drive, 

  • safely use, save and share "binary infected files" as "no-longer binary infected files"

  • when visiting infected websites, prevent binary infections from entering the system,

  • safely open and save infected emails and their infected attachments, as no-longer infected 

  • and by doing so without the need or use of Virus or Malware detection software.  

Opening a binary infected file is no longer a problem for us.  Our final challenge is to save or open that "no-longer binary infected file" without running any undesirable text based scripts, while still being able to run desirable scripts, which are important for efficient computer usage.  

We know how to overcome the script issue and are in the process of incorporating the solution into our design.  Once resolved then our Proof of Concept Server will be ready for demonstration.  Once demonstrated, then we will have finally overcome our first major hurtle and will be about to step onto the fast track of becoming a commercial reality.

It is my primary objective to develop within the Ontario Technology Corridor a Cyber Security industry, supplying Canadian manufactured Ultra Cyber Secure Computer systems to the world.

Please read the following paragraph as an expression of our pride as to what we have accomplished so far.

We are slow to market because we are self funding with limited capital, we have received little to no support for our research and no support for the specialized technical expertise needed for completion.  Yet we battle on since federally incorporating Sept 21, 2016.   Because of our hardware background, creativity and determination, with pride I can say we are close to demonstrating that proof of technology, a technology which was thought to be impossible to achieve.  Today we stand at the doorstep of an evolutionary shift in Cyber Security.  We have accomplished so much with so little.  

Here is a final thought for you, while we are slow to market, because of limited financial resources, Canada and the Worlds Cyber Space remains under preventable attack. 

Safe computing.

Ralph Kachur,
ROATI Technologies Inc.  

Protecting Electronic Information
with Ultra Cyber Secure Computers


I'm often asked:
How can you develop this when
thousands of computer professionals have not?

My answer is:

Gravity has been around
since the very beginning of time.
It took Isaac Newton, over 300 years ago
to see the obvious.

For me the knowledge and the experience gained
in over 30 years of electronic component technical sales,
was helpful

ROATI Technologies Inc.
1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8

(905) 846-1233   EST,   - 5 GMT
(800) 458-3089   USA  &  Canada 

       Updated   -   July 18, 2018   -   Rev 37