July 24, 2020
- For a quick overview of our discovery visit www.roati.com/overview
The single largest reason is our development of a New Class of Computer Components (NCoCC). The NCoCC was discovered at our lab at ROATI Technologies Inc. The NCoCC has many cyber attack protection features, the main one being that when user data file is presented to the input, even if that user file was malware infected, the output is "ALWAYS" no-longer-infected.
The NCoCC has enabled the major redesign of the architecture of the input section of our computers. The input section is where it is most common for a Malware to obtain access to your computer.
The basic architecture of our mass storage and processing stage has not been changed. This enables the use of existing software, operating systems and data. T
For the storage and processing stage, we have added a hardware security feature which prevents the introduction of a Malware via a USB, CD or Wi-F by a malicious employee, a well intentioned employee or an on-site hacker via a USB, CD or Wi-Fi. Access is controlled to only authorized personnel who have a physical key.
The new way which our NCoCC processes information will have a significant impact on the future Malware Secure usage of: 1/ desk top computers, 2/ enterprise systems, 3/ PLC, 4/ IOT, 5/ IIOT, 6/ critical infrastructure, 7/ SCADA, 8/ process control, 9/ and other computer applications currently under investigation. Our computers will be compatible with many current and heritage computers and systems.
Once funded, our discovery will lead to the development of a multi-billion dollar industry and establish Canada as a world leader in Cyber Security innovation and the manufacturer of Malware secure computer based products, for many years to into the future.
We realize that for some countries, will require some manufacturing in their respective countries. We are open for discussion, but are focused on controlling the quality of our product by manufacturing in Canada.
Bank Funding Made Available, if We Can Demonstrate Technology:
I had the fortuitous opportunity to have a meeting with a president of a major Canadian bank. Before leaving that meeting, that president offered to fund my commercial product development for a small equity stake. This offer is contingent upon building a Proof of Concept (PoC) computer, to demonstrate to their technical staff that our computers will performing as I described. I know it will, for the enabling technology has already been proven in my lab.
My name is Ralph Kachur, I have a 30+ year background in Canada and the USA; in electronic component technical sales, sales management, project management and as an SME business consultant, I have received Canadian military security clearance for a special project, have been privy to many electronic instrumentation design, marketing and business launch projects, invited speaker at the International Cyber Security Conference, published magazine author and was instrumental in the supply of components used in three satellites circling the globe.
My highest profile project was the supply of the CCD imaging sensor, used in the imaging portion of a European Space Agency Satellite, which produced from outer space the first images of the Aurora Borealis, looking like a crown hovering above earths north pole.
My exposure to a breadth of technologies during my 30+ years, has led me to this very important discovery.
To develop in Canada an industry designing, manufacturing and supporting our Malware secure computers, computer based products and software to the world.
view of the over one Trillion dollars which Cyber Attacks are
forecasted to annually cost the economies of the world, computers
manufactured by ROATI Technologies satisfies the worldwide demand
that their business and personal desktop computers are provided
protection against a Cyber Attack via a Malware Infection. Our
computers represents a realistic and significant economic benefit for
Ontario and Canada.
History, Problem and Resolution:
This heritage problem lies in the need to use "detection software" to detect the presence of a "known malware", before it infects the BIOS, UEFI or hard drive of your computer.
The danger for needing to detect the presence of a malware, is in the thousands of "yet to be discovered" new malware which are being unleashed every week, which can and do regularly bypass existing detection software products, such as McAfee or Norton. Despite their valiant efforts, detection software companies simply cannot keep up to the tidal wave of new Malware coming at them, as is demonstrated by the many Cyber Attacks caused by a Malware, such as Ransomware, which we all to regularly hear about in the news.
When a new and "yet to be discovered" malware hits the cyber sphere, one can only wish for a very slow spreading of that malware on its journey toward your computer.
Currently one can only hope for:
All this does not occur instantly.
Cyber attacks are reportedly costing the economies of the world over a Trillion dollars annually, of which Malware is the most common vehicle used for Cyber attacks. Cyber attacks are forecasted to grow even larger in 2021 - 2023. Our newly developed technology will put a significant dent into that forecasted cyber mayhem.
Although the current thinking is to detect the presence of a malware, I have felt for several years, there just had to be a better way.
This caused my multiyear journey into researching why and how the various the parts of a computer communicate with each other and how a malware enters a system. It was when I discovered a new computer principle, which rapidly lead to our in house development of our New Class of Computer Components (NCoCC), which in turn started us on our path to develop our line of Malware secure computers for the office, manufacturing plant, IIOT and critical infrastructure environments.
How it works :
The ROATI system consists of three physically isolated and independent computers working in tandem, all contained within one housing. The various stages communicate with each other through a New Class of Computer Components (NCoCC) developed in house. A computer engineer may think of it as a new method of physical virtualization. However, it is a completely new way of processing user data files.
The first stage
Contrary to current thinking, it is perfectly safe for a malware to be present in the first stage. The first stage is configured to 100% prevent "any" Malware from entering the main BIOS, UEFI or hard drive of our first stage.
It is in this first stage where we made a major redesign of the computers architecture and is one of several reasons for the high level of Malware safety we are able to achieve.
The second stage
For this stage we have added new security features, which includes a design to prevent an external storage media, such as a USB, CD or Wi-Fi to introduce a malware caused by a: 1/ a malicious employee, 2/ the un-intentioned but detrimental activity of a good employee doing work at home on their computer, which contains a "yet-to-be-discovered" Malware or 3/ the on premises introduction of a Malware by an onsite hacker.
Once trained on our new methods, IT professionals and security aware users will be able to confidently load "malware safe software and updates" and not have to worry about using the Malware infested internet.
We need to demonstrate proof of our new technology in order to obtain funding for commercial product development, but we first need government support to build a very basic Proof of Concept computer.
A PoC demonstrator is in fact quite easy to build as it can be built using existing technologies, discrete components and existing software. Our commercial production design is more complex and will require the specialized skills of low level computer hardware engineers, production engineers and software engineers.
There are four main steps:
the core secret to a trusted government employee.
I am very cautions as to who I will disclose this to, mainly because of the temptation to another to gain great personal wealth and my concern for the potential loss to the Canadian economy if my secrets are improperly disclosed. Although an NDA will need to be signed, I would prefer to only disclose my secrets to a person I have met and I am totally confident that my secrets will not be disclosed to another. However, that person needs to be of such stature, within the government, that others will believe what that person has to say about my discoveries and innovations. I trust you, the reader, will appreciate my caution. However, my position is open for discussion, especially if it means moving this project forward.
2/ Determine if the hardware can be built.
I have spent the good part of the first two years researching our component variations with Silicone Valley giants and international suppliers from India to Germany. This has been quite the challenge as we are a new, unknown and unproven company.
It was difficult to break through their customer service firewalls in order to obtain access to senior design engineers. However, we were finally able to get through to all the important senior engineers we needed to talk to and were able to obtain confirmation for the all the custom electronic components necessary for our unique designs.
3/ Build a Proof of Concept server.
I have to date:
However, the cost of custom components for prototyping, circuit board design and some software development are beyond our ability to self-fund, therefore we are now facing the need for government assistance.
As we will then be armed with "documented proof" that malware protection was actually accomplished without the need or use of virus or malware detection software, it will become obvious to all, the very high level of malware protection we will be able to provide to Canada, the world and the considerable economic benefit for Canada which our Malware innovations represents. It is at this point, that I will then make application to funding agencies for commercial product development and or sit down with the president of that major Canadian bank mentioned at the beginning of this article.
Anywhere a malicious malware can infect a computers BIOS, UEFI or hard drive, destroy data, ransom data, cause costly data misinformation or the release of sensitive personal, corporate or military information.
In short, anywhere in the world where the protection of electronic information is needed.
Other Malware Safe uses for our NCoCC:
Other markets currently under investigation for our NCoCC include: use in laptop computers, tablets, cell phones, instrumentation applications and others. The major obstacle for entering these markets is the high cost for R&D to miniaturizing our NCoCC into a hybrid / integrated circuit. Miniaturization is needed for high volume production of portable and industrial IOT products. We just cannot afford the high cost of a hybrid R & D project at this very early stage of our corporate development, but is certainly part of our long term objectives and business plan.
Enterprise Systems: (a special market)
The enterprise market for our NCoCC is broken down into several sub categories. Here are a few:
Malware Secure Computers and our NCoCC based products manufactured in Canada by ROATI Technologies Inc., will significantly reduce the level of Malware infections which are inflicted upon enterprise and government systems, therefore significantly reducing the high financial costs of mitigating the damage from an actual attack. Also, the indirect costs caused by the loss of corporate reputation due to the public announcements of an attack because of the requirements of GDPR and other similar international standards.
What we Can and Cannot do:
Since we federally incorporated September 21, 2016, it has taken us a considerable amount of perseverance to reach the stage which we have been able to achieve to date.
We are on the precipice of an evolutionary shift in cyber security. Now all we need is a feather of help to tilt us over the edge and to turn our discoveries into a significant economic benefit for Canada.
With pride, I quote Winston Churchill, "we have accomplish so much, with so little".
Here is a final thought for you, while we are slow to market, because of our limited financial resources, much of Canada and the worlds' Cyber space remains - under preventable attack.
I most sincerely invite you, the reader, to contact me, to challenge or question the above statements or to make any suggestions you may have to offer.
Gravity has been around since the very beginning of time.
For me the knowledge and experience gainedby
30+ years in electronic components,
I cannot see the future, only the now.
I can only hope that what I do today
will prepare me for tomorrows now.
NOTICE: The above are our declared objectives, of which we are heavily invested in attempting to achieve. However, we would not be so heavily invested for as long as we have been, unless we felt the above to be possible and achievable; for much has already been achieved. We now need help to turn our discoveries into a commercial reality for Canada.
As we are in the development
stage, no decision
of any kind should be based on the above and is subject to change