Advanced hardware architecture which disables the execution of malware – looking for licensees
A German SME, active as distributor and local service partner of electronic devices, has developed hardware architecture which hinders the execution of malware and enables hereby the search for the producer. The system offers several advantages in comparison with state of the art malware detection software systems. The SME is searching for production licensees.
The SME is searching for industrial partners, active in the production of computers of all scales, including multi-processor main frame systems and mobile or handheld devices, as well as low capacity devices for the facilitation of machine to machine communication area interested in production licenses for the further development of own hardware products, as scientific, fail safe, mini and maxi computers.
A German SME, active as distributor for electronic devices of an American manufacturer and as a consultant for German clients of this manufacturer, has developed an advanced hardware architecture which disables the execution of malware. Currently most cyber-attacks are launched by executable code hidden in data. Successful hacker attacks prove that state of the art software based safety systems are not sufficiently effective. The systems offered by the German SME hinders the execution of malware as the insertion of malware into IT-systems cannot be completely blocked with justifiable efforts. The architecture of the system renders the execution of such malware as technically impossible. An additional benefit of the solution is that the traces of the hacker cannot be erased after the installation of the malware which enables the search for the perpetrator by IT forensics. The hardware architecture solution is applicable to computers of all scales, including multi-processor main frame systems and mobile or handheld devices. Of particular interest may be the introduction of the system in low capacity devices for the facilitation of machine to machine communication as required for an efficient and secure internet of things. The implementation of the architecture does not require new components. The SME is searching for production licensees to achieve licensing revenues. Licensees will have the opportunity to use the offered system in a specific region or for specific systems.
Advantages and innovations
The hardware architecture offers the following advantages: - the execution of malware is disabled. - traces of the hacker cannot be erased after the installation of the malware which enables the search for the perpetrator by IT forensics. - the hardware architecture solution is applicable to computers of all scales. - the implementation of the architecture does not require new components.
Intellectual Property Rights (IPR)
Register your interest
How it works
- Tell us about yourself
- We’ll discuss with you
- We put the right partners in touch
EEN help you find the right partner, rather than you going it alone.
Our role is to review and collate the most suitable submissions, and then send them to the client who posted the opportunity. We consult with you, and the client, to make the process professional and easy.
These are live opportunities. Your registration of interest on the site is just like a professional approach to a business at a networking event. To stand the best chance of success, make your submission really sing. Sell why the client who posted the opportunity should work with you. Excite them. Ask questions. Try and avoid copy and pasting words from elsewhere.
Once the client has chosen their partner, we'll introduce them over email and keep in touch with both parties to see how it's going. Sometimes things progress quickly. Sometimes because of changing priorities for either party, things progress slowly, but you never know - your next big business break could start right here.
First we need to check you’re human.
Thank you for verifying your email. We have sent you a confirmation email containing a 6 digit verification code to unlock the form below