The main focus of GRAVIO system is an individual.

We mean a modern, mobile and busy individual.

An ordinary person who has a house or an apartment, a car, a family and friends, and a job.


A person who takes care of his family members. Takes children to school, helps partner with the housework, looks after elderly parents. He makes every effort to keep his family and property safe. Equips his living space with protection devices, mounts an alarm system on the car.


A person who meets his friends, colleagues and business partners. Sometimes such meetings need silence, solitude, privacy. A person who shares messages, photos and videos with others and want to be sure that the information will remain confidential.

In real world a person acts to ensure his personal safety.


And what about digital world? All the same using digital channels of communication and various applications?


Let’s look at some usual and unusual cases and perform a side-by-side comparison of a real world situation and its digital counterpart.




In real world: imagine yourself talking in private with someone and then some stranger coming up and joining in your chat.

Obviously, you will ask him to leave or will move away from him with your opponent. In other words, you decide on the amount of space you need in this particular situation.

And how about digital world? Even when it comes to something as basic as mobile phones, you could never judge on the level of privacy. Perhaps, that stranger is somewhere nearby listening to you speaking.


Your car

Your car in real life. Imagine yourself stopping on the roadside and looking for something in the trunk. Suddenly, a stranger comes up to you, opens the driver's door, opens up the hood and starts connecting his laptop to the board computer. It is obvious that you will shout at him, pull out the brace out of the trunk and will move towards the stranger intending to ask politely if he was lost or something. Here, again, you are in control of a safe space and take sufficient measures to prevent an incident.

In a digital world a vendor provides the ability to interact with your vehicle remotely, for example, through a special application. To begin with, it is most likely that the proposed system is a proprietary or closed solution and there is absolutely no way to verify what the vendor says in the promotional materials. Secondly, there are always some hidden vulnerabilities that are not always timely eliminated due to closeness of the software. All of this provides wide opportunities to find vulnerabilities and create exploits for the car security system and a subsequent theft. But this is only a part of the problem. Modern cars are in fact fairly high-performance computers controlled through the central board computer. If someone was to gain access to the central board computer that controls all vehicle systems, he could in fact take control of your car and, intentionally or not, disable some system function on the move, which could lead to an accident and potentially sad consequences.


Your house

Your apartment/house in real world. You approach the house and see some stranger wearing a uniform with no labels doing something in your telecommunications panel. You come closer and see that his laptop is connected to your home network and he is making some adjustments in the settings of the surveillance cameras. Of course, you will immediately react to it and at least ask him to stop and get out, and at best will try to detain him and call the police. Again, you control the situation.

In digital world - your smart home or its part is connected via the cloud service of the vendor. Again, it is likely to be quite expensive and a closed solution. Proprietary. With all its features and disadvantages. You are forced to trust the vendor's word that the system is safe and cannot be cracked. Let's assume this is true. However, you still can't be sure that someone from support service of the vendor will not be tempted to connect to the deployed infrastructure of your home and will not receive the data without your knowledge (such as video recording), thus violating your privacy. Or even worse - shut off the system of registration of incidents for some time, allowing his partner in crime enter your home.



In real world - an outpatient at home. There is a number of devices, allowing you to keep track of his state. By reading this data you can always understand how bad/good the condition of your loved one is. Imagine suddenly coming back home earlier than usual and seeing a stranger in your house. He is already collecting some tools and is about to leave. You see that part of the bedside devices is disabled. Of course, you will try to detain a stranger and call the police. Thus, you will promptly react to a sudden threat.

In digital world. The level of development of the mobile services offered by the different vendors of the medical equipment is quite impressive. These are certainly proprietary, closed solutions. As a rule, you simply trust the vendor of the medical equipment by default since they care about you and your loved one. And therefore you rely completely on the mobile solutions that allow you to monitor the patient's condition remotely. First, as mentioned above, any proprietary decision may potentially contain (and it does contain in 99% of the cases) the hidden vulnerability that can be used in order to obtain access to the information transmitted via open communication channels, such as Internet. Secondly, the protocols of healthcare data exchange, for example HL7, are typically open XML-like protocols, which do not assume the presence of the data encryption options in their specification. In best case scenario, the medical equipment suppliers use the SSL tools like channel and session encryption for encryption in various embodiments, which in turn are subject to attack by a Man-In-The-Middle. Based on the potential vulnerability, an attacker could gain access to the private medical information. And if he becomes a mediator between the data center vendor and medical devices in your house, he can – (intentionally or not) make adjustments to the control information that is transmitted on to the medical devices and thus force them to work non-standardly which eventually could lead to the most disastrous consequences.


Your child

Your child in real world. Your child is walking home from school. You can always call him and check up on him. You can go out to meet him on his way home or, in some cases, even pick him up directly from school. In almost all cases you are aware of the child’s whereabouts and state.  And you are ready to protect him from any trouble that he could face on his way. You usually control the situation and know what is happening to your child at the present moment.

In digital world. It is difficult to find a child of school age who does not have a smartphone with him.  The phone is with your kid on his way to/from school and in the classroom. As a rule, he has installed a number of games and applications for social communication. Perhaps, in order to limit his online presence you even choose to disable the use of mobile Internet on his smartphone. After all, like all parents, you are just trying to protect your child from various adverse effects of certain web sites and potential intruders. But children always test the limits. They will always find a way to get what they want and “hack” the parental control. And often they do succeed. When the mobile Internet is disabled they can find a public Wi-Fi access point (or ask a friend to “share” Internet through Wi-Fi) and connect to it. They can stop responding to the calls and messages, thereby “hiding” from annoying parents for a while. They can even (and in general this is not a secret and can be proven by performing a 5 minute search on the Internet) install almost any program on their smartphone to bypass the “policy of the software installation” protected by the password that you have set.


Your's photos

In the real world. Photographs and special moments captured on video. With a digital camera or a digital video camera you can always be sure that everything you shoot stays with you on a flash drive of the device. And if you accidentally leave the device somewhere in a public place and suddenly notice that it was picked up by a stranger who is looking through your photos on the screen, you're likely to ask politely to return the camera. Thus, you control what can be seen and who can see it. Thereby you support a circuit of personal security.

In digital world. The level of the mobile technology development right now is such that in fact everyone has a photo- and video camera-in-one - a smartphone. Taking a picture and sending it to Instagram became an ordinary event. Sharing with the members of the group is the easiest task and most of messengers support such feature. Sending a personal photo to your spouse also is not a problem, since the majority of the messengers provide the opportunity to encrypt the channel or even data in p2p mode. In this case, it means that your photo will not be available to anyone except the recipient. However, here we are also faced with the fact that the majority of messengers are a proprietary, closed solution. Even if the client part is an open platform (open source), the server platform will be closed in all cases. And of course, there is no certainty that the staff of the datacenter where the servers are located do not have an access to your transferred content (the only exception is p2p chats with asymmetric encryption where the transmitted text message cannot be read without a private key of the recipient). Encryption of the attachments (such as photos) usually is not available. Perhaps, you or your friends found yourself in a situation when the pictures that were not intended for the general public leaked to Internet? That photo was taken on a smartphone and sent directly to the person using a messenger? At the same time you are certain that the recipient did not share this photo? Does this sound familiar?



Safety in a digital world is one of the cornerstones underlying the modern life. But not the only one. Another cornerstone is equally important and directly associated with the security. We are talking about mobility. 


Mobility means that people can solve everyday problems/issues effectively, disregarding location.


We all have a variety of applications installed on our smartphones. We trust these applications to organize the different areas of our daily routine. The truth is that with each new app designed to help us make life easier we are adopting another “pet”. You have to look after it: to feed and clean it. That’s right. Each new application requires a set-up and setting up all the parameters necessary for the operation. However, an application also needs to be maintained: to change priorities, to enter tasks, change the schedule, modes and so on.


This happens because our life is not a written scenario with a set of input parameters and selected algorithm. Our life has many sides to it, is absolutely unpredictable and ever changing. We meet people, we agree on something, we have changing priorities, current challenges and new opportunities that we are trying to use. Life flows and changes and we change with it, while the programs designed to help us along the way do not. We are trying to create an assistant in our daily affairs and concerns, and it turns out to be yet another family member that requires our attention and participation.

But we did not ask for that much! We need an assistant to:

  • Help us plan our day

  • Track events

  • React to changes and gently offer the solution

  • Give the most appropriate advice in the current situation

  • Help us look after the children/family

  • Help us look for the required goods/services and order them

  • Help us share information with family/friends/colleagues

  • Help us travel

  • Help us move around/navigate in an urban environment

This has to be a smart assistant. An assistant able to adjust the time on the alarm clock using the knowledge how much time you usually need to get ready after finding and booking the best flight for you, according to the previous task.  


An assistant who would study the usual routes and offer advice on your way home or to the office. To remind you of important tasks and upcoming events.

Assistant, which would allow to fully concentrate on essential work. Often, when you should be focused on something important, dedicating all the strength and energy you have to stop from time to time to take care of some minor tasks that also need your attention at a certain time. It would be so nice to rely on someone who could gently remind you of this in order to let you work on what is really vital.


Digital security and mobility are indeed the ultimate cornerstones of a person’s life underlying modern existence. However, there is another important aspect. We are talking about the earning opportunity. It is not surprising that these three components are quite closely intertwined.


By earnings opportunity we mean the ability to freely distribute the results of your work and get rewards for it. The nature of your work is not so important-whether you take pictures, write music, conduct online courses, draw, develop 3D models, write poetry or prose, consult - it can be any job that allows earning from the comfort of your home using the digital technology.


To make this work one needs to be a constant participant of some online communities, often more than one. This is needed to expose your work or services to as many potential customers as possible. Perhaps, you are even forced to use some special tools to promote your services.


Both platform and tools (usually realized in search engines) are paid and sometimes quite pricey. But you do know that you have no choice and are forced to pay. And this payment is written off your account disregarding how helpful it will be to promote your goods or services.


The platforms where these sites are deployed are usually closed and belong to some organizations.  Materials that you place on them are strictly speaking not yours any longer. They are yours but uploaded on the server according to the rules set by the owner of the site. That is, you don't control what happens to the results of your hard work.

Besides, as a rule various sites have their own processes and peculiarities of work with the payment systems.


Traditionally, the classic debit cards are used and the payment is made through an accredited provider and a widely known payment system. Payments and control over them are usually performed by the site. Let's say somebody paid for your product/service with a debit card, for example VISA. The site receives payment confirmation, gives access to download your photos.


However, later it turns out that the card which was used to pay was stolen and the real owner reported the theft to the issuing Bank. The Bank submits a request to the VISA payment system to cancel the payments that have been done since the theft. The site will be notified on the charge-back and that the funds will be debited from the account of the site. The site may try to challenge this requirement, but is not likely to succeed. The money will be debited from the account of the platform in favor of the recipient.


Generally,  the site will not wish to lose its income and will write off the sum from your account, as de facto you are the beneficiary and the platform is only a facilitator. Such intermediary takes no risks and in fact generally turns out not being responsible for anything: the payment is through, noted by the platform, a platform provided an access to download photographs, pictures are downloaded, but you did not receive the money.


We came up with an idea of a system that would meet the challenges of our time just over a year ago. We based our reasoning on just three basic elements that underlie our modern life:


We formulated the basic principles and requirements that formed the basis of the concept and later the architecture of the system. Here are some of them:


  • The system should be open -  both program (source codes) and hardware (drawings, blueprints and basic schemes).

  • The system at its core needs to be decentralized.

  • The system must support high level of encryption of the transmitted and stored data.

  • The system should be freely scaled by adding new nodes, built on the designed hardware platform, and on the basis of conventional high performance PCs and server platforms.

  • The system should support the ability to connect smart home (its elements), and the car to secure personal network, which in turn is a part of a protected global network.

  • The system should allow you to connect smartphones, laptops, personal home computers to secure personal network.

  • Must allow the possibility to create a secure and personal, autonomous to a sufficient extent, system for the collection and storage of archive information, such as photos, videos, various documents, video data, other information in real-time, etc.

  • The system should allow you to connect various household appliances and medical home devices to a secure personal network.

  • The system should have simple and intuitive interface of user interaction.

  • The system should have the interface that allows to communicate with it in a natural language (text and voice).

  • The system must possess the tools and mechanisms that allow the system to learn and draw conclusions (machine learning, cognitive technologies, elements of AI, voice and text analyzers and synthesizers).

  • The system should allow users to communicate among  themselves, create groups.

  • The system should provide the ability to make audio and video calls between individual users and the group (recording and archiving).

  • The system should provide the ability to create virtual users attached to the car, smart home or to any place or device network.

  • The system should provide the ability to share any digital materials.

  • The system should contain the unit of account and integrated payment system.

  • The system must contain a global catalog of trusted/open user materials with the ability to publish, search and subscribe.

  • The system should present the concept of “attraction” and “gravity point” (see Mobility concept).

  • The system should contain mechanisms, which in real time will be able to analyze user preferences, verify and process “gravity points”.

We created and revised the functional, technical and technological requirements and turned them into a coherent concept, GRAVIO Ecosystem.


So, problems 

described above can be solved by the GRAVIO Ecosystem in a rather elegant matter.


  • You can always be sure that the communication channel and the data transmitted via it and the data that is stored in a distributed manner in the system are securely encrypted. And nobody will be able to access them (be it the employees of data centers, any hackers or the third parties), unless you clearly express your wish. Even if for some reason the server where the data is stored is stolen, the attacker would still not be able to access its contents. And your data, some of which can be stored on this server will remain in the system, because the system automatically duplicates the data just for such occasions.

  • Communication protocol between your devices and the GRAVIO network supports the multi-level encryption and guarantees that the attacker will not be able to access your information even as a mediator.

  • Your car with installed device GRAVIO.CAR will be reliably protected from different vulnerabilities. You connect the car to a personal secure network and establish a trusted relationship with it. If an attacker breaks into your car and takes possession of the device GRAVIO.CAR, he will not be able to obtain access to the contents of the device or, indirectly to your personal network, since no keys are required for encryption and are not stored on the device. Basic data will be stored in the GRAVIO cloud - on network nodes and data centers.

  • Your smart home or its elements are connected to GRAVIO.HOME - the device that will be able to put together everything, that have any external communicative interface - be it a fridge or a video surveillance system. GRAVIO.HOME also allows you to connect home medical equipment to the personal protected network. In fact - GRAVIO.HOME is one of the reference points on which your personal protected network can be built. GRAVIO.HOME has the ability to connect multiple external communication lines, for example from different providers. This is necessary in order to ensure your “smart home” is always online, despite of any incidents at provider’s side. All data that is transmitted and partially stored on the device is certainly protected. As in case with GRAVIO.CAR - the main data will be stored in the GRAVIO cloud – on the network nodes and data centers, and will also be securely encrypted.

  • To create a personal node in a protected network on which your data, such as documents, information from connected devices, medical devices, video archive, video surveillance systems, family photo and video archive and much more - will be stored you need to install GRAVIO.HUB. GRAVIO.HUB is essentially a high-performance mini server with a hard drive with sufficient capacity. GRAVIO.HUB, among other things is a full-fledged network GRAVIO node. This means that you can offer the GRAVIO network to use a certain portion of resources to ensure the functioning of the global network. GRAVIO network will conduct a test of the communication channel, the computing power of your host and determine its role in the system (see Architecture).

  • GRAVIO.HUB, as a software and hardware platform is a building block to create a data center of the GRAVIO network. You can create your data center either based on a packaged solution GRAVIO.HUB or using the software components GRAVIO and connect it to the WAN GRAVIO. The network will test the communication channels, the performance of each of the granted nodes and can assign the appropriate roles. Of course, the same operations, such as role assignment and configuration of nodes can be carried out manually with help of the administrators and the system engineers.

  • Machine learning, neural networks, semantic analyzers, speech analyzers and synthesizers will primarily operate under the high-performance data centers. The widely used trusted nodes (GRAVIO.HUB) will also be used for distributed data preparation and preprocessing required to analyze the information.

  • GRAVIO.APP – is a program that is installed on smartphones, tablets and desktop computers and is used to communicate with your personal protected network and/or secure global network. It allows you to interact with other users of the network, both with real and virtual - in a natural language. GRAVIO.APP allows you to manage and communicate with your car, smart home and its parts (by GRAVIO.HOME and GRAVIO.CAR). It will allow you to look after elderly relatives and children. By installing GRAVIO.APP to the smartphone of your child, you can be sure that the “assistant in his pocket” will make the school experience more comfortable. For example your child will not need to turn off the phone during lessons - this will be done by the GRAVIO.APP, after analyzing independently or with your help - the schedule of the day and will not allow an incoming call to go through if your child is in the classroom at the moment. Moreover, it will endeavor to notify the caller – if he is known – that the child is busy at the moment and cannot take the phone call. GRAVIO.APP will follow a certain security policy that you defined for it.  It will examine the routes and daily movement of your child and, for example, when there are deviations from the regular route - will let you know about it. Using GRAVIO.APP you can take pictures and videos, share them with friends and acquaintances and be sure that your photos and videos will never be available to the third parties - after all, what is transmitted from your smartphone/laptop/tablet/computer to the global network will be encrypted by GRAVIO (channel and content). Moreover, all information stored on your smartphone/laptop/tablet/computer will also be encrypted (see Information security concept).


  • GRAVIO will be a really smart and useful assistant in your daily work. You will create a virtual GRAVIO assistant (special account) and create a relationship of trust with your account. You plug your assistant to your contact list and will be able to lead a dialogue with him in a natural language. It will study your vocabulary (and of course you will help it with this) and will understand the request addressed to it and identify an issued task. It will follow your schedule and will be able to make recommendations for a change depending on circumstances and current information (geolocation, time, direction, etc.). It will be able to maintain a formal dialogue (already based on the Protocol) with other “helpers” in the network (the assistant in the cafe, service station, parking, etc.). It will transparently make an appointment on the car maintenance service, tire service center, and book a table in the café indirectly through assistants in the respective institutions. In turn, the "associates" of these institutions will cooperate in a secure trusted network, for example, the manager of the service center or the manager of the cafe. Therefore, the virtual assistants will take on the complexity of the “matching” of the schedule and will try to accommodate the interests of all parties (only in case of uncertainty they can ask for your participation). Thus you will not have to call the service station/café, or go to the website of the relevant institution to waste 5-10 minutes of your time on booking.

  • Based on your preferences and multiple gravity point, the GRAVIO assistant will track your movements and according to the context inform you about something that conforms to the rules describing “preference”. If you are on holiday, say, in Italy, and are walking on one of the famous cities of old Europe, and you have set the preference to “sculptors of the Renaissance”, then, for example, the assistant can interactively message you to suggest that 200 meters around the corner there is a small museum with some interesting works of art. And if you are on a business trip or a business meeting, an assistant compares your schedule with the overlapping preferences and fixes that there is something that you should be interested in. It will inform you later, when it understands that you are free.


Earning possibility

  • GRAVIO Network will contain a built-in payment system based on blockchain technology and will present its own cryptocurrency – GRAVIO Coin (GIO).

  • Each account (except the special) will have its own wallet. Moreover, upon registration each new user will receive some GIO coins to their wallet.

  • Wallets will be located on the nodes of the GRAVIO network in encrypted form (as any user data). And even if you lose a mobile phone for example, all the data will remain intact. Additional information about GIO can be viewed in Coin details.

  • You will be able to publish content in the global catalog of the GRAVIO network materials and charge price for them, nominated in GIO. Every member of the GRAVIO ecosystem, in case he needs your materials and finds your price reasonable will be able to pay for guaranteed access to information. Control over the transactions, such as making payments and providing access to the materials will be supervised by GRAVIO.

  • Managers of the various small businesses will be able to set “gravity points” and connect the respective virtual assistants in order to attract buyers/consumers with certain open preferences.


Of course, we have only considered a small portion of the potential opportunities of the GRAVIO Ecosystem.


We have quite a long way ahead of us, but we hope that with your help and active participation we will make this happen.

For illustration of various life aspects we starts to creating a set of shot graphic novels, where GRAVIO plays a main role.

Why choose us?

This is a simple and a difficult question at the same time. We have an extensive experience in the development of the commercial systems of various degrees of complexity. We are a highly versatile and qualified team. We are able to do things that many consider fantastic, when it comes to developing the functionality and timing of the development. Is that enough for the project to be successful? Certainly, not. One vital component is missing and that is faith and willingness to go with the project until the end. We believe that the project will live and are passionate to support it along the way.