Empowering
our Heroes

Our vision

Ten years ago, employees in organizations spent hours manually reading reports, emails, and messages to extract precise meaning before deciding and acting. Traditional technologies simply couldn’t modernize these processes.

Today, in defense, law enforcement, and critical sectors, AI and NLU technologies process vast volumes of text at unprecedented scale, flagging keywords, spotting patterns, and raising alerts faster than any human team.

But here’s the problem. These solutions rely on foreign technical stacks that introduce unacceptable sovereignty and security risks, facilitating potential exfiltration of sensitive or classified data. They are black boxes : opaque, prone to hallucinations, vulnerable to bias poisoning and adversarial attacks. In high-stakes missions, unverifiable outputs and compliance gaps are simply not acceptable, costing lives, strategic assets, and European autonomy.

Our vision for tomorrow : Europe must regain full control. A sovereign, offline-capable technology, compliant with the EU AI Act, explainable, resilient, trustworthy, and sustainable, that anticipates and catches threats by faithfully reproducing human-like comprehension and reasoning on textual data, without any third-party dependencies.

At Aeteos™, we made that vision reality.

Total Sovereignty

Humans have always sought to create tools or automated systems to serve a need, thus delegating the execution of one or more tasks to a machine which must not operate without limits.

Humans must be able to remain autonomous and decide when, how, and why to delegate, and for what purpose they wish to entrust the execution of something to a machine.

They must delegate prudently, understand how the machine works, and ensure that this delegation does not lead to a dependence that could erode their judgment, their sense of responsibility, or expose them to new risks.

Total Control

Sovereign architecture in pure C, RISC/CISC compatible, running on Linux and ANSI C99. 100% auditable solution, with no black boxes.

Maximum Security

Zero third-party dependencies, no possible exfiltration (model or memory). Operates entirely offline, with post-quantum resistant encryption.

Legal Compliance

Fully aligned with the EU AI Act and NIS2. Operates solely under strict human control, without any prediction, recommendation, or autonomous decision-making.

Absolute Trust

Transparent and traceable execution. Resistant to data or binary poisoning. Deterministic, knowledge-based, reliable, and predictable results.

 

Let's do Cognitive Computing

Our vision is built on a profound understanding of the human mind. Percipion is rooted in a unique blend of neurosciences, cognitive psychology, linguistics, philosophy, anthropology, and computer science. These disciplines give us deep knowledge of how humans represent information, understand context and intent, reason, make decisions, and solve problems.

This multidisciplinary approach is at the very heart of our solution. It allows us to move beyond traditional statistical AI and develop true symbolic cognitive computing, technology that perceives, grasps, and understands the way humans do.

We don’t imitate intelligence. We reproduce its fundamental mechanisms, always with one goal: to help, serve, and protect people.

Making machines smarter

Our ability to reason, make decisions, and solve problems can define intelligence.

These cognitive processes are linked to psychological functions such as emotions, sentiments, or needs. These mental states provide additional context-related key insights, which, once added to other available inputs, will create a conglomerate of information, giving us a mental representation of the situation, enabling our awareness, and adapting our behaviors and actions.

Making machines smarter will require that these human capabilities can be transferred to and executed by a machine. And this is the exact purpose of cognitive computing: to provide machines the capacity to represent a context, understand a situation, reason, and take actions.

VirtualBrains™

To read, understand, think or communicate, people use information that is available within their brains. The best vantage point for understanding their behavior is from this internal frame of reference (their long-term memory). That means that, for a given situation or experience, only individuals can describe how they perceive it. When doing this, they will reveal their emotions, their needs, in short how they perceive their world (The Rogerian approach).

In order to understand people, we provided Percipion with a contextual categorized data structure (a knowledge schema) representing the surrounding world in a symbolic way in order to empower Percipion with the capability to identify the intended semantic from multiple possible semantics and link it to the corresponding superordinate object. This what we have called a VirtualBrain.

Natural language understanding technologies involves the identification of the intended semantics from the multiple possible semantics. That means that the system needs a contextual lexicon of the language, with a suitable knowledge schema (categorized symbolic object structure), to provide machines with a mental model of the surrounding world and be able to assess the provided data to extract its meaning in several languages and without prior training.

Béatrice

Founder & CSO, Aeteos

Ready to build a safer Europe together?

We would love to hear from you. Whether you want to learn more about Percipion, request a demonstration, or explore how our human-centered cognitive solutions can support your organization, our team is here to help.

White paper

Please click on the button below to display and download a white paper about what we do

Question

Please click on the button below to send us your question via eMail

Demo

Please click on the button below to explain your needs and request a demonstration

We have chosen not to include an online form on this page in order to prioritise your security and privacy. Our top priority is to avoid any automatic collection and storage of sensitive personal information (such as your email address, name, or message) on our servers. This significantly reduces cybersecurity risks, such as data leaks or cyberattacks, and ensures our compliance with strict data protection standards (GDPR in Europe). Instead, we invite you to contact us directly by email. This simpler, more human approach allows us to handle your requests in a personalised manner, with a tailored response.