Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-12-08
2000-08-22
Palys, Joseph E.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
709249, G06F 1100
Patent
active
061087874
DESCRIPTION:
BRIEF SUMMARY
FIELD OF THE INVENTION
This invention relates to the selective input and output of information data between computer networks having different levels of security classification.
BACKGROUND
Those persons responsible for computers and computer networks are becoming increasingly concerned about computer data security.
In some computing environments physical isolation of networks provides the greatest level of security for each network. An example of this is Department of Defence networks which are typically physically isolated from all other networks classified at a lower level.
However, there will always be good reason to have connections between networks, and at least in a defence environment it may be necessary to have a console or workstation used in an isolated network which can exchange information with another network which is less classified. There are also examples of this in the commercial world where companies dealing with commercially sensitive information also require one or more consoles or workstations in their network to be connected to industry LANS and WANS and increasingly with the Internet.
It is generally accepted that if networks of different classification are allowed to be connected, flow of information from a computer working in a lower classified network to a computer working in the higher classified network is allowed. It is flow from the higher classified network to the lower classified network which requires restrictions. A well-known example of such a policy is the Bell & La Padula security policy.
One such arrangement is depicted in FIG. 2, where information transfer from a higher classified network to a lower classified network is only permitted by the arrangement if an authorised sender applies a unique seal to the information. A gateway device located at the junction point of the lower and higher classified networks only allows properly sealed information to pass to the lower classified network. The gateway ensures that the seal is legitimate and audits the information transfer.
This approach has many disadvantages which largely affect the ease of use and cost of such a network which typically require expensive custom workstations or additional trusted elements which can seal and if necessary encrypt the information and/or seal.
This invention eliminates or reduces these problems and can in certain circumstances work with this arrangement.
It is also not unreasonable for users of a higher classified network to want access to lower classified networks to upload information or remotely login to the other network and use the facilities available on that lower classified network such as for example the Internet. This type of use involves the user of the higher classified network typing commands on their normal workstation which then displays information obtained from the lower classified network.
Australian Patent No AU 663406 to Secure Computing Corporation discloses a method and apparatus for ensuring secure communications over an unsecured communications medium between a user working on an unsecured workstation and a remote host computer. A secure user interface is created by inserting a trusted path subsystem between input/output devices to the workstation and the workstation itself. This patent however has a number of critical differences of approach to that of the subject invention.
Most importantly the secure user interface of AU 663406 must use a cryptographic entity located in the user interface to encrypt and decrypt all information passing through the interface. The secure user interface does not allow the free flow of information from the network having a lower security to the network having a higher security. The remote host computer must have a trusted subsystem and a cryptographic entity having corresponding encryption and decryption facilities to that in the secure user interface. The secure user interface must have a video manager which creates a "trusted" window generated by a video RAM which always processes information which has been decrypted in the secur
REFERENCES:
patent: 4685113 (1987-08-01), Hono et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4799153 (1989-01-01), Hann et al.
patent: 4888801 (1989-12-01), Foster et al.
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5142565 (1992-08-01), Ruddle
patent: 5191611 (1993-03-01), Lang
patent: 5272754 (1993-12-01), Boerbert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5291596 (1994-03-01), Mita
patent: 5369707 (1994-11-01), Fellendore, III
patent: 5387899 (1995-02-01), Dilauro et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5596718 (1997-01-01), Boebert et al.
patent: 5623601 (1997-04-01), Vu
patent: 5636341 (1997-06-01), Matsushita et al.
patent: 5805674 (1998-08-01), Anderson, Jr.
Anderson Mark Stephen
Griffin John Edmund
Milner Robert Brunyee
North Christopher James Guildford
Yesberg John Desborough
Mai Rijue
Palys Joseph E.
The Commonwealth of Australia
LandOfFree
Method and means for interconnecting different security level ne does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and means for interconnecting different security level ne, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and means for interconnecting different security level ne will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-595173