System-on-chip data security appliance and methods of operating the same
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-009/00
H04L-029/08
G06F-009/4401
H04L-029/06
출원번호
US-0077519
(2016-03-22)
등록번호
US-10148761
(2018-12-04)
발명자
/ 주소
Dahlstrom, Jason
Taylor, Stephen
출원인 / 주소
WEB SENSING, LLC
대리인 / 주소
Michael Best & Friedrich LLP
인용정보
피인용 횟수 :
0인용 특허 :
36
초록▼
System-on-chip data security appliance (“SoC-DSA”) and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed within a protected boundary of a single chip. In some embodiments, isolation and access control features are hidden within an on-chip field-
System-on-chip data security appliance (“SoC-DSA”) and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed within a protected boundary of a single chip. In some embodiments, isolation and access control features are hidden within an on-chip field-programmable gate array (“FPGA”). The isolation and access control features can be implemented such that they are not visible to or alterable by software executing on the processing cores of the SoC-DSA, which provides for continued data security even in the presence of software exploitation, such as a malicious implant, that otherwise compromises data security in software-only systems. The SoC-DSA can be used to enhance data security in existing data security devices and protocols, such as high assurance guards (“HAG”) and can be used to create new types of security devices, such as devices enforce alternative human data interactions (“HDI”) models.
대표청구항▼
1. A system-on-chip data security appliance (SoC-DSA) comprising: a single-chip device defining a protected boundary co-incident with a boundary of the single-chip device;a first communication interface;a second communication interface;an electronic processor located within the protected boundary;a
1. A system-on-chip data security appliance (SoC-DSA) comprising: a single-chip device defining a protected boundary co-incident with a boundary of the single-chip device;a first communication interface;a second communication interface;an electronic processor located within the protected boundary;a cryptographic component located within the protected boundary;a data transfer control component located within the protection boundary; andmemory located within the protected boundary, the memory storing data,wherein the electronic processor is configured to perform at least one of encrypting and decrypting data appearing on the first communication interface using the cryptographic component and subsequently perform, based on data stored in the memory, at least one of dropping, modifying, and transferring the data to the second communication interface using the data transfer control component. 2. The SoC-DSA of claim 1, further comprising a power supply including at least one selected from the group consisting of a battery power supply and an electrical power supply. 3. The SoC-DSA of claim 1, further comprising a memory interface to an external memory located outside the protected boundary, wherein the electronic processor is configured to encrypt data stored to the external memory using the cryptographic component within the protected boundary prior to transferring the data to the external memory through the memory interface. 4. The SoC-DSA of claim 1, further comprising a third communication interface receiving secure out-of-band updates to data stored in at least one of the memory and an external memory located outside the protection boundary. 5. The SoC-DSA of claim 1, further comprising a third communication interface connecting with an anti-tamper sensor performing hardware monitoring for physical tampering. 6. The SoC-DSA of claim 1, further comprising a third communication interface receiving user input for verifying a physical presence of an authenticated operator. 7. The SoC-DSA of claim 1, further comprising a third communication interface communicating with a remote server for storing and retrieving public keys. 8. The SoC-DSA of claim 1, further comprising a secure boot loader located within the protected boundary, the secure boot loader providing secure software bootstrapping. 9. The SoC-DSA of claim 1, wherein the SoC-DSA dynamically obtains configuration data including at least one selected from the group consisting of software, firmware, a field programmable gate array configuration, a key, a hash value, a policy rule, and a human-data interaction rule over a data interface, wherein the configuration data is received in encrypted form and is decrypted within the protected boundary using the cryptographic component. 10. The SoC-DSA of claim 1, wherein the electronic processor is further configured to perform a reversible message operation, including performing at least one selected from the group consisting of message padding and unpadding, message fragmentation and assembly, message compression and decompression, on data appearing at at least one selected from the group consisting of the first communication interface and the second communication interface prior to re-transmission of the data from within the protected boundary. 11. The SoC-DSA of claim 1, wherein the electronic processor is further configured to operate the data transfer control component, in accordance with data stored in the memory, on data appearing at at least one selected from the group consisting of the first communication interface and the second communication interface prior to retransmission from within the protected boundary. 12. The SoC-DSA of claim 1, wherein at least one selected from the group consisting of the first communication interface and the second communication interface includes at least one selected from the group consisting of a 802.11 communication interface, a 802.15 communication interface, a cellular communication interface, a wired Ethernet communication interface, and a Bluetooth communication interface, and at least one selected from the group consisting of the first communication interface and the second communication interface communicates with an appliance via an intervening network infrastructure, wherein the appliance includes at least one selected from the group consisting of a second SoC-DSA and an unbundling application. 13. The SoC-DSA of claim 1, wherein a field device attached to at least one selected from the group consisting of the first communication interface and the second communication interface includes at least one selected from the group consisting of an ultrasonic range sensor inserted into an orifice of a container, a potentiometer sensor attached to a mechanical level indicator, a ranging sensor determining a level of material within a container, a flow sensor, a pressure sensor, a vibration sensor, a temperature sensor, an optical sensor, a medical sensor for a medical device, a switch, a jumper, a valve, a hydraulic piston, a shutoff valve controlling a level within a container, a medical actuator, a sound generator, a light, and a display. 14. The SoC-DSA of claim 1, wherein the first communication interface includes a plurality of communication interfaces and wherein the SoC-DSA selects one of the plurality of communication interfaces to use based on a property of a communication channel used by each of the plurality of communication interfaces, the property including at least one selected from the group consisting of availability, signal strength, signal-to-noise ratio, interference, a temporal profile, and a historical profile. 15. The SoC-DSA of claim 14, wherein the SoC-DSA selects the one of the plurality of communication interfaces manually, automatically, or non-deterministically. 16. The SoC-DSA of claim 1, wherein the SoC-DSA refreshes data stored in the memory manually, automatically, or non-deterministically. 17. The SoC-DSA of claim 1, wherein the SoC-DSA refreshes data stored in the memory by placing data at random locations in the memory. 18. The SoC DSA of claim 1, further comprising a copy of the first communication interface, the copy of the first communication providing an alternative data communication path from within the protected boundary or an alternative attachment point for a field device from within the protected boundary. 19. The SoC-DSA of claim 1, wherein the electronic processor is configured to perform hardware monitoring for malicious attacks within the protected boundary. 20. The SoC-DSA of claim 1, wherein the SoC-DSA ignores communications received from a second unauthentic SoC DSA over the first communication interface or the second communication interface. 21. The SoC-DSA of claim 1, wherein the electronic processor constrains communications over the first communication interface and the second communication interface to a fixed format and a fixed length. 22. A system comprising: a plurality of system-on-chip data security appliances (SoC-DSAs), each of the plurality of SoC-DSAs including a single-chip device defining a protected boundary co-incident with a boundary of a chip included in the single-chip device and a communication interface; andan intermediate network infrastructure connecting the plurality of SoC-DSAs through the communication interface of each of the plurality of SoC-DSAs. 23. The system of claim 22, further comprising an unbundling application, wherein the unbundling application communicates with at least one of the plurality of SoC-DSAs through the intermediary network infrastructure. 24. The system of claim 22, wherein at least one of the plurality of SoC-DSAs is designated as a zone for message operations associated with a subset of the plurality of SoC-DSAs.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (36)
Carner, Gary A.; Hesse, Bradley J.; Schultz, Kurt V., Apparatus and method for wireless control.
Aggers John R. (Apple Valley MN) Brindle Ralph C. (Minnetonka MN) Kidder Kenneth B. (Coon Rapids MN) Ullestad David C. (Brooklyn Park MN), Distributed environmental/load control system.
Brown ; Jr. Robert J. (6688 Serena La. Boca Raton FL 33433) Romanowiz James D. (2919 Banyan Rd. Boca Raton FL 33432) Staples Charles W. (270 NW. 36th St. Boca Raton FL 33431), Energy management and home automation system.
Bortz, Mark A.; Wilding, Matthew M.; Marek, James A.; Hardin, David S.; Hiratzka, T. Douglas; Limondin, Philippe M. T., High-assurance architecture for routing of information between networks of differing security level.
Tinsley Timothy M. (Coon Rapids MN) Schwarz Edward L. (Minneapolis MN), Locally powered control system having a remote sensing unit with a two wire connection.
Maus,Christopher T.; Coad,Craig A.; Connolly,Jackson B.; Coad,Noah M.; Moody,James L.; Nesbitt,Kenn A.; Clegg,Kenneth D., Personal health card accessed secure medical data storage system.
Knight John D. (Nashua NH) Shapiro Robert D. (North Andover MA) Banks Frank H. (Wakefield MA) Mitchell Andrew (Woburn MA) Sunray Barry S. (Wakefield MA) DeFrancesco Robert A. (Metheun MA), Residential fuel-oil level reporting and alarm system.
Sanville, Katherine; Johnson, David Robert; Howes, Jr., Ronald Bruce, Scheduling delivery of chemical products based on a predicted estimated time of exhaustion.
Maus,Christopher T.; Coad,Craig A.; Connolly,Jackson B.; Coad,Noah M.; Moody,James L.; Nesbitt,Kenn A.; Clegg,Kenneth D., Secure medical records maintenance system.
Simon ; deceased Bernard S. (late of St. Louis Park MN by Barbara J. Simon ; executor) Smith Wade W. (Plymouth MN), Two-way wireless HVAC system and thermostat.
Salazar Joe Andrew ; Molero-Castro Luis,ESX, Wireless and wired communications, command, control and sensing system for sound and/or data transmission and reception.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.