Systems and methods for utilizing uni-directional inter-host communication in an air gap environment
First Claim
1. A method comprising:
- maintaining a virtual mailbox on a non-trusted network entity executing non-trusted code, on a first network layer, wherein the virtual mailbox is configurable to store messages to be passed between the first network layer and a second network layer, wherein network entities on the second network layer execute only trusted code;
receiving a request message at the virtual mailbox from a trusted network entity on the second network layer to a non-trusted network entity on the first network layer through a flow of traffic from the second network layer to the first network layer that involves only connections initialized from the first network layer to the second network layer, wherein messages to be downloaded by the trusted network entity are through a connection initialized by a component of the second network layer;
performing one or more operations in the first network layer in response to the request message;
generating results in the first network layer in response to the request message;
storing the results in the virtual mailbox;
receiving, from authorized trusted code executed on the second network layer, a response check message from the management network entity, the response check message to determine whether the results are available in the virtual mailbox in response to the request message.
1 Assignment
0 Petitions
Accused Products
Abstract
A request message is generated with a trusted network entity executing trusted code on a first network layer. The request message to target a non-trusted network entity executing non-trusted code on a second network layer. The request message is transmitted from the trusted network entity to the non-trusted network entity through at least a policy enforcement entity. The policy enforcement entity applies one or more network traffic rules to enforce a unidirectional flow of traffic from the first network layer to the second network layer. A response check message is generated with the trusted network entity. The response check message to determine whether response information is available on the non-trusted network entity in response to the request message. The response check message is transmitted from the trusted network entity to the non-trusted network entity through at least the policy enforcement entity. The response check message to determine whether the response information is stored in a conceptual mailbox on the non-trusted network entity.
-
Citations
21 Claims
-
1. A method comprising:
-
maintaining a virtual mailbox on a non-trusted network entity executing non-trusted code, on a first network layer, wherein the virtual mailbox is configurable to store messages to be passed between the first network layer and a second network layer, wherein network entities on the second network layer execute only trusted code; receiving a request message at the virtual mailbox from a trusted network entity on the second network layer to a non-trusted network entity on the first network layer through a flow of traffic from the second network layer to the first network layer that involves only connections initialized from the first network layer to the second network layer, wherein messages to be downloaded by the trusted network entity are through a connection initialized by a component of the second network layer; performing one or more operations in the first network layer in response to the request message; generating results in the first network layer in response to the request message; storing the results in the virtual mailbox; receiving, from authorized trusted code executed on the second network layer, a response check message from the management network entity, the response check message to determine whether the results are available in the virtual mailbox in response to the request message. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium having stored thereon instructions that, when executed by one or more processors, is configurable to cause the one or more processors to:
-
maintain a virtual mailbox on a non-trusted network entity executing non-trusted code, on a first network layer, wherein the virtual mailbox is configurable to store messages to be passed between the first network layer and a second network layer, wherein network entities on the second network layer execute only trusted code; receive a request message at the virtual mailbox from a trusted network entity on the second network layer to a non-trusted network entity on the first network layer through a flow of traffic from the second network layer to the first network layer that involves only connections initialized from the first network layer to the second network layer, wherein messages to be downloaded by the trusted network entity are through a connection initialized by a component of the second network layer; perform one or more operations in the first network layer in response to the request message; generate results in the first network layer in response to the request message; store the results in the virtual mailbox; receive, from authorized trusted code executed on the second network layer, a response check message from the management network entity, the response check message to determine whether the results are available in the virtual mailbox in response to the request message. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
at least one memory system having hardware memory devices; one or more hardware processors coupled with the at least one memory system, the one or more processors to execute instructions stored within the system to maintain a virtual mailbox on a non-trusted network entity executing non-trusted code, on a first network layer, wherein the virtual mailbox is configurable to store messages to be passed between the first network layer and a second network layer, wherein network entities on the second network layer execute only trusted code, to receive a request message at the virtual mailbox from a trusted network entity on the second network layer to a non-trusted network entity on the first network layer through a flow of traffic from the second network layer to the first network layer that involves only connections initialized from the first network layer to the second network layer, wherein messages to be downloaded by the trusted network entity are through a connection initialized by a component of the second network layer, to perform one or more operations in the first network layer in response to the request message, to generate results in the first network layer in response to the request message, to store the results in the virtual mailbox, to receive, from authorized trusted code executed on the second network layer, a response check message from the management network entity, the response check message to determine whether the results are available in the virtual mailbox in response to the request message. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification