System-on-chip data security appliance and methods of operating the same
First Claim
1. A system-on-chip data security appliance (SoC-DSA) comprising:
- a single-chip device defining a protected boundary co-incident with a boundary of the single-chip device;
a first communication interface;
a second communication interface;
an electronic processor located within the protected boundary;
a cryptographic component located within the protected boundary;
a data transfer control component located within the protection boundary; and
memory located within the protected boundary, the memory storing data,wherein the electronic processor is configured to perform at least one of encrypting and decrypting data appearing on the first communication interface using the cryptographic component and subsequently perform, based on data stored in the memory, at least one of dropping, modifying, and transferring the data to the second communication interface using the data transfer control component.
2 Assignments
0 Petitions
Accused Products
Abstract
System-on-chip data security appliance (“SoC-DSA”) and methods of operating the same. In one embodiment, the SoC-DSA includes data security mechanisms enclosed within a protected boundary of a single chip. In some embodiments, isolation and access control features are hidden within an on-chip field-programmable gate array (“FPGA”). The isolation and access control features can be implemented such that they are not visible to or alterable by software executing on the processing cores of the SoC-DSA, which provides for continued data security even in the presence of software exploitation, such as a malicious implant, that otherwise compromises data security in software-only systems. The SoC-DSA can be used to enhance data security in existing data security devices and protocols, such as high assurance guards (“HAG”) and can be used to create new types of security devices, such as devices enforce alternative human data interactions (“HDI”) models.
-
Citations
24 Claims
-
1. A system-on-chip data security appliance (SoC-DSA) comprising:
-
a single-chip device defining a protected boundary co-incident with a boundary of the single-chip device; a first communication interface; a second communication interface; an electronic processor located within the protected boundary; a cryptographic component located within the protected boundary; a data transfer control component located within the protection boundary; and memory located within the protected boundary, the memory storing data, wherein the electronic processor is configured to perform at least one of encrypting and decrypting data appearing on the first communication interface using the cryptographic component and subsequently perform, based on data stored in the memory, at least one of dropping, modifying, and transferring the data to the second communication interface using the data transfer control component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
a plurality of system-on-chip data security appliances (SoC-DSAs), each of the plurality of SoC-DSAs including a single-chip device defining a protected boundary co-incident with a boundary of a chip included in the single-chip device and a communication interface; and an intermediate network infrastructure connecting the plurality of SoC-DSAs through the communication interface of each of the plurality of SoC-DSAs. - View Dependent Claims (23, 24)
-
Specification