Systems and methods for utilizing uni-directional inter-host communication in an air gap environment
First Claim
1. A method comprising:
- generating a request message, with a trusted network entity executing trusted code on a first security layer, the request message to target a non-trusted network entity executing non-trusted code, on a second security layer, wherein network entities on the first network layer execute only trusted code, wherein the trusted network entity operates within a multitenant environment to provide services to multiple tenants from a single database object, the request message generated in response to communication with a remote electronic device accessing the multitenant environment;
causing the request message to be transmitted from the trusted network entity to the non-trusted network entity through a flow of traffic from the first security layer to the second security layer that involves only connections initialized from the first network layer to the second network layer, wherein messages to be downloaded by the trusted network entity are through a connection initialized by a component of the first network layer;
generating a response check message with the trusted network entity, the response check message to determine whether response information is available on the non-trusted network entity in response to the request message; and
causing the response check message to be transmitted from the trusted network entity to the non-trusted network entity, utilizing the connection initialized from the first network layer, from the first security layer to the second security layer to determine whether the response information is stored in a conceptual mailbox on the non-trusted network entity by executing a portion of the trusted code that is authorized to pull a response from the conceptual mailbox.
1 Assignment
0 Petitions
Accused Products
Abstract
A request message is generated with a trusted network entity executing trusted code on a first network layer. The request message to target a non-trusted network entity executing non-trusted code on a second network layer. The request message is transmitted from the trusted network entity to the non-trusted network entity through at least a policy enforcement entity. The policy enforcement entity applies one or more network traffic rules to enforce a unidirectional flow of traffic from the first network layer to the second network layer. A response check message is generated with the trusted network entity. The response check message to determine whether response information is available on the non-trusted network entity in response to the request message. The response check message is transmitted from the trusted network entity to the non-trusted network entity through at least the policy enforcement entity. The response check message to determine whether the response information is stored in a conceptual mailbox on the non-trusted network entity.
123 Citations
24 Claims
-
1. A method comprising:
-
generating a request message, with a trusted network entity executing trusted code on a first security layer, the request message to target a non-trusted network entity executing non-trusted code, on a second security layer, wherein network entities on the first network layer execute only trusted code, wherein the trusted network entity operates within a multitenant environment to provide services to multiple tenants from a single database object, the request message generated in response to communication with a remote electronic device accessing the multitenant environment; causing the request message to be transmitted from the trusted network entity to the non-trusted network entity through a flow of traffic from the first security layer to the second security layer that involves only connections initialized from the first network layer to the second network layer, wherein messages to be downloaded by the trusted network entity are through a connection initialized by a component of the first network layer; generating a response check message with the trusted network entity, the response check message to determine whether response information is available on the non-trusted network entity in response to the request message; and causing the response check message to be transmitted from the trusted network entity to the non-trusted network entity, utilizing the connection initialized from the first network layer, from the first security layer to the second security layer to determine whether the response information is stored in a conceptual mailbox on the non-trusted network entity by executing a portion of the trusted code that is authorized to pull a response from the conceptual mailbox. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium having stored thereon instructions that, when executed by one or more processors, are configurable to cause the one or more processors to:
-
generate a request message, with a trusted network entity executing trusted code on a first security layer, the request message to target a non-trusted network entity executing non-trusted code, on a second security layer, wherein network entities on the first network layer execute only trusted code, wherein the trusted network entity operates within a multitenant environment to provide services to multiple tenants from a single database object, the request message generated in response to communication with a remote electronic device accessing the multitenant environment; cause the request message to be transmitted from the trusted network entity to the non-trusted network entity through a unidirectional flow of traffic from the first security layer to the second security layer that involves only connections initialized from the first network layer to the second network layer, wherein messages to be downloaded by the trusted network entity are through a connection initialized by a component of the first network layer; generate a response check message with the trusted network entity, the response check message to determine whether response information is available on the non-trusted network entity in response to the request message; and cause the response check message to be transmitted from the trusted network entity to the non-trusted network entity, utilizing the connection initialized from the first network layer, from the first security layer to the second security layer to determine whether the response information is stored in a conceptual mailbox on the non-trusted network entity by executing a portion of the trusted code that is authorized to pull a response from the conceptual mailbox. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
at least one memory system having hardware memory devices; one or more hardware processors coupled with the at least one memory system, the one or more processors to execute instructions stored within the system to generate a request message, with a trusted network entity executing trusted code on a first security layer, the request message to target a non-trusted network entity executing non-trusted code, on a second security layer, wherein network entities on the first network layer execute only trusted code, wherein the trusted network entity operates within a multitenant environment to provide services to multiple tenants from a single database object, the request message generated in response to communication with a remote electronic device accessing the multitenant environment, to cause the request message to be transmitted from the trusted network entity to the non-trusted network entity through a unidirectional flow of traffic from the first security layer to the second security layer that involves only connections initialized from the first network layer to the second network layer, wherein messages to be downloaded by the trusted network entity are through a connection initialized by a component of the first network layer, to generate a response check message with the trusted network entity, the response check message to determine whether response information is available on the non-trusted network entity in response to the request message, and to cause the response check message to be transmitted from the trusted network entity to the non-trusted network entity, utilizing the connection initialized from the first network layer, from the first security layer to the second security layer to determine whether the response information is stored in a conceptual mailbox on the non-trusted network entity by executing a portion of the trusted code that is authorized to pull a response from the conceptual mailbox. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification