Intrusion-free computer architecture for information and data security
First Claim
1. A bus controller comprising:
- a. a first interface, said first interface configured to communicate with a first computer bus, said first computer bus residing on a first computer, a network interface interconnected with said first computer bus, said network interface configured to transfer data between a network and said first computer bus;
b. a second interface, said second interface configured to communicate with a second computer bus, said second computer bus residing on a second computer; and
c. a third interface, said third interface configured to communicate with;
i. a temporary storage;
ii. said first interface; and
iii. said second interface;
wherein said bus controller is configured to selectively control data flow using a data flow verification process between at least one of the following;
a. said first interface and said third interface; and
b. said second interface and said third interface.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer architecture is disclosed where the system includes a first computer bus, network interface, bus controller and temporary storage. A first computer can receive data from a network and store data in its memory or temporary storage. To have safe data, the architecture demands using the bus controller to selectively control data flow and verify data. The bus controller includes a first interface, second interface and third interface. These interfaces aid the process of data flow and verification. If data is verified, a computer operator may use the bus controller to select and transmit verified data to the main (second) computer. Additionally, data flow may be reversible. Trusted data may be exported from any storage component associated with the second computer through the bus controller to any storage component associated with the first computer. From the latter, data may be exported to the network through the network interface.
16 Citations
20 Claims
-
1. A bus controller comprising:
-
a. a first interface, said first interface configured to communicate with a first computer bus, said first computer bus residing on a first computer, a network interface interconnected with said first computer bus, said network interface configured to transfer data between a network and said first computer bus;
b. a second interface, said second interface configured to communicate with a second computer bus, said second computer bus residing on a second computer; and
c. a third interface, said third interface configured to communicate with;
i. a temporary storage;
ii. said first interface; and
iii. said second interface;
wherein said bus controller is configured to selectively control data flow using a data flow verification process between at least one of the following;
a. said first interface and said third interface; and
b. said second interface and said third interface. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for protecting data residing on a second computer from malicious actions originating from a network, comprising:
-
a. selectively controlling data flow between a first computer bus and a second computer bus, said first computer bus interconnected with said network through a network interface;
b. storing said data on a temporary storage, said temporary storage connected to said first computer bus and said second computer bus through a bus controller; and
c. transmitting said data between said first computer and said second computer if said data is verified for passage. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system comprising:
-
a. a first computer bus, said first computer bus residing on a first computer;
b. a network interface interconnected with said first computer bus and a network;
c. a bus controller interconnected with;
i. said first computer bus; and
ii. a second computer bus, said second computer bus residing on a second computer; and
d. a temporary storage selectively interconnected, through said bus controller, to said first computer bus;
wherein said bus controller selectively controls data flow between said first computer bus and said second computer bus. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification