METHOD AND SYSTEM FOR TRANSMITTING DATA WITHIN A SECURE COMPUTER SYSTEM
First Claim
Patent Images
1. A computer system comprising:
- a plurality of nodes;
a primary node configured to provide a coupling between said plurality of nodes;
wherein,the primary node is configured to securely attach metadata labels to data, wherein said metadata labels include security instructions;
wherein the primary node is configured to validate the metadata labels;
wherein the data is transmitted to one or more of the plurality of nodes in accordance with the metadata labels; and
wherein said primary node is configured to encrypt data based on the security instructions.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems related to the secure transmission of information within a vehicle'"'"'s computing systems are presented. Transmitting a message within the secure computer system includes receiving a message that includes a remote encryption key from a module, validating the module, loading security metadata, then validating the security metadata using the remote encryption key. Thereafter, the valid destination modules are determined and the message is sent to them. Metadata labels may be securely attached to data using a local encryption key, in order to maintain the integrity of the data.
-
Citations
22 Claims
-
1. A computer system comprising:
-
a plurality of nodes; a primary node configured to provide a coupling between said plurality of nodes;
wherein,the primary node is configured to securely attach metadata labels to data, wherein said metadata labels include security instructions; wherein the primary node is configured to validate the metadata labels; wherein the data is transmitted to one or more of the plurality of nodes in accordance with the metadata labels; and wherein said primary node is configured to encrypt data based on the security instructions. - View Dependent Claims (2, 3, 4, 5)
-
-
6. The computer system of 5 further comprising:
a processor configured to create and store a label authorization table which determines routing of data between nodes based on the metadata labels.
-
7. A method of transmitting a message within a secure computer system comprising:
-
receiving a message including a remote encryption key from a module; validating the module; loading a security metadata table for the computer system; validating the security metadata data using the remote encryption key; reading a module association table to determine one or more valid destination modules; and sending the message to the one or more valid destination modules. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A secure computer system comprising:
-
a processor configured to receive a message including a remote encryption key from a module; a first validator configured to validate the module; a loader configured to load a security metadata table for the computer system; a second validator configured to validate the security metadata data using the remote encryption key; a reader configured to read a module association table to determine one or more valid destination modules; and a transmitter configured to send the message to the one or more valid destination modules. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of transmitting a message within a secure computer system comprising:
-
parsing a message for transmission to determine a destination for the message; validating that the destination is connected; loading a security metadata table for the computer system; cryptographically binding the security metadata to the message; and sending the message to the one or more valid destination modules. - View Dependent Claims (20, 21, 22)
-
Specification