SCALABLE SECURITY ARCHITECTURE SYSTEMS AND METHODS
First Claim
1. A method, comprising:
- detecting a system resource request transmitted over a system fabric;
determining a security status of the system resource request with respect to a security rule set, wherein the security rule set comprises at least one of communication, input/output (I/O), or execution partitions associated with one or more user modules; and
allocating system resources based, at least in part, on the determined security status of the system resource request.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are disclosed for systems and methods to provide a secure federated computing system for mobile structures. A secure federated computing system includes a secure system controller and one or more user modules each implemented with a secure system processor and configured to communicate over one or more system fabrics. The secure system controller and the user modules are configured to form secure communication channels to each other over the one or more system fabrics to facilitate a secure initialization procedure. Once the secure initialization procedure is complete, the secure system controller and the user modules can be used to dynamically allocate secure and non-secure system resources as needed or as indicated by a security rule set programmed into the secure system processor.
-
Citations
20 Claims
-
1. A method, comprising:
-
detecting a system resource request transmitted over a system fabric; determining a security status of the system resource request with respect to a security rule set, wherein the security rule set comprises at least one of communication, input/output (I/O), or execution partitions associated with one or more user modules; and allocating system resources based, at least in part, on the determined security status of the system resource request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
one or more user modules configured to communicate with each other over a system fabric; and a secure system controller adapted to couple to the system fabric, wherein the secure system controller is configured to; detect a system resource request transmitted over the system fabric; determine a security status of the system resource request with respect to a security rule set, wherein the security rule set comprises at least one of communication, input/output (I/O), or execution partitions associated with the one or more user modules; and allocate system resources based, at least in part, on the determined security status of the system resource request. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
coupling a secure system controller and one or more user modules to a system fabric for a federated computing system; coupling a secure programming station to the secure system controller; and programming the secure system controller according to a security rule set, wherein the security rule set comprises at least one of communication, input/output (I/O), or execution partitions associated with the one or more user modules. - View Dependent Claims (20)
-
Specification