MULTI-LEVEL INDEPENDENT SECURITY ARCHITECTURE
First Claim
1. A system, comprising:
- a plurality of data input ports, each port corresponding to one of a plurality of different levels of security classification;
a security device, configured for cryptographic processing, coupled to receive incoming data from each of the plurality of input ports, wherein the incoming data includes first data having a first classification level;
a key manager configured to select a first set of keys from a plurality of key sets, each of the key sets corresponding to one of the different levels of security classification, wherein the first set of keys is used by the security device to encrypt the first data; and
a common encrypted data storage, coupled to receive the encrypted first data from the security device for storage.
1 Assignment
0 Petitions
Accused Products
Abstract
A system includes a plurality of data input ports, each port corresponding to one of a plurality of different levels of security classification; a security device, configured for cryptographic processing, coupled to receive incoming data from each of the plurality of input ports, wherein the incoming data includes first data having a first classification level; a key manager configured to select and tag-identified first set of keys from a plurality of key sets, each of the key sets corresponding to one of the different levels of security classification, wherein the first set of keys is used by the security device to encrypt the first data; and a common encrypted data storage, coupled to receive the encrypted first data from the security device for storage.
-
Citations
20 Claims
-
1. A system, comprising:
-
a plurality of data input ports, each port corresponding to one of a plurality of different levels of security classification; a security device, configured for cryptographic processing, coupled to receive incoming data from each of the plurality of input ports, wherein the incoming data includes first data having a first classification level; a key manager configured to select a first set of keys from a plurality of key sets, each of the key sets corresponding to one of the different levels of security classification, wherein the first set of keys is used by the security device to encrypt the first data; and a common encrypted data storage, coupled to receive the encrypted first data from the security device for storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
receiving incoming data from a plurality of data ports, each port corresponding to one of a plurality of different levels of security classification, wherein the incoming data includes first data having a first classification level; encrypting the first data using a first set of keys, the first set of keys selected from a plurality of key sets, each of the key sets corresponding to one of the different levels of security classification; and writing the encrypted first data into a common encrypted data storage. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A security device, comprising:
-
a plurality of data ports, each port corresponding to one of a plurality of different levels of security classification; a plurality of cryptographic modules, each cryptographic module dedicated to perform encryption and decryption for one of the different levels of security classification, each cryptographic module coupled to receive incoming data from one of the plurality of data ports, and the incoming data including first data having a first classification level; at least one key cache storing a plurality of key sets, each of the key sets corresponding to one of the different levels of security classification, wherein a first set of keys is selected from the plurality of key sets to encrypt the first data by a first cryptographic module of the cryptographic modules; and a packet write engine, included in the first cryptographic module, configured to send the encrypted first data to a common data storage.
-
Specification