Skeleton Network: Physical Corner Stone for The Towering Cyber House
First Claim
Patent Images
1. A system comprised of a network of communicating elements, where the network is called “
- skeleton network” and
the elements are called “
skeleton stations”
, and where every skeleton station is comprised of a physical-entry computer (PEC), and a data access box (DAB), and where the DAB is a secure enclosure as described in U.S. patent application Ser. No. 15/293,352 with the shared key fitted inside the DAB, and where all remote data that comes into the skeleton station is first routed through the DAB where it is decrypted before it is routed to the PEC, and where the PEC is limited to physical and local data entry, except as to data entry from the DAB; and
in addition, each skeleton station is constructed to send messages to other skeleton stations by first encrypting these message through the DAB by routing the plaintext version of these messages in a hard wired mode to the DAB and routing the outcome of the DAB, the ciphertext version, to a target skeleton station in the skeleton network.
0 Assignments
0 Petitions
Accused Products
Abstract
This invention establishes a physical corner stone to build upon it a towering cyber space—creating a baseline which is out of bounds for remote hackers, and is tamper resistant to hands on attackers—intended to survive even a catastrophic breach of the host network, and subsequently serve as a leverage to recover from the attack. Foundational security for critical infrastructure.
0 Citations
8 Claims
-
1. A system comprised of a network of communicating elements, where the network is called “
- skeleton network” and
the elements are called “
skeleton stations”
, and where every skeleton station is comprised of a physical-entry computer (PEC), and a data access box (DAB), and where the DAB is a secure enclosure as described in U.S. patent application Ser. No. 15/293,352 with the shared key fitted inside the DAB, and where all remote data that comes into the skeleton station is first routed through the DAB where it is decrypted before it is routed to the PEC, and where the PEC is limited to physical and local data entry, except as to data entry from the DAB; and
in addition, each skeleton station is constructed to send messages to other skeleton stations by first encrypting these message through the DAB by routing the plaintext version of these messages in a hard wired mode to the DAB and routing the outcome of the DAB, the ciphertext version, to a target skeleton station in the skeleton network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- skeleton network” and
Specification