×

Multi-level secure computer with token-based access control

  • US 6,351,817 B1
  • Filed: 10/27/1999
  • Issued: 02/26/2002
  • Est. Priority Date: 10/27/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A multilevel computer security system comprising:

  • a core computer including a central processor unit (CPU), random access memory (RAM), and a computer-power supply with the CPU coupled to and controlling the operation of devices and data interfaces, within the multilevel computer security system, for data processing, data communications, and data storage;

    a first security subsystem coupled to the core computer via a data bus, having means for storing the data and communicating data at a first security level;

    at least one additional-security subsystem coupled to the core computer via the data bus, with each of said additional-security subsystems having means for storing data at a designated and exclusive security level higher than the first security level, each of the additional-security subsystems including power-indicator means for illuminating when the additional-security subsystem is receiving power from said computer-power supply;

    access control means that process access requests and identification information from a user and correlate it with the security identification requirements and access privilege information within a security token possessed by the user to output an activation signal representative of the security level that is granted to the user;

    security level sensor means that enable the transmission of said activation signal from the access control means to the electronically-activated power switching means only if the additional-security subsystem is determined by said sensor means to be at a security level corresponding to the security level represented by said activation signal;

    electronically-activated power switching means, responsive to the electronic activation signals from said access-control means for selecting a security subsystem at said security level granted to said user and connecting power from the computer power-supply to only said selected security subsystem, thereby isolating said powered security subsystem and the data at its designated security level from all other security subsystems.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×