×

Host-to-host communication in a multilevel secure network

  • US 9,712,541 B1
  • Filed: 08/19/2013
  • Issued: 07/18/2017
  • Est. Priority Date: 08/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A network-communication system comprising:

  • a plurality of computer systems each of which is configured to operate in accordance with at least one protocol stack assigned to a security level of a multilevel security model, wherein each computer system includes a processor and non-transitory computer-readable storage medium having computer-readable program code stored therein that, in response to execution by the processor, causes the computer system to at least;

    perform address discovery or registration for one or more network-layer addresses with a network for an exchange of data between hosts provided by protocol stacks at respective security levels of the multilevel security model; and

    exchange data between the hosts, the data being accessible or inaccessible by the hosts according to the respective security levels and one or more mandatory access control information flow policies consistent with the multilevel security model,wherein the address discovery or registration is performed using a network management protocol that is trusted and accessible by the hosts without regard to the respective security levels and one or more mandatory access control information flow policies;

    wherein protocol stacks of the computer systems are configured to provide respective ones of a first host at a first security level, a second host at a second security level that is lower than the first security level, and one of the computer systems is configured to function as a cross-domain solution (CDS),wherein the first host is configured to publish to the network, data on a given topic that is subscribed to by the second host, the data at the first security level being inaccessible by the second host according to the multilevel security model, andwherein the CDS is subscribed to the data as a proxy for the second host, and the CDS is configured to filter the data to produce filtered data at the second security level, and republish the filtered data to the network for receipt by the second host, the data being published to the network or filtered data being republished to the network using the one or more network-layer addresses.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×