×

Scalable security architecture systems and methods

  • US 10,491,639 B2
  • Filed: 03/17/2015
  • Issued: 11/26/2019
  • Est. Priority Date: 03/17/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • detecting a system resource request transmitted over a system fabric;

    determining a security status of the system resource request with respect to a security rule set, wherein the security rule set comprises at least one of communication, input/output (I/O), or execution partitions associated with a plurality of user modules each comprising a corresponding security application interface broker,wherein each of the plurality of user modules are securely isolated from one another via a firewall and physically partitioned from one another within a system enclosure, and wherein each of the plurality of user modules are separately removable from the system enclosure; and

    allocating system resources for at least one of the plurality of user modules, using at least one of the corresponding security application interface brokers, based, at least in part, on the determined security status of the system resource request,wherein the user modules are configured to be coupled within the system enclosure, the system enclosure is configured to be mounted to or within a mobile structure, and the mobile structure comprises a commercial aircraft, a private aircraft, a ground vehicle, a military aircraft, a rotorcraft, and/or an unmanned vehicle.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×