CA2339373A1 - Data transfer - Google Patents

Data transfer Download PDF

Info

Publication number
CA2339373A1
CA2339373A1 CA002339373A CA2339373A CA2339373A1 CA 2339373 A1 CA2339373 A1 CA 2339373A1 CA 002339373 A CA002339373 A CA 002339373A CA 2339373 A CA2339373 A CA 2339373A CA 2339373 A1 CA2339373 A1 CA 2339373A1
Authority
CA
Canada
Prior art keywords
data
computer
transfer buffer
work station
vettable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002339373A
Other languages
French (fr)
Inventor
Charles Anthony Ashcroft
Colin Robert Law
Peter Mogg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mogg Blereau Research Pty Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2339373A1 publication Critical patent/CA2339373A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Abstract

A method of vetting a data transfer, said method including: transferring the data from an origin computer or computer network to a buffer; quarantining t he buffer and vetting the data in the buffer; and releasing the data to a destination computer or computer network after the data has been vetted.</SD OAB>

Description

' PCT/AU99/00604 Received 23 December 1999 "DATA TRANSFER"
TECHNICAL FIELD
This invention relates to a work station which is selectively connectable to one of two or more computer networks of differing security classification. More specifically, the invention relates to the utilisation of the work station as a gateway for the safe transfer of data between computer networks of differing security classification. The invention has particular utility in the defence environment.
BACKGROUND ART
It is often necessary to transfer data between otherwise segregated computer networks having differing security classifications. For example, certain information may from time to time be downgraded in security (eg. from "top secret" to "secret", or from "secret" to "confidential' and to implement such a downgrade it is necessary to take the information from the higher security network and release it to the lower security network.
If the respective networks were fully isolated from each other, such a transfer of 2 o data from one network to another could occur via portable external buffers such as floppy discs, CD ROMS or the like. However, there are advantages, in both the defence and commercial environments, to having connections between networks and more recently there has been a trend to utilise a single work station which is selectively connectable to the various networks to thereby provide a "gateway" between the 2 5 various networks.
Transfer of data between computer networks of differing security classifications can present problems in terms of security, especially when information is being downgraded, as there is a risk that additional information will be inadvertently and concurrently released from the higher system to the lower system together with the 3 o intended release.
The present invention aims to provide a work station in which data can be safely transferred between computer networks of differing classifications. The closest art known to the applicant is Australian Patent 691102 (Commonwealth of Australia -"the '~~it- ., .~;,~ 'asii.::::T
4~_..~~~1 ~ Received 23 December 1999 Starlight patent") published 16 October 1996. It is known from the Starlight patent to utilise a work station which is selectively connectable to multiple networks via a data switch. The Starlight patent teaches a system in which information may freely flow from a lower security system to a higher security system, but in which the flow of data from the higher security system to the lower security system is prevented by a data diode.
DISCLOSURE OF INVENTION
L 0 According to one aspect the invention resides in a work station which is selectively connectable to one of two or more computer networks of differing security classifications, the work station including:-a vettable data transfer buffer; and a data switch having a first state in which the work station is connected to a first computer network and in which data can be transferred from the first computer network to the vettable data transfer buffer, a second state in which the work station is connected to a second computer network and in which data can be transferred from the vettable data transfer buffer to the second computer network, and an intermediate state in which the vettable data transfer buffer is isolated from both the first and second z 0 computer systems and in which data in the vettable data transfer system can be vetted prior to release to the second computer network.
In a preferred form, the vettable data transfer buffer is configured to only store readable characters and the user is forced to examine the contents of the vettable data transfer buffer whilst the data switch is in the intermediate state and prior to release of the data to the second computer network. In one embodiment, the user must scroll through the vettable data transfer buffer whilst the data switch is in the intermediate state.
BRIEF DESCRIPTION OF DRAWINGS
Reference will now be made to the accompanying Figures which illustrate preferred embodiments) of the invention and in which:-FIG 1 is a schematic illustration of a first embodiment of a work station; and ~. ".; ::;°; -, ,~._.._ ' ~~%Iim..i~., . ",.
, ir~~t;;.y....~.1 Received 23 December 1999 FIG 2 is a schematic illustration of a second embodiment of a work station.
BEST MODE
With reference to FIG 1 there is schematically illustrated a first embodiment of a work station according to the invention.
The work station includes an input device (eg. keyboard/mouse), an output device (ie. monitor), and a secure transfer buffer which are all selectively connectable via a switch to either computer A or computer B.
It will be understood that computer A and computer B may be individual computers or networks of computers.
The three switches are ganged together for synchronised movement and each switch has three positions. In practice, the user manipulates a single actuator which simultaneously actuates all three switches.
:.5 In FIG 1 the switch is shown in the intermediate position. It will be understood that when the switches are actuated to the left-most position, the input device, output device and secure transfer buffer are all connected to computer A. In this configuration, the user can manipulate and view data in computer A.
Similarly, when the switches are all actuated to the right-most position" the input o device, output device and secure transfer buffer are all connected to computer B. In this configuration, the user can manipulate and view data in computer B.
In the intermediate position illustrated in FIG 1, the input device is isolated, and the secure transfer buffer and output device are connected together but are isolated from both computer A and computer B.
5 Operation of this systems is as follows and assumes that it is desired to transfer data from computer A to computer B. As discussed above, the critical transfer is from the higher security system to the lower security system. Accordingly, it is assumed in this example that computer A has a higher security classification than computer B. It will also be understood that the operator of the work station has a security clearance :3 o which enable them to work in the higher security environment.
The transfer of data from computer A to computer B starts with the switches in the left-most position. As discussed, in this position the input device, output device and secure transfer buffer are gall connected to computer A. The input device is used w G~~;°:.'.:y mi."t ,:-;~~t_ P
i' ° ~:~il k:.i Received 23 December 1999 to select data from computer A and send the data to the secure transfer buffer.
Once the selected data has been transferred to the secure transfer buffer, the switch is moved to the intermediate position illustrated in FIG 1 in which the data in the secure transfer buffer is quarantined from both the origin computer A and the destination computer B. It will be understood that the work station is configured such that any buffers or registers other than the secure transfer buffer are cleared during switching. Alternatively, the work station may have all other buffers or registers eliminated altogether. This ensures that the secure transfer buffer is the only possible repository of data sourced from computer A.
Whilst the data is quarantined in the secure transfer buffer, it can be viewed via the output device or vetted by other means.
In a preferred embodiment the secure transfer buffer is configured such that the quarantined data must be fully viewed before it can be released. One way of ensuring this occurs is to insist that a cursor under the control of the user must be scrolled through the entirety of the quarantined data before the data can be released to the destination computer. Preferably, the secure transfer buffer is configured so that it can only receive displayable characters. Thus, it is ensured that the viewer of the output device is able to review all data quarantined in the secure transfer buffer.
This embodiment relies on the operator of the work station to view the contents of the 2 o secure transfer buffer.
In other embodiments, this secure transfer buffer may be capable of receiving non-displayable characters in which case it will be necessary for hardware or software to screen the quarantined data to ensure that there is no hidden data, viruses or the like.
Once the quarantined data has been satisfactorily vetted either by software, hardware and/or by viewing on the part of the user, the switch can then be actuated to the right-most position at which the data can be released to the destination computer B. Once the data has been released by the buffer, the buffer is cleared.
It should also be noted that the act of switching causes a re-set or deletion of 3 0 any data held in the input device or output device thereby ensuring that only data which has been quarantined and vetted in the secure transfer buffer can pass to computer B.
Referring now to FIG 2 there is shown a second embodiment which is largely 6~~:_~:!~.a ~

' Received 23 December 1999 identical to the first embodiment: with the exception of the inclusion of a second output device which is dedicated to the secure transfer buffer.
Operation of this second embodiment is similar to the first embodiment however it will be explained again below to ensure clarity.
5 Again, it is assumed that it is desired to transfer data from computer A to computer B.
The process starts with all three switches in the left-most position in which input device, output device and secure transfer buffer are all connected to computer A.
Data to be transferred is sent from computer A to secure transfer buffer. The l0 switch is then moved to the intermediate position in which all other buffers are cleared and the secure transfer buffer i;s quarantined from all devices except for its dedicated output device. The dedicated output device has some means to enable the user to scroll through the data displayed on the dedicated output device.
As previously, in a preferred embodiment, the secure transfer buffer is only capable of receiving displayable characters from computer A. Thus, it can be ensured that all data in the secure transfer buffer can be viewed via the dedicated output device. Again, there may be some mechanism to ensure that the user views and vets all of the data which is quarantined in the secure transfer buffer. This may be done, for example, by insisting that a cursor be scrolled through the entirety of the data prior to 2 o release of the quarantine data being enabled.
It is again mentioned that, in other embodiments, vetting of the data quarantined in the secure transfer buffer may be conducted by hardware or software or the like rather than by viewing on the part of the user.
In the embodiment shown in FIG 2, once the user is satisfied that the data 5 quarantined in the secure transfer buffer has been scrutinised to an acceptable level, then the switch can be actuated to the right-most position in which the input device, output device and secure transfer buffer are all connected to computer B. The vetted data can then be released to computer B.
Once the data has been released by the secure transfer buffer, the buffer and _s 0 dedicated output device are cleared.
Again, it is mentioned that the act of switching causes a re-set or deletion of any data retained by the input device and non-dedicated output device, thereby ensuring that the only quarantined and vetted data in the secure transfer buffer can be released ~~,R~br, . "', 5 y r--.~
.. ~. 'J ic~.'y ~ry..~ r Received 2~ December 1999 to the destination computer.
In conclusion, the invention provides a work station for transferring data between computers or computer networks in which the data is vetted prior to release to the destination computer or computer network.
In preferred embodiments, the vetting of the data is the responsibility of the user who is obliged to view the quarantined data prior to releasing the data to the destination system. In other arrangements, the vetting of the data could be done by hardware or software. However, in either case, the data cannot be released to the destination system until it has been vetted.
1 o Furthermore, the system is designed such that data cannot pass by any other channel to the destination system thereby ensuring that only vetted data can be released to the destination system.
It will, of course, be realised that the above has been given by way of illustrative examples of the invention. Any variations, modifications, or omissions, as would be apparent to persons skilled in the art, are deemed to fall within the broad scope of this invention.
AME°;;::~~~ ~~;ma 4 ~: .._ , r

Claims (5)

THE CLAIMS DEFINING THE INVENTION ARE AS FOLLOWS:
1. A work station which is selectively connectable to one of two or more computer networks of differing security classifications, the work station including:
a vettable data transfer buffer; and a data switch having a first state in which the work station is connected to a first computer network and in which data can be transferred from the first computer network to the vettable data transfer buffer, a second state in which the work station is connected to a second computer network and in which data can be transferred from the vettable data transfer buffer to the second computer network, and an intermediate state in which the vettable data transfer buffer is isolated from both the first and second computer systems and in which data in the vettable data transfer system can be vetted prior to release to the second computer network.
2. A work station as claimed in claim 1, wherein the vettable data transfer buffer is configured to only store readable characters.
3. A work station as claimed in claim 2, wherein the user is forced to examine the contents of the vettable data transfer buffer whilst the data switch is in the intermediate state and prior to release of the data to the second computer network.
4. A work station as claimed in claim 3, wherein the user must scroll through the vettable data transfer buffer whilst the data switch is in the intermediate state.
5. A work station as claimed in claim 1, wherein the vettable data transfer buffer is cleared after the data is released to the second computer network.
CA002339373A 1998-08-07 1999-07-27 Data transfer Abandoned CA2339373A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AUPP5141A AUPP514198A0 (en) 1998-08-07 1998-08-07 Data transfer
AUPP5141 1998-08-07
PCT/AU1999/000604 WO2000008562A1 (en) 1998-08-07 1999-07-27 Data transfer

Publications (1)

Publication Number Publication Date
CA2339373A1 true CA2339373A1 (en) 2000-02-17

Family

ID=3809373

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002339373A Abandoned CA2339373A1 (en) 1998-08-07 1999-07-27 Data transfer

Country Status (4)

Country Link
EP (1) EP1151381A1 (en)
AU (1) AUPP514198A0 (en)
CA (1) CA2339373A1 (en)
WO (1) WO2000008562A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9426652B2 (en) * 2010-09-09 2016-08-23 Joseph Nutaro High assurance authorization device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5319776A (en) * 1990-04-19 1994-06-07 Hilgraeve Corporation In transit detection of computer virus with safeguard
DE69511556D1 (en) * 1994-06-01 1999-09-23 Quantum Leap Innovations Inc COMPUTER VIRUS TRAP
JPH10307776A (en) * 1997-05-06 1998-11-17 Nec Niigata Ltd Computer virus reception monitor device and its system

Also Published As

Publication number Publication date
AUPP514198A0 (en) 1998-09-03
EP1151381A1 (en) 2001-11-07
WO2000008562A1 (en) 2000-02-17

Similar Documents

Publication Publication Date Title
JP3691519B2 (en) Method and means for communicating networks of different security levels with each other
RU2365988C2 (en) Provision for protected input into system with highly reliable program execution environment
US7607167B1 (en) Secure gateway/router
US20080024433A1 (en) Method and system for automatically switching keyboard/mouse between computers by user line of sight
EP3564795B1 (en) Human interface device switch with security function
US6578089B1 (en) Multi-computer access secure switching system
EP2779014A1 (en) Security box
WO2003026216A1 (en) Network information processing system and network information processing method
KR20040008365A (en) Apparatus and method for display
JP2000242377A (en) Display device
US20020091969A1 (en) Computer-based switch for testing network servers
CN110347618A (en) A kind of keyboard, video and mouse two-shipper multiplex system
US20110270961A1 (en) Information processing apparatus, selector, remote operation system, scan code transmission method, and program product therefor
US7047425B2 (en) Scaleable muti-level security method in object oriented open network systems
CA2339373A1 (en) Data transfer
BR0309289A (en) Equalizer Mode Switching
US20070199072A1 (en) Control of application access to system resources
AU4890999A (en) Data transfer
US20040044822A1 (en) Computer I/O switching means based on network links
JP3801082B2 (en) Screen image transmission system and method, and screen image transmission program
US7464261B2 (en) Switching device, switching method and computer system capable of preventing error in data transmission, which is easy to use
US20070174501A1 (en) System and method for managing a data transfer channel between communication devices
AU691102B2 (en) Method and means for interconnecting different security level networks
CA2217012C (en) Method and means for interconnecting different security level networks
AU691102C (en) Method and means for interconnecting different security level networks

Legal Events

Date Code Title Description
FZDE Discontinued