WO2020128603A1 - Configurable hardware security module - Google Patents
Configurable hardware security module Download PDFInfo
- Publication number
- WO2020128603A1 WO2020128603A1 PCT/IB2018/060555 IB2018060555W WO2020128603A1 WO 2020128603 A1 WO2020128603 A1 WO 2020128603A1 IB 2018060555 W IB2018060555 W IB 2018060555W WO 2020128603 A1 WO2020128603 A1 WO 2020128603A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security module
- hardware security
- egress
- sending data
- ingress
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Definitions
- a configurable Hardware Security Module where we can configure device based security policies at egress and ingress ports of the device.
- the Hardware Security Module at egress and ingress ports of the device with an Access Control List (ACL) which consists of secretly chosen cryptographic keys for sending data to the port of a destination device and receiving data from the port of a source device respectively.
- ACL Access Control List
- the destination device receiving data from the above configured device or the source device sending data to the above configured device also have their Hardware Security Module at ingress and egress ports respectively configured with with an Access Control List (ACL), which consists of secretly chosen cryptographic keys for receiving and sending data respectively.
- ACL Access Control List
Abstract
In this invention we have a configurable Hardware Security Module where we can configure device based security policies at egress and ingress ports of the device. Here we configure the Hardware Security Module at egress and ingress ports of the device with an Access Control List (ACL) which consists of secretly chosen cryptographic keys for sending data to the port of a destination device and receiving data from the port of a source device respectively. The destination device receiving data from the above configured device or the source device sending data to the above configured device also have their Hardware Security Module at ingress and egress ports respectively configured with with an Access Control List (ACL), which consists of secretly chosen cryptographic keys for receiving and sending data respectively.
Description
Configurable Hardware Security Module
In this invention we have a configurable Hardware Security Module where we can configure device based security policies at egress and ingress ports of the device. Here we configure the Hardware Security Module at egress and ingress ports of the device with an Access Control List (ACL) which consists of secretly chosen cryptographic keys for sending data to the port of a destination device and receiving data from the port of a source device respectively. The destination device receiving data from the above configured device or the source device sending data to the above configured device also have their Hardware Security Module at ingress and egress ports respectively configured with with an Access Control List (ACL), which consists of secretly chosen cryptographic keys for receiving and sending data respectively.
Claims
1. In this invention we have a configurable Hardware Security Module where we can configure device based security policies at egress and ingress ports of the device. Here we configure the Hardware Security Module at egress and ingress ports of the device with an Access Control List (ACL) which consists of secretly chosen cryptographic keys for sending data to the port of a destination device and receiving data from the port of a source device respectively. The destination device receiving data from the above configured device or the source device sending data to the above configured device also have their Hardware Security Module at ingress and egress ports respectively configured with with an Access Control List (ACL), which consists of secretly chosen cryptographic keys for receiving and sending data respectively. The above novel technique of maintaining a configurable
Hardware Security Module at egress and ingress ports of the device is the claim for this invention.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2018/060555 WO2020128603A1 (en) | 2018-12-22 | 2018-12-22 | Configurable hardware security module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2018/060555 WO2020128603A1 (en) | 2018-12-22 | 2018-12-22 | Configurable hardware security module |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020128603A1 true WO2020128603A1 (en) | 2020-06-25 |
Family
ID=71102563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2018/060555 WO2020128603A1 (en) | 2018-12-22 | 2018-12-22 | Configurable hardware security module |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2020128603A1 (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8484486B2 (en) * | 2008-08-06 | 2013-07-09 | Silver Spring Networks, Inc. | Integrated cryptographic security module for a network node |
-
2018
- 2018-12-22 WO PCT/IB2018/060555 patent/WO2020128603A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8484486B2 (en) * | 2008-08-06 | 2013-07-09 | Silver Spring Networks, Inc. | Integrated cryptographic security module for a network node |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4254248A3 (en) | Cryptographic methods and systems for managing digital certificates | |
US11122436B2 (en) | Internal signal diversion apparatus and method for mobile communication devices | |
US7607167B1 (en) | Secure gateway/router | |
GB2572088A (en) | Controlling access to a locked space using cryptographic keys stored on a blockchain | |
US20130332724A1 (en) | User-Space Enabled Virtual Private Network | |
AU2017100661A4 (en) | An information security method of distributed electric vehicle controllers | |
US8255986B2 (en) | Methods of securely controlling through one or more separate private networks an internet-connected computer having one or more hardware-based inner firewalls or access barriers | |
US20100228961A1 (en) | Hierarchical secure networks | |
US20110231926A1 (en) | Basic architecture for secure internet computers | |
US11297070B2 (en) | Communication apparatus, system, method, and non-transitory medium | |
GB2375697B (en) | Automatic identity protection system with remote third party monitoring | |
CY1119859T1 (en) | SYSTEM AND METHOD FOR ACCREDITATION TRANSFER | |
Brandt et al. | Security analysis of software defined networking protocols—openflow, of-config and ovsdb | |
EP3506561A1 (en) | Secure hash operations in a trusted execution environment | |
CN107852406A8 (en) | secure group communication | |
KR20220125251A (en) | Programmable Switching Device for Network Infrastructures | |
JP2018512686A (en) | Security system for cash processing equipment | |
WO2020128603A1 (en) | Configurable hardware security module | |
Rosborough et al. | All about eve: comparing DNP3 secure authentication with standard security technologies for SCADA communications | |
US10805066B2 (en) | Cryptographic algorithm having a key-dependent masked computing step (SBOX call) | |
JP2023510002A (en) | System and method for secure data transfer using air gapping hardware protocol | |
KR20190065037A (en) | Gps spoofing to prevent the attack drone | |
US11552998B2 (en) | Device and system with a root of trust | |
US7640433B1 (en) | MILS network using COTS switches | |
WO2016019293A1 (en) | Optiarmor secure separation device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18943827 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18943827 Country of ref document: EP Kind code of ref document: A1 |