Integrated multi-level or cross-domain network security management appliance, platform and system, and remote management method and system therefor

ABSTRACT

Described are various embodiments of an integrated multi-level or cross-domain network security appliance and system. In one embodiment, a cross-domain network traffic management appliance comprises: an external hardware network domain port to interface with an external network corresponding with a first network security domain, and exchange domain-specific data therethrough; a cross-domain hardware port to interface with a second network security domain and exchange cross-domain data therethrough; one or more hardware-integrated processing engines; and a hardware-integrated interconnection matrix configured to define, in hardware, designated data communication paths to interconnect said processing engines; wherein said one or more hardware-integrated processing engines are operable to: process and validate ingress first domain data received from said first network security domain via said external hardware port for cross-domain egress via said cross-domain hardware port; and process cross-domain ingress data received via said cross-domain hardware port for dispatch to said first network security domain via said external hardware network port; wherein cross-domain egress and ingress data is internally encrypted and decrypted, respectively, in accordance with a designated destination-domain encryption process.

FIELD OF THE DISCLOSURE

The present disclosure relates to communication networks and devicesand, in particular, to an integrated multi-level or cross-domain networksecurity appliance and system, and remote management system and methodtherefor.

BACKGROUND

Multi-level network architectures are commonly deployed, for instance,where disparate networking resources are required to establishparticular network data paths across and particularly between networkzones and/or interfaces in order to deliver a particular service orapplication. Physical separation between network resources is alsocommonplace in high security implementations, for example, wherephysically isolated network security zones may be required to secureback end resources for instance deployed in a high security zone frompublic and/or low security authorized user zones. In some high securityinstallations, the establishment of physically isolated networkingdevices/appliances is in fact a requirement to satisfy securitycompliance standards beyond basic commercial networking standards, suchas described in the Federal Information Processing Standard (FIPS 140-2)document published by the United States National Institutes of Standardsand Technology (NIST), for example, and above. Accordingly, a networksecurity zoning architecture may be invoked to physically separate ahigh security zone in which a sensitive restricted-access database orapplication server is implemented, from a public access zone operated inaccordance with reduced access security standards so to allow greateruser access and operation.

Generally, a multi-level network architecture, such as a networksecurity zoning architecture, will take the form of a stack of distinctnetwork-enabled devices, interconnected in accordance with a designatedoperational network design via a series of corresponding physicalnetwork interface controllers and cables, to relay data, commands andinstructions over a set of established (secured) data channels. In doingso, reasonable security strength can be achieved by virtue of therespective physical segregation of the externally interconnectednetworking devices, though network tampering may nonetheless result fromphysical reconnection of the subject devices, unauthorized local accessvia external physical connection to one or more of the subject devices,introduction of an unauthorized hacking device, or again by unauthorizedreallocation of software-defined ports and/or data channels on tamperedor otherwise compromised devices, to name a few examples. It istherefore considered critical to also ensure the physical security ofsuch architectures.

Alternative solutions to physically segregated network devices mayinclude the virtualization of certain network resources through softwareso as to combine multiple such resources on a same networking device orappliance. Accordingly, rather than to physically interconnectnetworking devices as above, a set of virtual network interfacecontrollers may be configured in software to define appropriate virtualinterfaces between the various network components virtualized on a samephysical device. In the context of network security zoning, systemdesigners may seek to at least partially collapse a given network zoningarchitecture into one or more virtualization zones (e.g. physicallysegregated zone-by-zone virtualization or physically aggregated zonevirtualizations—see for example, Network Segmentation in VirtualizedEnvironments by vmware:https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/techpaper/network_segmentation.pdf).Contrary to its physical implementation, a virtualized zoningarchitecture will interconnect virtualized servers via virtual switches,network interface controllers and the like to reduce required hardware.In doing so, the system becomes easier to implement and customizethrough software management applications, but also becomes morevulnerable to misconfigurations of, or tampering with, the virtualizedsystem components, which may result in loss of zone isolations and/ordata breaches

This background information is provided to reveal information believedby the applicant to be of possible relevance. No admission isnecessarily intended, nor should be construed, that any of the precedinginformation constitutes prior art or forms part of the general commonknowledge in the relevant art.

SUMMARY

The following presents a simplified summary of the general inventiveconcept(s) described herein to provide a basic understanding of someaspects of the disclosure. This summary is not an extensive overview ofthe disclosure. It is not intended to restrict key or critical elementsof embodiments of the disclosure or to delineate their scope beyond thatwhich is explicitly or implicitly described by the following descriptionand claims.

A need exists for an integrated multi-level or cross-domain networksecurity appliance and system, and remote management system and methodtherefor, that overcome some of the drawbacks of known techniques, or atleast, provides a useful alternative thereto. Some aspects of thisdisclosure provide examples of such systems and methods.

In accordance with one aspect, there is provided an integratedmulti-level network appliance comprising: two or morehardware-integrated processing engines each operable to implement acorresponding network-related resource associated with a respectivenetwork level in accordance with a designated multi-level networkarchitecture; one or more integrated digital data processors operable toexecute said processing engines; one or more integrated data storageresources accessible to said processing engines to implement each saidcorresponding network-related resource; and a trusted single-chip switchhaving a plurality of hardware ports associated therewith and configuredto define in hardware multiple data communication paths embeddedtherein; wherein each of said processing engines interfaces with atleast one of said hardware ports in hardware so to route processingengine traffic therethrough along selected ones of said embeddedcommunication paths to operatively interconnect said processing enginesacross network architecture levels through internal integrated hardwarenetwork connections.

In one embodiment, the integrated appliance further comprises atamper-resistant housing in which each of said processing engines, saiddata processors, said storage resources and said switch are operativelyhoused.

In one embodiment, the switch further comprises one or more channel dataprocessing resources embedded therein to integrally operate on saidprocessing engine traffic along at least one of said communicationpaths.

In one embodiment, each of said one or more channel data processingresources comprise an embedded hardware security module (HSM) hardwiredto interface with at least one of said hardware ports to electronicallyreceive input hardware port-specific cryptographic data thereon toinitiate execution of an internal cryptographic process as a functionthereof via an embedded cryptographic engine thereof.

In one embodiment, each of said one or more channel data processingresources comprise an embedded hardware security module (HSM) hardwiredto interface with at least two of said hardware ports, each one of whichoperable to electronically receive given input hardware port-specificcryptographic data thereon to initiate execution of an internalcryptographic process as a function thereof; wherein said HSM comprises:two or more segregated hardware port-specific storage spaces eachoperatively linked to a corresponding one of said at least two hardwareports via a corresponding hardware link, and storing respective securedhardware port-specific cryptographic data thereon exclusivelyretrievable as a function of said given input hardware port-specificcryptographic data corresponding thereto; and a cryptographic engineoperable to execute said cryptographic process based on said securedport-specific cryptographic data retrieved from said segregated hardwareport-specific storage media as a function of said given inputport-specific cryptographic data

In one embodiment, said HSM is operable as a multi-level HSM whereinsaid at least two hardware ports are respectively associated with onesaid respective network level.

In one embodiment, each said respective network level corresponds to adistinct network security zone.

In one embodiment, the one or more channel data processing resourcescomprise one or more of an inline channel cryptographic resource, a datachannel filter resource, a data channel comparator resource, a datachannel sniffer resource or a data channel diode resource.

In one embodiment, said one or more communication channel resourcescomprise an inline channel encryption resource executed distinctly fromsaid cryptographic engine.

In one embodiment, the cryptographic engine is operable to execute acontrol plane cryptographic process, whereas said inline channelencryption resource is operable to execute a communication planecryptographic process subsequent to successful execution of said controlplane cryptographic process.

In one embodiment, the control plane cryptographic process comprises anew session initiation process invoking a private key stored in saidsegregated port-specific storage space, whereas said communication planecryptographic process comprises an in-session cryptographic processinvoking a distinct session key.

In one embodiment, the cryptographic engine comprises distinct hardwareport-specific cryptographic engines.

In one embodiment, each of said distinct hardware port-specificcryptographic engines is associated with a corresponding one of saidsegregated hardware-port specific storage spaces.

In one embodiment, the corresponding one of said segregatedhardware-port specific storage spaces is exclusively accessible via ahardware link operatively defined through said associated one of saiddistinct hardware port-specific cryptographic engines.

In one embodiment, at least some said corresponding hardware link isimplemented via common embedded hardware logic.

In one embodiment, the two or more-segregated hardware port-specificstorage spaces comprise one or more externally integrated hardwarestorage resources.

In one embodiment, the switch is implemented in a field-programmablegate array (FPGA).

In one embodiment, the switch is reconfigurable to reconfigure one ormore of said embedded data communication paths.

In one embodiment, the switch is remotely reconfigurable.

In one embodiment, the integrated appliance further comprises a commonexternal administration interface to provide authorised external accessto distinct appliance resources in accordance with a designatedmulti-tier authorisation protocol, wherein selective access todesignated ones of said appliance resources is provided via said toadministration interface as a function of distinctly definedadministrator access authentication profiles.

In one embodiment, the designated multi-tier authorisation protocoldefines distinct administrative access permissions for said switch andat least one of said processing engines.

In one embodiment, the processing engines are operable to respectivelyimplement an outer virtual private network (VPN) and an inner VPN inaccordance with a designated multi-level VPN architecture.

In one embodiment, the processing engines are operable to respectivelyimplement a digital entropy source and an entropy service engine.

In one embodiment, the processing engines are operable to respectivelyimplement hardware isolated ingress and egress processing resources toisolate ingress and egress network traffic between distinctly integratednetwork security zones.

In accordance with another aspect, there is provided an integratednetwork security zoning appliance operable to implement a networkarchitecture having distinct network security zones, the appliancecomprising: two or more hardware-integrated processing engines eachoperable to implement a corresponding network-related resourceassociated with a respective one of the network security zones; one ormore integrated digital data processors operable to execute saidprocessing engines; one or more integrated data storage resourcesaccessible to said processing engines to implement each saidcorresponding network-related resource; and an integrated multi-zonehardware security module (HSM) having a plurality of hardware portsassociated therewith and configured to define in hardware multiple datarouting paths embedded therein and operatively interconnecting saidhardware ports; wherein said HSM is hardwired via respective ones ofsaid hardware ports to interface with respective ones of said processingengines to electronically receive input zone-specific cryptographic datatherefrom to initiate execution of an internal cryptographic process asa function thereof via a cryptographic engine associated therewith.

In one embodiment, the HSM comprises two or more segregated hardwareport-specific storage spaces each operatively linked to a correspondingone of said hardware ports via a corresponding hardware link, andstoring respective secured zone-specific cryptographic data thereonexclusively retrievable as a function of said given input zone-specificcryptographic data corresponding thereto; and said cryptographic engineis operable to execute said cryptographic process based on said securedzone-specific cryptographic data retrieved from said segregated hardwareport-specific storage media as a function of said given inputzone-specific cryptographic data.

In one embodiment, the HSM is implemented in a field-programmable gatearray (FPGA).

In one embodiment, the appliance further comprises a tamper-resistanthousing in which each of said processing engines, said data processors,said storage resources and said HSM are operatively housed.

In one embodiment, the HSM comprises one or more channel data processingresources embedded therein to operate on at least one of said routingpaths.

In one embodiment, said one or more channel data processing resourcesone or more of an inline channel cryptographic resource, a data channelfilter resource, a data channel comparator resource, a data channelsniffer resource or a data channel diode resource.

In one embodiment, the appliance further comprises a common externaladministration interface to provide authorised external access todistinct zone resources in accordance with a designated multi-tierauthorisation protocol, wherein selective access to designated ones ofsaid zones is provided via said administration interface as a functionof distinctly defined administrator access authentication profiles.

In one embodiment, the designated multi-tier authorisation protocolfurther defines a distinct administrative access permission for saidHSM.

In accordance with one aspect, there is provided a cross-domain networktraffic management appliance comprising: an external hardware networkdomain port to interface with an external network corresponding with afirst network security domain, and exchange domain-specific datatherethrough; a cross-domain hardware port to interface with a secondnetwork security domain and exchange cross-domain data therethrough; oneor more hardware-integrated processing engines; and ahardware-integrated interconnection matrix configured to define, inhardware, designated data communication paths to interconnect saidprocessing engines; wherein said one or more hardware-integratedprocessing engines are operable to: process and validate ingress firstdomain data received from said first network security domain via saidexternal hardware port for cross-domain egress via said cross-domainhardware port; and process cross-domain ingress data received via saidcross-domain hardware port for dispatch to said first network securitydomain via said external hardware network port; cross-domain egress andingress data is internally encrypted and decrypted, respectively, inaccordance with a designated destination-domain encryption process.

In one embodiment, the cross-domain egress and ingress data isrespectively encrypted or decrypted by a hardware-integrated encryptionengine.

In one embodiment, the hardware-integrated encryption engine isoperatively associated with a plurality of hardware security module(HSM) ports distinctly addressable via said respective hardware paths ofsaid interconnection matrix to respectively encrypt said cross-domainegress data and decrypt said cross-domain ingress data.

In one embodiment, the respective hardware paths of said interconnectionmatrix physically segregates ingress and egress cross-domain data paths.

In one embodiment, the appliance further comprises a distinctlyaddressable hardware-integrated administrative engine operable tosecurely manage operation of said two or more hardware-integratedprocessing engines.

In one embodiment, the appliance further comprises an external hardwaresecurity network port distinctly addressable by one of saidhardware-integrated processing engines to invoke an external validationprocess to be applied to said ingress domain-specific data prior toencryption for cross-domain egress.

In one embodiment, the hardware-integrated processing engines comprise adomain-specific protocol adapter operable to interface with saidexternal network domain port, a cross-domain data validation engineoperable to validate said ingress domain-specific data once processed bysaid protocol adapter, and a cross-domain access portal operable tointerface with said cross-domain hardware port.

In one embodiment, the interconnection matrix defines a one-way hardwaredata path between said protocol adapter and said cross-domain accessportal via said cross-domain data validation engine to process saidingress first domain data, and a distinct hardware data path betweensaid cross-domain access portal and said protocol adapter to processsaid cross-domain ingress data.

In one embodiment, the cross-domain hardware port comprises an externalcross-domain port to be operatively interfaced with a correspondingexternal cross-domain hardware port of a corresponding cross-domainnetwork traffic management appliance operatively associated with saidsecond network security domain.

In one embodiment, the cross-domain hardware port comprises an internalcross-domain port operatively interfacing with a corresponding internalcross-domain hardware port operatively associated with said secondnetwork security domain.

In one embodiment, the cross-domain hardware port is configured tooperatively interface with a secure interconnection network operativelyinterconnecting respective cross-domain hardware ports associated withrespective network security domains to securely transfer encryptedcross-domain data therebetween.

In one embodiment, the cross-domain hardware port is operable tointerface with multiple distinct second network security domains andexchange distinct destination domain-specific data therewith.

In accordance with another aspect, there is provided a cross-domainnetwork traffic management system comprising: a plurality of hardwaredata path layers, each one of which corresponding with a designatednetwork security domain and comprising: an external hardware networkdomain port to interface with an external network corresponding with agiven network security domain, and exchange domain-specific datatherethrough; a cross-domain hardware port to interface with distincthardware data path layers corresponding with distinct network securitydomains and exchange cross-domain data therethrough; or morehardware-integrated processing engines; and a hardware-integratedinterconnection matrix configured to define, in hardware, designateddata communication paths to interconnect said processing engines;wherein said hardware-integrated processing engines are operable to:process and validate ingress given domain data received from said givennetwork security domain via said external hardware port for cross-domainegress via said cross-domain hardware port; and process cross-domainingress data received via said cross-domain hardware port for dispatchto said given network security domain via said external hardware networkport; wherein cross-domain egress and ingress data is internallyencrypted and decrypted, respectively, in accordance with a respectivelydesignated destination-domain encryption process.

In one embodiment, each said cross-domain hardware port operativelyinterfaces with a secure interconnection network to securely transferencrypted cross-domain data thereon.

In accordance with another aspect, there is provided a multi-zonenetwork traffic management system or appliance comprising: one or morehardware-integrated processing engines operable to implement one or morenetwork security management processes associated with a respectivenetwork security zone; and a trusted hardware interconnection matrixhaving a plurality of hardware ports associated therewith and configuredto define in hardware multiple data communication paths embedded thereinexclusively interconnecting said network security zones via respectivehardware paths thereof that integrally invoke, in hardware, said networksecurity management processes; wherein a given data transaction isrouted in hardware via a designated hardware path of saidinterconnection matrix to operatively invoke a given network securitymanagement process, upon successful execution of which, said given datatransaction is successfully relayed to a distinct zone via a distinctone of said hardware paths, such that said network security process isintegrally invoked in hardware to process network transactions betweensaid zones.

In one embodiment, the network security management processes comprise atransaction auditing process.

In one embodiment, the network transaction is relayed, encrypted, tosaid distinct zone, and only successfully decrypted therein uponsuccessful execution of said given network security management process.

In one embodiment, the security management process, upon successfulexecution thereof, releases a decryption key to successfully decryptsaid relayed network transaction.

In one embodiment, the given network security management process, uponsuccessful execution thereof, locally decrypts said given networktransaction to be relayed to said distinct zone accordingly.

In one embodiment, the one or more network security management processescomprise a cryptographic process; and said one or morehardware-integrated processing engines comprise a cryptographic enginehardwired to interface with said hardware ports to execute each saidcryptographic process.

Other aspects, features and/or advantages will become more apparent uponreading of the following non-restrictive description of specificembodiments thereof, given by way of example only with reference to theaccompanying drawings.

BRIEF DESCRIPTION OF THE FIGURES

Several embodiments of the present disclosure will be provided, by wayof examples only, with reference to the appended drawings, wherein:

FIG. 1 is a schematic diagram of an integrated multi-level networkappliance, in accordance with one embodiment, having a trustedcommunication matrix or intelligent switch embedded therein, andoptionally having one or more embedded channel resources accessiblethereto;

FIG. 2 is a schematic diagram of an embedded hardware security module(HSM) operable as a trusted intelligent switch in the integratedmulti-level network appliance of FIG. 1, in which embedded HSM securityresources are provided as an optional embedded channel resource, inaccordance with one embodiment;

FIG. 3A is a schematic diagram of an embedded hardware security module(HSM) operable as a trusted intelligent switch in the integratedmulti-level network appliance of FIG. 1, in which embedded HSM securityresources are provided as an optional embedded channel resource, and inwhich additional channel resources are also optionally provided, inaccordance with another embodiment;

FIG. 3B is a schematic diagram of an embedded hardware security module(HSM) operable as a trusted intelligent switch, in accordance with yetanother embodiment;

FIG. 3C is a schematic diagram of an embedded hardware security module(HSM) operable as a trusted intelligent switch, in accordance with yetanother embodiment;

FIG. 4 is a schematic diagram of the embedded HSM of FIG. 3A onceintegrated within the appliance of FIG. 1 thereby acting both as anintelligent switch and as a multi-level HSM that interfaces viarespective hardware connections with a series of associated applianceprocessing engines, in accordance with one embodiment;

FIG. 5 is a schematic diagram of a network security zoning architecturefor a secure application invoking various network security zones, inaccordance with one embodiment;

FIG. 6 is a schematic diagram of a network security zoning architecture,such as that illustrated in the embodiment of FIG. 5, deployed withinthe context of the integrated appliance illustrated in FIG. 4;

FIG. 7 is a schematic diagram of a combined Entropy as a Service (EaaS)and Time Service system, as implemented within a single securityprocessing appliance and in accordance with one embodiment, forproviding accurate time-stamps and entropy data to client systems;

FIG. 8 is a schematic diagram of a Smart Data Diode, as implementedwithin a single security processing appliance and in accordance withanother exemplary embodiment, for efficiently and securely isolatingnetwork traffic originating from outside a trusted network (the egress)from network traffic originating from inside the trusted network (theingress);

FIGS. 9 to 11 are schematic diagrams of exemplary embodiments of aTrusted Data Guard system executable within the context of a singlesecurity processing appliance, for separating an Egress traffic flowfrom an Ingress traffic flow, and for each implementing a series ofinline validation and sanitizing functions;

FIG. 12 is a schematic diagram of a dual-layer Virtual Private Network(VPN) system executable within the context of a single securityprocessing appliance, in accordance with one embodiment;

FIG. 13 is a schematic diagram of a trusted auditing system executablewithin the context of a single security processing appliance, inaccordance with one embodiment;

FIG. 14 is a schematic representation of a Cross-Domain Solution (CDS)enforcement point based on one or more security processing appliances(SPAs) configured in a CDS mode of operation (SPA-CDS), in accordancewith one embodiment;

FIG. 15 is a schematic representation of three separate networkinterfaces of an illustrative SPA-CDS, in accordance with oneembodiment; and

FIGS. 16A to 16C are schematic representations of a Universal CyberSecurity Platform (UCSP) or SPA configured as an exemplaryimplementation of the SPA-CDS of to FIGS. 14 and 15, in accordance withone embodiment.

Elements in the several figures are illustrated for simplicity andclarity and have not necessarily been drawn to scale. For example, thedimensions of some of the elements in the figures may be emphasizedrelative to other elements for facilitating understanding of the variouspresently disclosed embodiments. Also, common, but well-understoodelements that are useful or necessary in commercially feasibleembodiments are often not depicted in order to facilitate a lessobstructed view of these various embodiments of the present disclosure.

DETAILED DESCRIPTION

Various implementations and aspects of the specification will bedescribed with reference to details discussed below. The followingdescription and drawings are illustrative of the specification and arenot to be construed as limiting the specification. Numerous specificdetails are described to provide a thorough understanding of variousimplementations of the present specification. However, in certaininstances, well-known or conventional details are not described in orderto provide a concise discussion of implementations of the presentspecification.

Various apparatuses and processes will be described below to provideexamples of implementations of the system disclosed herein. Noimplementation described below limits any claimed implementation and anyclaimed implementations may cover processes or apparatuses that differfrom those described below. The claimed implementations are not limitedto apparatuses or processes having all of the features of any oneapparatus or process described below or to features common to multipleor all of the apparatuses or processes described below. It is possiblethat an apparatus or process described below is not an implementation ofany claimed subject matter.

Furthermore, numerous specific details are set forth in order to providea thorough understanding of the implementations described herein.However, it will be understood by those skilled in the relevant artsthat the implementations described herein may be practiced without thesespecific details. In other instances, well-known methods, procedures andcomponents have not been described in detail so as not to obscure theimplementations described herein.

In this specification, elements may be described as “configured to”perform one or more functions or “configured for” such functions. Ingeneral, an element that is configured to perform or configured forperforming a function is enabled to perform the function, or is suitablefor performing the function, or is adapted to perform the function, oris operable to perform the function, or is otherwise capable ofperforming the function.

It is understood that for the purpose of this specification, language of“at least one of X, Y, and Z” and “one or more of X, Y and Z” may beconstrued as X only, Y only, Z only, or any combination of two or moreitems X, Y, and Z (e.g., XYZ, XY, YZ, ZZ, and the like). Similar logicmay be applied for two or more items in any occurrence of “at least one. . . ” and “one or more . . . ” language.

The systems and methods as described herein provide, in accordance withdifferent embodiments, examples in which a multi-level network securitymanagement device can be utilized to securely control the passage ofdata/transactions from one network (security) zone, domain or level, toanother while minimizing tampering opportunities and/or fraudulent use.For example, embodiments as described herein may be configured tosecurely relay data or transactions, in a common hardwareinfrastructure, from one network security zone to another, for instance,by securely channeling data access and/or traffic in hardware betweendistinct zone-specific hardware ports respectively interfacing withthese zones. For example, in one embodiment, the network managementhardware platform may comprise a trusted (intelligent) switch orconnection matrix, generally implemented in hardware and having a set ofdesignated or reconfigurable hardware ports/relays to interface with acorresponding set of distinct port-specific and/or zone-specificprocessing engines, processes and/or resources. In some of theembodiments described below, each or at least some of the network zones,processes and/or resources are integrally defined within a commonhardware appliance or platform, though other embodiments may ratherencompass all or some externally addressable zones, processes and/orresources while maintaining internal hardware port specificity andintegrity. In operation, the port-specific interconnection of thevarious internal and/or external resources with the centralized trustedswitch, can define, in combination, a multi-level network architecturehaving secured data traffic or access management capabilities betweensuch zones.

For example, in one such embodiment, a multi-zone architecture maycomprise three distinct network zones having incremental data securityratings (e.g. unclassified, confidential, secret, etc.). Each zone willinterface with a trusted set of zone-specific resources, eachinterconnected in hardware to securely execute intra and inter-zonesecurity and/or management processes via dedicated hardwareinterconnections that are specific to these zones, i.e. data trafficbetween zones is exclusively channeled through these hardware-integrateddata communication paths. Likewise, security protocols to be appliedbetween zones are integrally implemented by security resources integralor integrally coupled (e.g. hardwired) to these paths via designatedcircuitry, relays, integrated and/or inline processing resources, or thelike.

To illustrate one exemplary implementation, an event that occurs in afirst security zone (e.g. zone A) may trigger a data transaction with ahigher level, e.g. zone B. To execute this transaction, zone A mustfirst interface with the trusted switch via a first designated hardwareport thereof and zone-specific security resources applied thereto. Asillustrated in some of the examples below, such zone-specific securityresources may include one or more integrated processing engines and/orrelated hardware resources which, in some respects, may define it's ownnetwork security zone (e.g. zone X) having it's own zone-specifichardware ports (e.g. a network security enforcement and/or auditing zoneor resources specifically defined in hardware to supervise transactionsbetween zones A and B). Upon successful carriage of the zone-specificsecurity protocol on the transaction data received via the zone A port,the data transaction may successfully carry through to zone B viadistinct zone-specific hardware ports. Accordingly, zone X may act as asecure auditing or security enforcement resource between zones A and B,whereby data transactions to be implemented between these zones arenecessarily transacted via zone X and the corresponding zone-specifichardware ports associated therewith of the secure switch. In doing so,while either or both network zones A and B may be external to thetraffic security management device, by exclusively channelingtransactions between these zones through a centralized hardware switchand having hardware port-specific security management resourcesintegrated therewith, network and traffic security breaches can beminimized.

Following from the above example, the intelligent switch andport-specific channel resources and/or zones may be extended to furthernetwork zone levels, for example, where a resulting transaction event inzone B invokes or forwards a transaction with a further zone C, forinstance, which may involve distinct security measures that can becarried out by inline channel resources and/or a specificallyaddressable network security enforcement or auditing zone Y. As will beappreciated by the skilled artisan, in some embodiments, some of theinter-zone security auditing and/or enforcement resources may bedistinctly defined to interface exclusively with their dedicatedzone(s), and/or be shared between auditing/enforcement levels throughcorresponding hardware links and/or relays depending on the level ofsecurity required.

In some embodiments, inter-zone security enforcement resources maychannel inbound data through a data diode (i.e. one-way data flow)hardwired to the inbound level-specific hardware port. One or moresecurity measures can then be applied to the inbound data forvalidation, such as authentication, filtering, logging, tapping,setting, etc., which is only released to the next level via a distinctlevel-specific hardware port upon successfully satisfying the appliedsecurity measures.

In one embodiment, the inter-zone security enforcement resources mayoutright block the data transaction until security measures have beensuccessfully applied. For example, an inbound transaction may beprocessed by the enforcement resources and, if successful (e.g.validated, authenticated, etc.), safely relayed (e.g. encrypted) to thenext level to be processed thereby.

In other embodiments, the data transaction may rather proceed to thenext level in an encrypted fashion, for example, whereby appliedsecurity measures are used to validate the transaction and then, andonly then, release a decryption key or like measure to enable the nextlevel to process the relayed transaction.

In the following examples, systems and methods are described, inaccordance with different embodiments, in which a multi-level networkarchitecture, or at least a part thereof, can be collapsed into a singleintegrated appliance thereby significantly reducing a physical footprintof a given architecture while also mitigating certain security risks andmanagement challenges common to such network architectures, and that,without invoking, at least in part, common network virtualizationsolutions that inherently introduce their own security risks anddisadvantages, as will be readily appreciated by the skilled artisan. Aswill be detailed further below, while some examples illustrated hereincontemplate the provision of a wholly integrated multi-level solution,such as in the provision of a fully integrated solution that caninternally invoke and execute processes implemented in distinct securityzones, other solutions as contemplated herein may also, or alternativelyencompass a set of interconnected appliances, for example, where eachappliance may nonetheless take advantage of available internalprocessing engine multiplicity, cryptographic resources and/orassociated hardware data path customizability, to implement tiered orscaled inter or intra-level processes in the ultimate deployment of alarger scale network infrastructure. Accordingly, appliances or systemsas described herein to enable the deployment of an internal multi-levelarchitecture, should be understood to provide for the deployment ofmultiple distinct hardware segregated processing resources,interconnected by a deployable hardware interconnection matrix, todeliver, alone or in combination, different layered, sequential,parallel and/or nested network security services, resources andprocesses. Accordingly, each appliance may, in and of itself, deployresources in distinct hardware-segregated network security zones ordomains, as can they be combined to securely transact, alone or incombination, within and between such network security zones and/ordomains.

In general, each integrated appliance will comprise a trustedintelligent switch or interconnection matrix as its hub that caneffectively channel network resources and transactions between variousnetwork components to provide a desired outcome, all, in someembodiments, within the confines of a secured integrated hardware designand enclosure. Namely, in some embodiments, the operational componentsof the multi-level networking appliance can be characterized by a singlecircuit board design, or by an interconnected board design, operativelymounted within a singular tamper resistant shell, for example, thatprovides a limited number of external physical input/output interfaces,i.e. to limit potential exposure to intra-network interface tampering,reconfiguration and/or hacking. Accordingly, network componentinterconnections and data channel processing is relegated to the trustedintelligent switch, which, in some embodiments, can be deployed as anembedded chip interfacing with the various appliance components viadefined chip hardware ports. Additional channel resources, such as datasecurity resources, channel routing, auditing, encryption, processingand/or validation resources, or the like, may also be included in someembodiments, as will be further detailed below.

With reference to FIG. 1, and in accordance with one embodiment, anintegrated multi-level network appliance 100 will now be described. Theappliance generally comprises a trusted (intelligent) switch 101,generally implemented in hardware and having a set of designated orreconfigurable hardware ports/relays 102 to interface with acorresponding set of integrated processing engines 140, which can beconfigured or dynamically reconfigured to implement various networksystem functions that, in combination, define a multi-level networkarchitecture. Examples of integrated engines 140 may include, but arenot limited to, web servers, applications servers, database servers,firewalls, email servers, specialized traffic filters, applicationcompilers, network access portals, protocol adapters, channel filteringand/or auditing engines, appliance administration engines, or the like,implemented alone or in various combinations, to produce a desiredoutcome. Each processing engine 140 may rely on its own isolatedprocessor (i.e. processing core(s)) and/or memory storage device(s), oragain rely on central or shared processing resources. For instance, theappliance 100 may further comprise a central storage media 142 that maybe accessed via the trusted switch 101 and optionally include one ormore application or engine-specific storage resources, partitions and/orzones.

As noted above, integrated processing engines 140 may also, oralternatively, encompass different intra or inter-zone auditing and/orsecurity enforcement engines, for instance, invoked to ensure intra orinter-zone traffic and/or transactions adhere to internally defined andenforced security protocols. As will be described in further detailbelow, while such inter-zone auditing or management resources mayencompass distinct integrated processing resources, such as thatschematically illustrated by integrated processing engines 140, thesemay also, or alternatively encompass or invoke centralized securityprocessing resources, such as a multilevel hardware security module(HSM) and related resources, for example.

As described herein, the intelligent switch can define a trustedcommunication matrix 114 that securely relays signals between theappliance's various components and network architecture levels in atrusted hardware implementation via its corresponding set of hardwareports/relays 102 and embedded switch logic. In some embodiments, theswitch 101 thus effectively implements a trusted (intelligent) cross-baror like switch that dictates multiport interconnections via distinctlydefined communication channels, thus in some embodiments, defining aport interconnection or trusted communication matrix.

In some embodiments, the matrix 114 may further invoke certain embeddedchannel resources 116 so to further enhance interconnection logicbetween ports and port-related processes, and thus allow for embeddedsecurity logic integration within the switch's integrated hardwarearchitecture. These channel resources 116 may be integrated and invokedin a one-to-one fashion, for instance, with integrated port specificityin fully maximizing secure process isolation, or again provided as ashared resource that may be invoked and implemented for differentport-specific processes albeit without exposing any such processes toundue external tampering risks.

In the illustrated embodiments described in greater detail below,different channel resources may include, but are not limited to, datasecurity resources (e.g. encryption/decryption, secured storage, or thelike, later described within the context of an embedded hardwaresecurity module (HSM)), a data channel diode (i.e. to restrict dataflows on a defined channel to a designated direction), a data channelfilter (i.e. to filter channel data, for example, to limit throughputdata to a particular subset of retrieved data, or again tosystematically reconfigure or replace designated data elements on agiven channel data path), a channel comparator (i.e. to invoke channellogic between channels based on a comparison of data being channeledthereon, for example, allowing process throughput only upon matchingchannel data), an inline encryption function (i.e. to execute inlineIPSEC or TLS protocol, for example, and/or to implement an inline VPN orlike communication tunnel), or a sniffer function (i.e. silentnon-bypassable logging), etc.

The variable and/or customizable nature of the interconnection matrix,in some embodiments, may also or alternatively allow for the deploymentand execution of different trusted hardware network interconnectionsolutions, such as for example, in linearly channeling port-specificdata transactions between hardware ports in one or more one-to-onehardware port interconnection configurations (e.g. to provide(cryptographically) secure/trusted hardware-segregated port-specificprocessing paths), in consolidation/merging/ multiplexing distinct datachannels inbound via distinct hardware ports in a many-to-oneconfiguration (e.g. to provide (cryptographically) secure/trusteddata/transaction convergence processing paths), and/or in distributingand/or demultiplexing a single network source across multipleport-specific resources, services and/or data communication paths inparallel in a one-to-many configuration (e.g. to provide(cryptographically) secure/trusted data/transactiondistribution/dissemination across multiple data channels from atrusted/reliable source).

It will be appreciated that some or all, or again different channelresources may be integrated to provide different interconnection logicand functions between port-specific processes and thus enhance availableinternal process complexity and flexibility in providing a wholeintegrated solution, in some embodiments, embedded within a singularintelligent switch chip implementation.

Internal or external system sensors 126 may also be deployed, much aswill be described in further detail with reference to integrated sensormonitors 326 of FIG. 3A, so to effectively monitor for, and detect, anyone or more of external/internal shell tampering; unusual/unexpectedsystem displacements, movements, or vibrations; environmentaldisturbances such as water, fire, heat or smoke; uncharacteristicallyhigh system usages and/or unusual usage patterns; etc. Data acquired viaexternal system sensors 126 may also partake in selected internalprocesses, for example in furnishing a random seed value for internalcryptographic or random number generation processes, for example. Thesystem 100 may further include and benefit from a resident highprecision timing device 144, for instance, in supporting processes wherehigh precision timing may be valuable or critical.

Using the above-noted approach, systems that would otherwise require astack of interconnected devices using a set of networking cables andsoftware-defined network port allocations (and generally at bestsatisfying commercial software or hybrid security standards such as FIPS140-2), can now be implemented within a single integrated hardwarearchitecture, that is within a single tamper-resistant or tamper-proofshell and optionally, within a single integrated circuit boardarchitecture, reaching if not exceeding in some embodiments describedfor example further below with reference to FIGS. 4 to 12, NSA's (U.S.National Security Agency) Commercial Solution for Classified (CSfC) andCSE's (Canadian Communication Security Establishment) Medium Assurancesecurity standards.

As noted above, in some embodiments, the integrated (intelligent) switch101 embeds a multi-zone or level hardware security module (HSM), i.e. ahardware and in some cases a single-chip HSM and intelligent switchimplementation, operable to concurrently service one or more of theappliance's applications and/or functions, which would otherwise requireaccess to an external HSM, thereby reducing overall system security andincreasing tampering risks. Again, the multi-level HSM may equally applyto the provision of cryptographic services to hardware segregatedresources in a same or distinct network security zone depending on theintegral or distributive nature of the contemplated system at hand.

In some embodiments, the HSM invokes one or more of the switch'shardware ports, which can be configured or reconfigurable to receiveinput cryptographic data (e.g. public data, public key, etc.) thereon toexecute a designated cryptographic process within the HSM in servicing aparticular computational process, application or function, i.e. aparticular engine 140 or transit between engines 140. In general,received input data will be port-specific in that only inputcryptographic data specific to the port on which it is received can besuccessfully processed. To do so, each hardware port will generally havedefined in association therewith a corresponding hardware link orchannel (e.g. static and/or reconfigurable hardware link, channel and/orswitch) to a segregated hardware storage space or medium that storessecured port-specific cryptographic data thereon exclusively retrievablefor processing as a function of received input data specific to thathardware port. For example, distinct embedded storage spaces orresources may be provided with respective hardware data links to theircorresponding port, as can distinct storage partitions and/or zones bedefined within a same embedded memory storage resource and accessed viadedicated hardware logic or the like. Namely, distinct embedded storagespaces or resources may encompass a physically segregated, separatedand/or defined hardware storage space on one or more hardware storagedevices (i.e. memory board, chip, component, etc.) that is physicallypaired, allocated and/or associated with a given port-specificcryptographic and/or application process. For example, each storagespace may be designated or adapted to store one or more cryptographickeys and/or like cryptographic data usable in invoking and/or executinga given port-specific process, as can other application/process-specificdata be securely stored to implement functions for a particular level ofthe multi-level appliance. Accordingly, in some embodiments, a dedicatedmemory space may define a secure key space for a given cryptographicprocess and/or encompass storage capacity for other types ofcryptographic and/or other related data. An integrated cryptographic orrelated engine, executed by an embedded or hardware-linked processor,can then be invoked to internally process the retrieved securedcryptographic data, for instance in conjunction with the input data, toproduce an intended computation result.

Accordingly, the entire process can be relegated to the hardware spacewithout invoking a software or application layer and thus, withoutopening the HSM to tampering opportunities that may otherwise presentthemselves in conventional HSMs, such as traditional network-attachedHSMs. Conversely, the HSM embodiments described herein allow for a full,and in some embodiments a single-chip (i.e. static or reconfigurable(e.g. FPGA)) hardware solution that can be used to concurrently servicemultiple applications and/or processes from within a sametamper-resistant environment by virtue of the intelligent switchintegration. Accordingly, the solutions provided herein may allow for asignificant increase in security protocol ratings while alsosignificantly reducing, in some embodiments, a hardware footprintrequired to implement complex network security architectures that, inmost cases, would require the co-location of multiple distinctlyexecuted HSMs internetworked with various external devices in a complexcabled architecture.

Furthermore, in some embodiments, the HSM may allow for software,firmware and/or FPGA updates through a secured validation process. Thisvalidation process may, in some embodiments, only accept validatedinputs by means of one or more corresponding hardware port through a“chain of trust” process via digital signatures using quantum safealgorithms, such as hash-based signature algorithms.

In accordance with different illustrative embodiments, differentnon-limiting examples of single-chip hardware solutions may beconsidered. In some embodiments, a Xilinx's System on Chip (SoC) orMulti-Processor SoC (MPSoC) product may be used, such as Zynq® and Zynq®UltraScale+™ respectively. The Zynq® product line is known to contain 2ARM processors, memory components and Field Programmable Gate Array(FPGA) while the Zynq® UltraScale+™ has 6 ARM processors, memorycomponents and FPGA. In a first exemplary embodiment, the Zynq® devicemay be used wherein one of the two ARM processors implements anintegrated processing engine 140, a second ARM processor handles allmemory accesses and the FPGA implements the trusted communication matrix114 between external communication ports and internal memory andprocessing engine capability. In a second exemplary embodiment, theZynq® UltraScale+™ is used wherein 5 of the 6 ARM processors are used asindependent processing engines while the sixth processor is used forhandling all memory accesses and the FPGA implements the trustedcommunication matrix 114 between the external communication ports,internal memory and integrated engine capability. In a third exemplaryembodiment, the Zynq® UltraScale+™ is used where all of the 6 ARMprocessors are utilized as independent integrated processing enginesmanaging their own memory space and the FPGA implements the trustedcommunication matrix 114 between the external communication ports,internal memory and cryptographic engine capability. Other known andfuture technologies, hardware configurations and products may also beconsidered, as will be readily apparent to the skilled artisan, withoutdeparting from the general scope and nature of the present disclosure.Further illustrative details, examples, advantages and features will bedescribed below with reference to exemplary embodiments.

With reference to FIG. 2, and in accordance with one exemplaryembodiment that follows from the above description, a hardware securitymodule (HSM) supported intelligent switch, generally referred to usingthe numeral 201, will now be described. In the illustrated embodiment,the HSM-supported switch 201 generally comprises a plurality of hardwareports 202, at least some of which being operatively linked throughhardware, e.g. direct hardware link or switch channel logic 208, to acorresponding port-specific hardware storage resource and key space 204(e.g. distinct embedded memory storage device, hardware memory storagepartition and/or zone). Each port-specific hardware storage resource andkey space 204 can be configured to store secured port-specificcryptographic data (e.g. private encryption/decryption key 212) that isonly retrievable upon input of corresponding input cryptographic datafrom a corresponding port. In other words, secured data may be furthersecured by virtue of hardware port specificity, whereby input datareceived on an incorrect hardware port will fail to access correspondingsecured data linked to this incorrect port, and also fail to accesssecured data linked with any other port. Upon successful input ofexternal data via an appropriate hardware port 202, correspondingsecured data (e.g. key 212) can be internally retrieved and processed byan integrated engine (i.e. cryptographic engine 210) to deliver adesired outcome.

To further enhance anti-tampering measures, in some embodiments, theHSM-supported switch 201 may be enclosed (e.g. along with otherappliance components) within a tamper-resistant box, container or shell206.

As noted above, the provision of hardware-linked HSM ports andsegregated storage resources enhances overall system integrity andresilience to external tampering, while also providing the added benefitof HSM multiplicity within a common multi-level network appliance andtamper-proof or resistant shell. In fact, certain embodiments mayefficiently multiply HSM resource allocations within a single chipimplementation, e.g. with embedded memory(ies), processor(s) andhardware logic, while leveraging both the added security of distinctlysegregated hardware-linked storage resource interfaces and the option toshare internal hardware resources, such as a common integratedcryptographic engine 210 that may be invoked to concurrently or at leastsequentially process secured data from multiple isolated port-specifichardware storage resources and key spaces 204. As will be described infurther detail below, this integrated hardware implementation mayfurther benefit the deployment of integrated secure systemarchitectures, such as multi-level security system architectures and thelike, all within the confines of a single hardware casing or shell, ifnot integrated onto a singular circuit board in some embodiments.

As noted above, the embedded HSM-supported switch 201 combines thebenefits of an integrated HSM with that of the intelligent switchconfiguration. Accordingly, in some embodiments, at least some of thehardware ports 202 can be linked through hardware to interface withdistinct storage resources 204 and/or ports 202, processes/dataassociated therewith, and/or link distinct appliance processing enginesas described above, thereby defining a trusted communication matrix 214that can be leveraged in more complex system implementations to benefitfrom the secured co-location of distinct resources on a same hardwareimplementation (e.g. same hardware chip) without exposing the device toexternal or software-related tampering risks. In other words,port-specificity can be maintained to govern access to secured data inexecuting selected cryptographic processes, and further enhanced byleveraging predefined hardware interconnections (i.e. data channels)between port-specific resources and/or data allocations.

The trusted communication matrix 214 can be implemented as a set ofstatic hardware relays and/or logic, and/or dynamically implemented viareconfigurable hardware logic and/or relays. Accordingly, certainport-specific HSM processes invoked by input data received via aparticular port interface may be configured to depend from upstreamcryptographic and/or network system processes executed in respect ofcryptographic data received on another hardware port and used toretrieve distinctly stored and maintained private data. Naturally,certain cryptographic processes may equally feed downstream processesexecuted in respect of a distinct port-specific data resource. Given thehardware implementation of the matrix 214, system security logic andcomplex data channeling can be hardwired into the HSM-supported switch201 and thus minimize external exposure to tampering. Given the above,it will be appreciated that while some ports 202 may be associated withcorresponding storage resources 204 in a one-to-one fashion, other portinterconnection scenarios may be invoked to logically associate a sameport with distinct storage resources, as can distinct storage resourcesmay be logically associated with a same hardware port. Likewise,additional hardware port interfaces may be defined to execute certainchannel interconnection configurations without necessarily forming adirect link with any particular storage resource 204, for examplelinking through to other appliance processing engines and/or resources.

Furthermore, in some embodiments, the HSM may allow for software,firmware and/or FPGA updates through a secured validation process. Thisvalidation process may, in some embodiments, only accept validatedinputs by means of one or more corresponding hardware port through a“chain of trust” process via digital signatures using quantum safealgorithms, such as hash-based signature algorithms.

In accordance with one exemplary embodiment and similar to thesingle-chip hardware embodiments discussed in FIG. 1, the presentlydescribed embodiments may be implemented using a Xilinx's SoC or MPSoCsuch as the Zynq® product line wherein one of the two ARM processorsimplement the cryptographic engine 210, a second ARM processor handlesall memory accesses and the FPGA implements the trusted communicationmatrix 214 between ports 202 and internal memory and cryptographicengine 210. Other known and future technologies, hardware configurationsand products may also be considered, as will be readily apparent to theskilled artisan, without departing from the general scope and nature ofthe present disclosure.

With reference to FIG. 3A, and in accordance with yet anotherembodiment, an HSM-supported switch 301, much as described above withreference to FIG. 2, will now be described. In this embodiment, theHSM-supported switch 301 again generally comprises a plurality ofhardware ports 302 each operatively linked through a direct hardwarelink or switch channel logic 308 to a corresponding port-specifichardware storage resource and key space 304, in which securedport-specific cryptographic data 312 can be stored and securelyretrieved to execute one or more cryptographic processes via anintegrated engine 310.

As with the embodiment of FIG. 2, at least some of the hardware ports302 can be linked through a direct hardware link or switch channel logic308 to interface with distinct storage resources 304 and/or ports 302,processes/data associated therewith, and/or accessible applianceprocessing engines and/or resources, thereby again defining a trustedcommunication matrix 314. The matrix 314 can again be implemented as aset of static hardware relays and/or logic, and/or dynamicallyimplemented via reconfigurable hardware logic and/or relays.

In this embodiment, however, the matrix 314 may further invoke certainembedded channel resources 316 so to further enhance interconnectionlogic between ports and port-related processes, and thus allow forembedded security logic integration within the HSM's integrated hardwarearchitecture. These channel resources 316 may be integrated and invokedin a one-to-one fashion, for instance, with integrated port specificityin fully maximizing secure process isolation, or again provided as ashared resource that may be invoked and implemented for differentport-specific processes albeit without exposing any such processes toundue external tampering risks.

In the illustrated embodiment, different channel resources areschematically illustrated to include any one or more of a data channeldiode 318 (i.e. to restrict data flows on a defined channel to adesignated direction), data channel filter 320 (i.e. to filter channeldata, for example, to limit throughput data to a particular subset ofretrieved data, or again to systematically reconfigure or replacedesignated data elements on a given channel data path), a channelcomparator 322 (i.e. to invoke channel logic between channels based on acomparison of data being channeled thereon, for example, allowingprocess throughput only upon matching channel data), an inlineencryption function 324 (e.g. to execute inline IPSEC or TLS protocol,for example, and/or to implement an inline VPN or like communicationtunnel), or sniffer function (325).

For example, in some embodiments, an inline encryption function may beinvoked to facilitate certain encrypted exchange with an end or internalclient, process or application, that do not necessarily require accessto the cryptographic engine and related higher security protocols. Forinstance, while critical private key management processes (e.g. controlplane processes such as user/client authentication/authorization,authenticated session initiation and configuration, private keygeneration and management, system management functions, etc.) may bestrictly relegated to the cryptographic engine and defined secure keyspaces, less critical processes (e.g. communication plane processes,such as authenticated data access transactions, updates, edits, etc.,)for instance executed on the basis of a symmetric and/or ephemeral (e.g.session) key used to expedite processing and communications, may beimplemented via the inline channel encryption resource 324. In so doing,the HSM-supported switch 301 may integrally combine enhanced controlplane cryptographic services, as described above, with inlinecryptographic services, all within a same hardware design andconfiguration. This may, for example, readily allow for a singularhardware design, as described herein, to replace an otherwise commonnetwork (e.g. banking) architecture in which control plane functions andprocesses are traditionally relegated to a distinct network interfacingHSM, while session-based cryptographic functions are subsequentlychanneled through downstream network servers. The integratedconfiguration discussed herein may further, or alternatively, allow forthe integrated execution of a virtual private network (VPN) or evennested VPNs to achieve a layered architecture within a single hardwaredesign rather than to invoke a distributed network architecture in whichsecurity protocols are otherwise run on a higher network (e.g. TCP/IP)layer, and thus, more vulnerable to physical or external tampering.

As noted above, a sniffer or like function may also, or alternatively bedeployed as an integrated and/or customizable channel resource, forinstance, to provide a silent non-bypassable logging or network/channeltapping function to gain visibility on network channel communications.For instance, such channel resources may be non-obstructively used tomonitor channel communications and raise a flag or alert uponidentifying suspicious or anomalous channel activity, if not shuttingdown outright communications on this channel until remedial action canbe taken.

In this particular embodiment, the HSM-supported switch 301 is furtherprovided with optional external sensor monitors 326, for example, whichmay take the form of various sensors and/or monitors used to detect andreport on system breaches or tampering. For example, sensors mayinclude, but are not limited to, integrated sound sensors that maydetect shell impacts or breaks; inclinometers or 3D accelerometers todetect displacement or physical reorientation of the shell; smoke, heatand/or water sensors to detect environmental issues and/or tampering(e.g. multiple temperature sensors can be used to detect tampering viadifferential internal temperature metering); proximity or motion sensorsto detect presence of unauthorized personnel; location or geofencingsensors to detect unauthorized transport of the HSM-supported switch,and overall appliance in general, beyond a designed security zone; andother such sensors as may be appreciated by the skilled artisan. Asnoted above, data outputs from these sensors may also partake in certaintrusted internal processes, for example, as random seed values fordownstream cryptographic or random value generation processes.

The HSM-supported switch 301 may further include an administrator port328, such as a local (e.g. external appliance-based) USB port ordedicated network port interface to allow for secured administrativeaccess to the switch 301 and allow for system maintenance andreconfiguration as may be required or desired from time to time. Forexample, where the switch 301 is implemented as a reconfigurable chip(e.g. FPGA), certain hardware resources and/or logic may be re-allocatedor reconfigured to address system or security protocol changes orimprovements. For example, the trusted communication matrix 314 may beadjusted to reflect new port allocations or leverage new or existingchannel resources to further enhance security protocols, introduce newsecurity levels or system integrations, or again refine existingprotocols with improved processes and functions.

Again, in some embodiments, the HSM-supported switch 301 may allow forsoftware, firmware and/or FPGA updates through a secured validationprocess. This validation process may, in some embodiments, only acceptvalidated inputs by means of one or more corresponding hardware port(i.e. administrator port 328) through a “chain of trust” process viadigital signatures using quantum safe algorithms, such as hash-basedsignature algorithms.

As illustratively described above with reference to FIGS. 2 and 3A, insome embodiments, the HSM-supported switch (201, 301) may be configuredto share a common cryptographic engine (210, 310), that is an embeddedresource executing one or more cryptographic processes predefined infirmware and secured within the confines of the HSM's hardwarearchitecture. Accordingly, respective secured cryptographic data (e.g.private key data or key space) can be respectively accessed and used bythe common cryptographic engine from respective port-specific storagespaces (204, 304) to render secure HSM functions to respectiveport-specific masters (e.g. users, clients, processes, applications,etc.)

In such embodiments, similarly to some embodiments discussed withrespect to FIGS. 1 and 2, a single-chip implementation may use a Zynq®device described above wherein one of the two ARM processors implementsthe common cryptographic engine 310, a second ARM processor handles allmemory accesses and the FPGA implements the trusted communication matrix314 between external communication ports 302 and internal memory andcryptographic engine 310.

With reference to FIG. 3B, an alternative HSM-supported switchconfiguration 301′ is rather designed to define a respectivecryptographic engine 310′ for each of the secured port-specific hardwarestorage resource and keys paces 304′. By replicating cryptographicresources, further hardware isolation (e.g. distinct firmware resourcesand/or firmware executed on distinct embedded processor cores) can beachieved in thus further enhancing the HSM function's tamper resistance.In this exemplary embodiment, a possible single-chip hardwareimplementation may consist of using the Zynq® UltraScale+™ chip wherein5 of the 6 ARM processors are used as independent cryptographic engines310′ while the sixth processor is used for handling all memory accessesand the FPGA implements the trusted communication matrix 314 between thecommunication ports 302, internal memory and cryptographic engines 310′.

In yet another embodiment illustrated in FIG. 3C, an alternativeHSM-supported switch configuration 301″ again replicates cryptographicresources 310″ for each of the defined port specific hardware storageresources and key spaces 304″, but in this case, embeds these resourceswithin the hardware design so to be invoked before access is granted tothe respective port-specific key spaces. This may be particularly usefulin a context where, for example, storage resources used to define therespective key spaces are provided external to an otherwise embedded HSMchip. In other words, HSM resources may leverage an external storageresource such as a co-located or integrated flash drive or hard drive tostore private key or other secured cryptographic data for exclusiveaccess via embedded port-specific cryptographic engines. The person ofordinary skill in the art will appreciate that other configurations mayalso be considered without departing from the general scope and natureof the present disclosure. A possible exemplary implementation mayconsist of using, as discussed above, a Zynq® UltraScale+™ chip butwherein all of the 6 ARM processors are used as independentcryptographic engines 310″ managing their own port-specific hardwarestorage resource and key space 304″ and the FPGA implements the trustedcommunication matrix 314 between the communication ports 302, internalmemory and cryptographic engine 310. Other known and futuretechnologies, hardware configurations and products may also beconsidered, as will be readily apparent to the skilled artisan, withoutdeparting from the general scope and nature of the present disclosure.

As noted above, using different aspects of the above-describedembodiments, complex system architectures may be deployed on a singlechip, or again on a same integrated board design, i.e. where an embeddedmulti-port HSM-supported switch can be integrated with other systemhardware on a same or interconnected circuit boards to deliver a complex(e.g. multi-purpose, multi-level, multi-tiered, multi-user, multi-zone,etc.) network service and system as a whole, all in some embodiments,within a same tamper-resistant shell.

With reference to FIG. 4, and in accordance with one embodiment, anintegrated security processing system 400 will now be described, inwhich a hardware-implemented HSM-supported switch 401, much as describedabove with reference to

FIGS. 3A to 3C, is illustratively integrated to act as a multi-functionHSM within the integrated system architecture of system 400. In thisparticular embodiment, the HSM-supported switch 401 illustrativelycomprises a plurality of hardware ports 402 each operatively linkedthrough hardware to a corresponding port-specific hardware storageresource and key space 404, in which secured port-specific cryptographicdata 412 can be stored and securely retrieved to execute one or morecryptographic processes via an integrated engine 410. Again, hardwareports 402 can be linked through hardware to interface with distinctstorage resources 404 and/or ports 402, and/or processes/data associatedtherewith, to define a trusted communication matrix 414. The trustedcommunication matrix 414 can again be implemented as a set of statichardware relays and logic, and/or dynamically implemented viareconfigurable hardware logic or relays. Embedded channel resources 416are also optionally provided to further enhance interconnection logicbetween ports and port-related processes.

Integrated with the HSM-supported switch 401 are provided distinctprocessing resources 420 that may be configured to execute varioussystem processes that rely, at least in part, on the cryptographicoutputs of the HSM-supported switch 401, and/or contribute inputs to theHSM-supported switch 401 to be processed in respect of one or moredownstream processes. Generally, these processing resources 420 willinclude one or more processing engines and storage media encodingvarious machine executable tasks and instructions to be processedthereby, for example, via one or more accessible processors or the like.Accordingly, a secure data path may be internally routed from oneprocessing engine 440 to the other via the integrated HSM-supportedswitch 401, in some embodiments, either internally hardwired viainternal cabling or direct circuit board interconnections, so toeffectively execute multi-level or multi-function data security systemintegration within a wholly integrated system implementation.

Furthermore, given the integrated infrastructure of system 400,additional elements may be collocated or integrated with theabove-described components to further enhance or extend processingresources and functionality. For example, a central storage device 442may be included to provide additional secure/internal storage usable inthe various processes invoked and implemented by the system 400.

Internal or external system sensors 426 may also be deployed, much asdescribed above with reference to integrated sensor monitors 326 of FIG.3, so to effectively monitor for, and detect, any one or more ofexternal/internal shell tampering; unusual/unexpected systemdisplacements, movements, or vibrations; environmental disbursementssuch as water, fire, heat or smoke; uncharacteristically high systemusages and/or unusual usage patterns; etc.

The system 400 may further include and benefit from a resident highprecision timing device 444, for instance, in supporting processes wherehigh precision timing may be useful if not critical.

Using the above-noted approach, systems that would otherwise require astack of interconnected devices using a set of networking cables andsoftware-defined network port allocations (and generally at bestsatisfying commercial software or hybrid security standards such as FIPS140-2), can now be implemented within a single integrated hardwarearchitecture, that is within a single tamper-resistant shell andoptionally, within a single integrated circuit board architecture,reaching security medium assurance (Communication SecurityEstablishment—CSE Canada) security standards or CSfC (CommercialSolutions for Classified—U.S. National Security Agency) standards, andbeyond.

Similarly to the previously described exemplary embodiments, theHSM-supported switch 401 may also allow for software, firmware and/orFPGA updates through a secured validation process wherein, in someembodiments, validated inputs may be accepted by means of hardware ports402 (or other ports) only through a “chain of trust” process via digitalsignatures using quantum safe algorithms, such as hash-based signaturealgorithms.

With reference to FIG. 5, a network security zoning architecture isshown (i.e. for an ITSG-38 Compliant Application—see InformationTechnology Security Guidelineshttps://www.cse-cst.gc.ca/en/publication/itsg-38) in which a networkpath is progressively routed through various security zones. Forexample, a user can establish a communication link within a public zone(PZ, i.e. Internet) with a relying party, which then seeks to establisha link to a public access zone (PAZ) that is deployed behind an externalfirewall (FW_(EXT)) and serviced by a first network attached HSM andproxy server to establish Transport Layer Security (TLS) SecureTunneling with the relying party. A connection is then extended to arestricted zone (RZ) that is itself deployed behind a middle firewall(FW_(MID)) and serviced by its own network attached HSM to link into anApp Server to initiate a Security Assertion Markup Language (SAML)Request validation and TLS Setup with a downstream database server (DB)deployed within a highly-restricted zone (HRZ). The DB server deployedwithin the HRZ is once again deployed behind its own internal firewall(FW_(INT)) and serviced by its own network attached HSM to provide TLStermination and SAML Signature. Generally, using conventional networksecurity zoning equipment, each firewall, HSM, the proxy server, the Appserver and the database server will constitute a distinct device stackedwithin a hardware stack and interconnected via a set of network cables,at best reaching a FIPS 140-2 security standard rating.

As illustrated in FIG. 6, in accordance with one embodiment, the networksecurity zoning architecture described above with reference to FIG. 5can, in some embodiments, be readily deployed using the integratedsystem hardware assembly generically described above with reference toFIG. 4. For instance, each integrated processing engine 440 may beconfigured to implement a different system firewall or server such thata low security network link 450 can be channeled into the integrateddevice 400 via a first external firewall 452 before invoking theintegrated HSM resources of HSM-supported switch 401 via a firsthardware port thereof to invoke a first level security processtherewith. Once successfully authenticated, transaction data can beexchanged with a first processing engine 454 (e.g. proxy server of FIG.5), which can feed back into the HSM-supported switch 401 via distincthardware ports to traverse a second firewall 456 and ultimately invoke asecond level security process in order to access a second processingengine 458 (e.g. App Server of FIG. 5). The HSM-supported switch 401 isagain leveraged to invoke a third level security process in order toaccess a third process engine 460 (e.g. database server of FIG. 5).Conversely, a trusted high security link 462 can provide a more directaccess to a high security zone via distinct HSM-supported hardwareports.

As demonstrated above, the integrated security processing system(appliance) 400 of FIGS. 4 and 6 can effectively improve securityprotocol ratings for a given system architecture while drasticallyreducing a required hardware rack footprint and associated hostmaintenance and security requirements. Namely, by integrating asignificant portion if not the entire security processing system withina same tamper-resistant shell, optionally with associatedtemper-monitoring sensors and/or devices, and further optionally withina same circuit board architecture, significant improvements in wholesystem security, reliance and maintenance can be realized. For example,noted improvements, features and/or advantages may include, but are notlimited to, enhanced application security, out-of-the-box managedsecurity service provider support, multi-tenant ready, higher than FIPSassurance, true hardware-based process isolation, trusted bootapplications, secured field updates, quantum resistant cryptography,physical and operation security, to name a few.

Furthermore, given the integrated architecture of the securityprocessing system described above, and in particular, the securedintegrated network security zoning architecture, a multi-tieradministrative access protocol may be deployed to provide selectiveremote or external administrative access to distinct zone resourcesand/or the HSM-supported switch and its embedded resources based onrespective administrative access authorization profiles. Namely, theintegrated nature of the herein-described embodiments may enable suchdistributed access authorization profiles to be formed and leveraged viaa common administrative access interface and/or port, thereby avoidingthe otherwise commonly required local administrative access to distinctnetwork resources or again the provision of distinct administrativeinterfaces commonly available for each network resource and device inconventional physically isolated network stacks. For instance, oneparticular administrative access profile may provide authenticatedaccess to certain network-user-related resources, whereas another mayrather or additionally provide authenticated access to an applicationserver and related resources, and whereas yet another may providerestricted access to administrative functions of the HSM-supportedswitch, for instance, to implement system security updates(cryptographic engine update, HSM access protocol improvements, etc.),reconfigure and/or update respective data channel paths and/orresources, etc. It will be appreciated that certain authenticatedadministrative access profiles may allocate access privileges to one ormore zones and/or system resources, while restricting other zones and/orresources to other profiles.

While the above provides one exemplary implementation of an integratedmulti-level security processing appliance, various alternativeintegrated system applications can be designed to leverage the features,functions and advantages of the above-described embodiments. Forexample, this integrated appliance may also be envisioned as a part orto include a Universal Cybersecurity Platform (UCSP), wherein saidplatform integrates a variety of cybersecurity measures. Such a platformmay comprise a single or multiple software tools/packages that allow tointegrate multiple cybersecurity features such as key management, accessto cryptographic algorithms, including quantum-safe cryptographicalgorithms, zoning applications, patch management, secure boot, etc.

With this in mind, the integrated device itself may be configured toprovide a security processing appliance or platform that deliversfunctionality such as, but not limited to, entropy as a servicefunctionality, smart data diode functionality, trusted data guardfunctionality, protocol adapters, redundant sanitizing functions,trusted comparators, filter validation functions, dual layer VPNs, orthe like. Examples of such implementations will be provided below, in anon-restrictive manner.

With reference to FIG. 7, and in accordance with one embodiment, acombined Entropy as a Service (EaaS) and Time Service system 700 willnow be described, in which a full EaaS and Time service system isimplemented within a single integrated security processing appliance(SPA), platform or like device. In general, the security ofcryptographic applications depends strongly on the secrecy of thecryptographic keys. These must be very difficult to guess and thestrength of a given key is strongly dependent on a measure of randomnesscalled the Shannon entropy, or just entropy in the present context.Usually, sources of true randomness can be provided by low-level,statistically random noise signals, such as thermal noise and otherstochastic or quantum phenomena. The higher the entropy available to acomputing system, the more random and secure the generated keys will be.Standard computer systems, especially IoT devices, have difficultyproducing good randomness. Using a EaaS system, these networked systemsand devices can request high-entropy random data and fresh timestampsfrom the EaaS & Time Service server to increase the strength of locallygenerated encryption keys on boot. Currently such a service would beprovided over the Internet, which provides for security issues.Conversely, the illustrative embodiment of FIG. 7 provides the advantageof a fully integrated EaaS & Time service system implemented within asingle SPA while also offering port-specific security features similarto those discussed in the previous embodiments.

As illustrated, system 700 comprises an integrated EaaS and time serviceengine 702, to which external port-specific connections are first madethrough integrated external firewall (FW_(EXT)) engine 738. The serviceengine 702 is further operatively linked through hardware to acorresponding port-specific hardware storage resource and key space 704by means of a trusted communication matrix 714, in which securedport-specific cryptographic data can be stored and retrieved to executeone or more cryptographic processes via an integrated cryptographicengine 710, for example. Accordingly, the integrated service engine 702can send back port-specific timestamps and entropy data to externalsystems and devices connected to the SPA 700.

In the illustrated embodiment, a high precision timestamps (e.g. fullycompatible with the NTP and PTP formats) are provided by an operativelylinked resident high precision timing device 744, such as an on-boardatomic clock or similar. Meanwhile, entropy data is provided by anintegrated port-specific EaaS server engine 706, deployed behind anintegrated middle firewall (FW_(MID)) engine 740. The EaaS server engineis itself operatively linked to a secured (distinct) hardware storageresource 704 and integrated cryptographic engine 710 by means of trustedcommunication matrix 714.

In this example, the integrated EaaS server engine 706 is operativelylinked to an entropy source 720, comprising one or more noise sources766 which provide the non-deterministic, entropy-providing activities.The one or more noise sources may illustratively comprise, but are notlimited to, a quantum random number generator device (QRNG), randomthermal noise measured from ring oscillators or diodes or similar, orlike sources known in the art. As each individual noise source may becontaminated by a small amount of bias, the entropy collected from eachsource can be combined and processed by a given cryptographic engine 711(i.e. applying conditioning functions such as those described in theNIST SP800-90 family of documents) to create higher quality entropydata. The cryptographic engine 711 securely feeds the entropy data backvia a data channel diode to the integrated EaaS server engine 706.

To assess the quality of the entropy produced by the noise source, thedata is also continuously transmitted via another data diode 718 to anintegrated health monitoring processing engine 726 that does healthmonitoring of the noise source using a series of statistical tests, suchas the NIST SP 800-90B tests, for example. In the case where the entropydata fails one of these tests, the integrated processing engine 726 cansend a failure signal back to the integrated EaaS server engine 706 toalert the system that the entropy data is compromised.

In the illustrated embodiment, in order to implement thehealth-monitoring function, an intervening channel resource comparator722 is interposed between health monitoring engine and noise sourceoutputs. For example, where the health monitoring engine outputs thesame noise value it received as input, the comparator will allow thesignal to go through to the EaaS server engine 706, otherwise, thecomparator error output will flag the EaaS server engine 706 as to theinadequate EaaS value(s).

As will be appreciated by the skilled artisan, the illustratedembodiment is compatible with open source EaaS programs such as Pollenand Pollinate used to transmit and fetch entropy data. As in previouslydescribed embodiments, the integrated system described herein iscontrolled via a unified configuration and management interface. Thisinterface can also be used to efficiently manage both the centraldeployment of software patches and security updates.

FIG. 8 provides a schematic representation a Smart Data Diode (SDD) 800,in accordance with another exemplary embodiment. The SDD, asillustrated, can efficiently and securely isolate network trafficoriginating from outside a trusted network (the egress) from networktraffic originating from inside the trusted network (the ingress). Incontrast to the usual implementation of a data diode system, whichprovides a single unidirectional barrier between networks, the presentembodiment integrates two physically separated unidirectional barrierswithin a single security processing appliance (SPA). As designed, thesmart data diode can process both the Egress and Ingress traffic whileisolating each of them behind separate data diodes.

As shown in FIG. 8, a low side (untrusted network) connection first goesthrough a low side firewall (FW_(LO)) 804 to an integrated Low SideProtocol Server (LSPS) 806 while a High Side (trusted network)connection goes through a High Side Firewall (FW_(HI)) 830 to anintegrated High Side Protocol Server (HSPS) 828. Each connection to andfrom the integrated Protocol Servers 806 and 828 are made via a trustedcommunication matrix 814, as described above. The matrix can again beimplemented as a set of static hardware relays and/or logic, and/ordynamically implemented via reconfigurable hardware logic and/or relays.It will be appreciated that while the matrix 814 is illustrativelyreplicated throughout the SPA schematic, a same central or hub matrix814 may be commonly implemented to effectively interconnect theillustrated components in hardware, as described above.

In the illustrated embodiment, communication between the HSPS and theLSPS are physically separated between the Ingress and Egress. Eachprocess transits via an integrated processor (Egress Processor 826 andIngress Processor 824) coupled on both sides by a data diode. Thisensures that the processing of the ingress traffic is restricted to LowSide to High Side communication (via diodes 820 and 822) while theegress traffic is restricted from the High Side to Low Sidecommunication (via diodes 816 and 818). These integrated componentsguarantee a physical separation in hardware of the Egress and Ingresstraffic processing, all within the context of an integrated SPA. Thisintegration can also enable the use of a unified configuration andmanagement interface, which can in part be used to efficiently manageboth the central deployment of software patches and security updates.

FIGS. 9 to 11 schematically illustrate an exemplary embodiment of aTrusted Data Guard system executable within the context of a single SPA,as defined above. For example, as shown in FIG. 9, a Trusted Guardphysically separates an Egress traffic flow from an Ingress trafficflow, and for each implements a series of inline validation andsanitizing functions. The following description applies both for theIngress traffic (going from the Low side to the High side) and theEgress traffic (going from the High side to the Low side).

The data is first processed by a Protocol Adapter (PA) which extractsinformation objects from the transmission protocols. These informationobjects can consist of a fixed format data object such as Military VMF(Variable Message Format), US MTF (US Military Text Format), JSON, XML,OTH Gold (Over The Horizon) or similar. The PA also implements differentcommunication protocols such as SFTP, HTTP/HTTPS, Raw UPD/TCP, serialprotocols or similar. After extracting the necessary data, the PA sendsthe data to two independent implementations of a Sanitizing Function.These functions implement a sanitizing algorithm, which removesmalicious data from the input. The implementation of each function isindependent, which means that they can be written in differentprogramming languages (such as SWIFT, .Net C#, Java or similar), usedifferent component libraries (such as Daffodil, Xerces, SAXON, libXML,Xalan, libXSLT or similar) or even be executed on different operatingsystems (such as Linux, SELinux, OpenBSD, Windows or similar).

The two independent implementations must arrive at the exact sameresult. To do this, both Sanitizing Functions send their output to aTrusted Comparator Function (TCF), which compares the two streams ofdata. The streams may be of any length and if any portion of the streamsfails to compare, the TCF completely discards the data. If both datastreams are exactly the same, the TCF sends the data to a FilterValidation Function (FVF), which executes the final verification of theinformation objects format and re-format the objects into an appropriatenative format. The treated data objects are finally sent to an outgoingProtocol Adapter, which again translates the information objects intothe right transmission protocol before forwarding it.

FIG. 10 shows in more detail the components of the Redundant SanitizingFunction (RSF) and the Filter Validation Function (FVF). In the case ofthe RSF, the information object is first processed by a DFDL (DataFormat Description Language) parser to generate a XML, formatted dataobject, which is read by a first validator function (Validator #1) todetermine if the data is in proper form. The validated data object isthen processed by a sanitizing function (Sanitizer) to remove maliciousdata and processed again by another validation function (Validator #2).Finally, the data object is sent to the Comparator Protocol Adapter(CPA) which finally transfers it to the TCF function. In the case of theFilter Validation Function (FVF), the data object is first received fromthe TCF function via a CPA, which forwards it to a validation function(Validator #2) before sending it to the DFDL Parser function.

FIG. 11 shows one possible implementation of the system described inFIGS. 9 and 10 within the context of a SPA. The integrated embodiment ofFIG. 11 comprises an integrated (intelligent) switch (NGX) 1114,schematically shown here to encompass various channel resources as notedabove, to interface between various integrated SPA components. As withprevious embodiments, it will be appreciated that a same interconnectinghardware switch 1114 may be implemented within this design to implementthe various functions illustrated herein, as can distinct hardwareswitches be cooperatively designed.

For both Ingress and Egress data flows, the NGX unit implements the TCFin hardware as a channel data comparator (comparators 1106 and 1112 forEgress and Ingress respectively). The channel data comparator implementslogic between channels based on a comparison of data being channeledthereon, for example, allowing process throughput only upon matchingchannel data, thereby implementing the full functionality of thedescribed TCF. For both the Egress and Ingress traffic, the incomingdata objects from RSF #1 and RSF #2 are funneled through a data channeldiode to ensure that the data flow is restricted to data going from theRSF to the TCF. This is shown in FIG. 11 for the Egress as the dataobjects coming from RSF #1 is sent via data diode 1104 while the objectscoming from RSF #2 are funneled through data diode 1102, both connectedto the channel data comparator 1106. Similarly, for the Ingress traffic,the data objects from the RSFs is sent via data diodes 1110 and 1108 tochannel data comparator 1112. The NGX unit also implements, for bothEgress and Ingress, through the use of data diodes the functionalconnection between the PA and one of the two RSF. FIG. 11 shows that theEgress traffic passes through data diode 1116 when going form the PA tothe Egress RSF #1 and that the Ingress traffic goes through data diode1118 when moving from the PA to the Ingress RSF #1.

FIG. 12 provides another exemplary implementation of an integratedsecurity processing appliance as described herein, for theimplementation of a Dual Layer Virtual Private Network (VPN) 1202. Inthis example, two connected VPNs and associated firewalls are integratedinto a single hardware SPA. Network traffic from a local network isfirst routed through an internal firewall (FW_(INT)) 1220 to anintegrated processing resource linked to a third party or open sourceVPN referred here as the Inner VPN 1218.

This VPN is itself operatively linked to what is referred to as theOuter VPN, which consists of an inline channel encryption resource 1208.Each VPN (Outer and Inner) is operatively linked through hardware to acorresponding port-specific hardware storage resource and key space 1204by means of trusted communication matrix 1214 in which securedport-specific cryptographic data can be stored and retrieved to executeone or more cryptographic processes via an integrated cryptographicengine 1210. The Outer VPN is itself connected to the outside networkvia an external firewall (FW_(EXT)) 1206. Each connection to and fromeach VPN is routed through a trusted communication matrix 1214,implemented as a set of static hardware relays and/or logic, and/ordynamically implemented via reconfigurable hardware logic and/or relays.A unified configuration and management interface can again also be usedto efficiently manage both the central deployment of software patchesand security updates, for example.

With reference to FIGS. 13, and in accordance with one embodiment, anexample of a trusted auditing system executable within the context of asingle SPA, as defined above, will now be described. In this exemplaryembodiment, an incoming transaction event 1305 that must be audited isreceived by the HSM 1303 via a hardware port-specific channel andsecurely stored in an internal buffer 1309 or encrypted and sent off tobe buffered elsewhere in the system. Logging process 1313 proceeds toaudit the content of event 1305 and produces an externalcryptographically authenticated audit log message 1317 via a securelogger function 1319. Upon completion of the audit log entry 1317, event1305 will either be released from an internal buffer or the decryptionkey will be released to the system buffer 1309 to be processed by othersegments of the system via secure transfer control 1323. While thisexample is illustrated in isolation in FIG. 13, it can readily beapplied as an inline or addressable channel resource through designatedconfiguration of an associated interconnection matrix and/or applianceresources. For instance, a channel auditing function may be invoked andimplemented by one of the SPA's processing engines, or again wholly orin part relayed to an external resource via an appropriate hardware linkand/or data port. This may, in part, depend on the complexity of theauditing process (e.g. basic cryptographic data logging via onboardcryptographic resources vs. more elaborate data channel filtering,validation, authentication and/or related processes) and resourcesrequired therefor. Likewise, while a single channeling auditing processand/or resource may be implemented within a given appliance, multipledistinct hardware segregated auditing resources may also oralternatively be deployed depending on the application at hand.

With reference now to FIG. 14 and in accordance with one embodiment, ahigh-level schematic representation of a Cross-Domain Solution (CDS)enforcement point based on one or more SPAs configured in a CDS mode ofoperation (hereafter referred to as SPA-CDS) will now be described. Asshown in FIG. 14, a multiplicity of domains 1405 are each operationallyconnected to one of a corresponding multiplicity of SPA-CDS 1409. Itwill be appreciated that while a one-to-one architecture is illustratedherein to address multiple network security domains (zones), multiplezones may alternatively be wholly integrated within a single SPA (e.g.where greater processing density, resources, multiplicity and/or volumesare made available within a particular SPA embodiment), as can securityprocesses involved in the processing of a same domain (zone) be split ordistributed across multiple SPAs.

In the illustrated embodiment, each SPA-CDS is further operationallyconnected to one another via a secure interface to a cross-domainnetwork, illustratively referred to herein as “Elevator network” 1413.Elevator network 1413 is an interconnect point that allows the SPA-CDSdevices, each dedicated in this example to its own specificcorresponding security domain, to transfer encrypted data that can onlybe delivered to a specific destination security domain. In other words,network 1413 may act as an “elevator shaft” where domain-specific data,which is correspondingly encrypted for domain specificity, enters on aspecific floor (i.e. security domain) and can either be elevated orlowered to another specific destination floor and only successfullydecrypted (processed) thereon based on said domain specific encryption.

In some embodiments, each SPA-CDS may also interface to a third privatenetwork only visible to those SPA-CDS that are members of a givensecurity domain. This is illustrated in FIG. 15, where SPA-CDS 1505provides three separate network interfaces: the security domain 1509,the filtering function network 1511 and the elevator network 1513.Filtering function network 1511, in this example, is host to one or moreservers performing a variety of filtering processes. Each one of thefilter processes available for a given security domain is specificallydefined to perform the necessary information filtering required forinformation being transferred between specific security domains. Notethat a SPA-CDS only enforces the requirement that all data beingtransferred from one domain to another has to pass through a filteringstep, by ensuring the data must pass through the filtering process. Theskilled artisan will understand that the actual specifics of what thefiltering process does may be outside of the scope of SPA-CDS, as canother embodiments encompass internal filtering applications and/orengines as the case may be.

With reference to FIGS. 16A to 16C, different examples of a UniversalCyber Security Platform (UCSP) using the above-described SPA-CDS willnow be described. In the exemplary embodiment of FIG. 16A, each SPA-CDS1605 appliance comprises four independent processing engines (PE—hereinlabelled as WPE, SPE, EPE and NPE) interconnected using describedmultiport HSM 1609, as illustratively described above. In this example,upon a SPA-CDS 1605 being turned on, HSM 1609 boots itself from codethat is kept secure via active-tamper security mechanisms and a secureboot procedure. Once securely running, HSM 1609 proceeds to securelyboot each of the UCSP processing engines with specific applicationcapabilities. The UCSP then transitions to an operational state thatperforms the functionality it has been programmed to enforce. The UCSPaugments the HSM's active tamper security capabilities with additionalplatform-level tamper detection mechanisms to ensure that the entireappliance is fully tamper resistant.

In some embodiments, each of the PEs may be implemented using singleboard computers based on Intel™ server-class processors running asecurity-hardened operating system and related application code. Thespecific application performed by the various PEs may be defined by theoverall use-case enforced by the UCSP.

In some embodiments, the HSM combines the trusted communication matrixwith a quantum-ready component that provides generic cryptographicfunctions, which it enhances via a quantum-ready security frameworkbuilt using post-Quantum cryptographic algorithms for things such assecure firmware and configuration updates.

In some embodiments, the HSM's trusted communication matrix strictlyenforces communication flows and types between the PEs deployed in theUCSP. The types of communication flows may be bi-directional,uni-directional, filtered, encrypted, decrypted or similar. Furthermore,flows of communication between any two PE may also be completely blockedif the overall use case requires it.

With particular reference to FIG. 16A, the SPA-CDS 1605 provides a CrossDomain Security solution based on a UCSP that implements a specifictrusted communication matrix configuration and set of processing engine(PE) functions. As illustrated in FIG. 16A, information is firsttransferred from a source element in security domain 1611 to the SPA-CDSinterface attached to that security domain. Within the SPA-CDS, theinformation is received using Protocol Adaptor (PA) function 1613, whichis responsible to provide an appropriate protocol hand-off for theinformation. Protocol Adaptor 1613 runs on one of the multiple SPA-CDSprocessing engines (WPE in FIG. 16A). Once protocol adaptor 1613 hasextracted a complete or partial unit of information deemed sufficient tobe filtered and transferred to another domain, it pushes the unit ofinformation onto Data Orchestrator (DO) 1615, which resides on a secondindependent processing engine of the SPA-CDS (SPE in FIG. 16A). Thistransfer is performed via One-Way Channel (OWC) 1617 enforced by thetrusted communication matrix using, for example, a data diode orsimilar. Once a unit of information is received by Data Orchestrator1615, it is operable to determine the appropriate filter or set offilter function(s) that may need be applied to that specific type ofinformation. Data Orchestrator 1615 proceeds to orchestrate theappropriate filtering steps using one or more filtering systems deployedon network of filtering functions 1619. Data Orchestrator 1615 mayimplement said one or more filtering function based on a wide range ofcriteria. For example and without limitation, a filtering function maybe applied based on the content of the data being transferred; based onthe meta-data of the data being transferred (e.g.

headers or tags with information about the data); based on a time window(e.g. from an initial time and data to an end time and date); based onmetering of data transactions (e.g. apply filter only for the first 1000units of information received, for example). Accordingly, DataOrchestrator 1615, in some embodiments, may take the form of across-domain data validation engine, for example, operable to validateand thus approve (refuse) or seek approval for the data transaction toproceed to the next domain.

Upon having completed the necessary application of filters to thespecific unit of information, Data Orchestrator 1615 then obtains theapproval (or refusal) for furtherance of the given unit of informationonto another destination security domain. This transition requires thatData Orchestrator 1615 transfers the specific unit of information tocross-portal (Elevator) Access Portal (EAP) 1623. EAP 1623 resides on athird independent processing engine (EPE) and is operationally connectedto Elevator Network 1624. As before, the transfer between DataOrchestrator 1615 and EAP 1623 is performed via the trustedcommunication matrix. However, in this case, the trusted communicationmatrix enforces an encryption (ENC) transform 1625 that encrypts thespecific unit of information for a given destination security domainusing a specific cryptographic key assigned for that security domain.The encrypted data then gets delivered to EAP 1623 of the egresssecurity domain which transfers it to the ingress EAP 1623 of thedestination security domain. Upon receiving an encrypted unit ofinformation from a source security domain, the ingress EPA 1623 pushesthe encrypted unit of information to its local PA 1613. The transferbetween EAP 1623 and PA 1613 is enforced by the ingress SPA-CDS HSM'strusted communication matrix. In this case however, the trustedcommunication matrix enforces a decryption (DEC) transform 1627 on thedata. Upon receiving a decrypted unit of information from its local EAP1623, the ingress SPA-CDS's PA 1613 for the destination security domainre-assembles the various units of information into a completeinformation package and transfers it off to a destination customer usingthe appropriate communication protocol.

The SPA-CDS may also provide an Enterprise Administrative (EA) function1631 dedicated to the overall maintenance of the functions offered byeach of the deployed SPA-CDS devices and residing on a fourthindependent processing engine (NPE). One of these functions is thedistribution of appropriate keying material of each ENC 1625 and DEC1627 transforms specific to the corresponding security domain(s) of thedestination/source SPA-CDS devices, as illustrated in FIG. 16B. Forexample, if a SPA-CDS deployed as the CDS access point for securitydomain 1 is to only be allowed to transfer information to securitydomain 2 and security domain 3, then the ENC 1625 function of thatSPA-CDS would be pre-loaded with two specific transfer keys {K₁₋₂,K₁₋₃}. Similarly, if that same SPA-CDS is allowed to receive data fromsecurity domains {2, 3, 4}, then the DEC 1627 function would bepre-loaded with three specific transfer keys {K₂₋₁, K₃₋₁, K₄₋₁}.

The EA 1631 capability also provides an overarching maintenance functionfor all of the sub-components of the offered solution. In this way, whenPA 1613, DO 1615, EAP 1623, or even EA 1631 require software updates,these functions are orchestrated by EA 1631, as illustrated in FIG. 16C.During a maintenance update, all of the various network accesses aredisabled to allow the enterprise maintenance capability. This capabilitycan be further extended to provide the maintenance and enterprise levelmanagement of the filtering functions dedicated to each deployedsecurity domains. The types of communication protocols that can behandled by the SPA-CDS is dependent on the type of specific protocoladapters that are deployed on a given device. In general and withoutlimitation, these can be both stream or packetized protocols.

The skilled artisan will understand that, in some embodiments, adifferent number of independent processing engines may be used from thefour described above.

While the present disclosure describes various embodiments forillustrative purposes, such description is not intended to be limited tosuch embodiments. On the contrary, the applicant's teachings describedand illustrated herein encompass various alternatives, modifications,and equivalents, without departing from the embodiments, the generalscope of which is defined in the appended claims. Except to the extentnecessary or inherent in the processes themselves, no particular orderto steps or stages of methods or processes described in this disclosureis intended or implied. In many cases the order of process steps may bevaried without changing the purpose, effect, or import of the methodsdescribed.

Information as herein shown and described in detail is fully capable ofattaining the above-described object of the present disclosure, thepresently preferred embodiment of the present disclosure, and is, thus,representative of the subject matter which is broadly contemplated bythe present disclosure. The scope of the present disclosure fullyencompasses other embodiments which may become apparent to those skilledin the art, and is to be limited, accordingly, by nothing other than theappended claims, wherein any reference to an element being made in thesingular is not intended to mean “one and only one” unless explicitly sostated, but rather “one or more.” All structural and functionalequivalents to the elements of the above-described preferred embodimentand additional embodiments as regarded by those of ordinary skill in theart are hereby expressly incorporated by reference and are intended tobe encompassed by the present claims. Moreover, no requirement existsfor a system or method to address each and every problem sought to beresolved by the present disclosure, for such to be encompassed by thepresent claims. Furthermore, no element, component, or method step inthe present disclosure is intended to be dedicated to the publicregardless of whether the element, component, or method step isexplicitly recited in the claims. However, that various changes andmodifications in form, material, work-piece, and fabrication materialdetail may be made, without departing from the spirit and scope of thepresent disclosure, as set forth in the appended claims, as may beapparent to those of ordinary skill in the art, are also encompassed bythe disclosure.

What is claimed is:
 1. A cross-domain network traffic managementappliance comprising: an external hardware network domain port tointerface with an external network corresponding with a first networksecurity domain, and exchange domain-specific data therethrough; across-domain hardware port to interface with a second network securitydomain and exchange cross-domain data therethrough; one or morehardware-integrated processing engines; and a hardware-integratedinterconnection matrix configured to define, in hardware, designateddata communication paths to interconnect said processing engines;wherein said one or more hardware-integrated processing engines areoperable to: process and validate ingress first domain data receivedfrom said first network security domain via said external hardware portfor cross-domain egress via said cross-domain hardware port; and processcross-domain ingress data received via said cross-domain hardware portfor dispatch to said first network security domain via said externalhardware network port; wherein cross-domain egress and ingress data isinternally encrypted and decrypted, respectively, in accordance with adesignated destination-domain encryption process.
 2. The appliance ofclaim 1, wherein said cross-domain egress and ingress data isrespectively encrypted or decrypted by a hardware-integrated encryptionengine.
 3. The appliance of claim 2, wherein said hardware-integratedencryption engine is operatively associated with a plurality of hardwaresecurity module (HSM) ports distinctly addressable via said respectivedata communication paths of said interconnection matrix to respectivelyencrypt said cross-domain egress data and decrypt said cross-domainingress data.
 4. The appliance of claim 1, wherein said respective datacommunication paths of said interconnection matrix physically segregatesingress and egress cross-domain data paths.
 5. The appliance of claim 1,further comprises a distinctly addressable hardware-integratedadministrative engine operable to securely manage operation of said twoor more hardware-integrated processing engines.
 6. The appliance ofclaim 1, further comprising an external hardware security network portdistinctly addressable by one of said hardware-integrated processingengines to invoke an external validation process to be applied to saidingress domain-specific data prior to encryption for cross-domainegress.
 7. The appliance of claim 1, wherein said hardware-integratedprocessing engines comprise a domain-specific protocol adapter operableto interface with said external network domain port, a cross-domain datavalidation engine operable to validate said ingress domain-specific dataonce processed by said protocol adapter, and a cross-domain accessportal operable to interface with said cross-domain hardware port. 8.The appliance of claim 7, wherein said interconnection matrix defines aone-way hardware data path between said protocol adapter and saidcross-domain access portal via said cross-domain data validation engineto process said ingress first domain data, and a distinct hardware datapath between said cross-domain access portal and said protocol adapterto process said cross-domain ingress data.
 9. The appliance of claim 1,wherein said cross-domain hardware port comprises an externalcross-domain port to be operatively interfaced with a correspondingexternal cross-domain hardware port of a corresponding cross-domainnetwork traffic management appliance operatively associated with saidsecond network security domain.
 10. The appliance of claim 1, whereinsaid cross-domain hardware port comprises an internal cross-domain portoperatively interfacing with a corresponding internal cross-domainhardware port operatively associated with said second network securitydomain.
 11. The appliance of claim 1, wherein said cross-domain hardwareport is configured to operatively interface with a secureinterconnection network operatively interconnecting respectivecross-domain hardware ports associated with respective network securitydomains to securely transfer encrypted cross-domain data therebetween.12. The appliance of claim 1, wherein said cross-domain hardware port isoperable to interface with multiple distinct second network securitydomains and exchange distinct destination domain-specific datatherewith.
 13. A cross-domain network traffic management systemcomprising: a plurality of hardware data path layers, each one of whichcorresponding with a designated network security domain and comprising:an external hardware network domain port to interface with an externalnetwork corresponding with a given network security domain, and exchangedomain-specific data therethrough; a cross-domain hardware port tointerface with distinct hardware data path layers corresponding withdistinct network security domains and exchange cross-domain datatherethrough; one or more hardware-integrated processing engines; and ahardware-integrated interconnection matrix configured to define, inhardware, designated data communication paths to interconnect saidprocessing engines; wherein said hardware-integrated processing enginesare operable to: process and validate ingress given domain data receivedfrom said given network security domain via said external hardware portfor cross-domain egress via said cross-domain hardware port; and processcross-domain ingress data received via said cross-domain hardware portfor dispatch to said given network security domain via said externalhardware network port; wherein cross-domain egress and ingress data isinternally encrypted and decrypted, respectively, in accordance with arespectively designated destination-domain encryption process.
 14. Thesystem of claim 13, wherein each said cross-domain hardware portoperatively interfaces with a secure interconnection network to securelytransfer encrypted cross-domain data thereon.
 15. A multi-zone networktraffic management system or appliance comprising: one or morehardware-integrated processing engines operable to implement one or morenetwork security management processes associated with a respectivenetwork security zone; and a trusted hardware interconnection matrixhaving a plurality of hardware ports associated therewith and configuredto define in hardware multiple data communication paths embedded thereinexclusively interconnecting said network security zones via respectivehardware paths thereof that integrally invoke, in hardware, said networksecurity management processes; wherein a given data transaction isrouted in hardware via a designated hardware path of saidinterconnection matrix to operatively invoke a given network securitymanagement process, upon successful execution of which, said given datatransaction is successfully relayed to a distinct zone via a distinctone of said hardware paths, such that said network security process isintegrally invoked in hardware to process network transactions betweensaid zones.
 16. The system of claim 15, wherein said network securitymanagement processes comprise a transaction auditing process.
 17. Thesystem of claim 15, wherein said given network transaction is relayed,encrypted, to said distinct zone, and only successfully decryptedtherein upon successful execution of said given network securitymanagement process.
 18. The system of claim 17, wherein said securitymanagement process, upon successful execution thereof, releases adecryption key to successfully decrypt said relayed network transaction.19. The system of claim 15, wherein said given network securitymanagement process, upon successful execution thereof, locally decryptssaid given network transaction to be relayed to said distinct zoneaccordingly.
 20. The system of claim 15, wherein said one or morenetwork security management processes comprise a cryptographic process;and said one or more hardware-integrated processing engines comprise acryptographic engine hardwired to interface with said hardware ports toexecute each said cryptographic process.