Claims
- 1. A method for transmitting communication from secure users over at least one network having a secure portion and an unsecure portion; the method comprising:
permitting transmission of communications from the secure user between a secure portion and an unsecure portion of the at least one network; intercepting a communication transmitted between the secure and the unsecure portions of the at least one network; determining whether a user initiating the intercepted communication is a secure user; and controlling passage of information in the intercepted communication when said intercepted communication is from a secure user, so as to prevent transmission of information from the secure user into an unsecure portion of the at least one network when such transmission is not permissible.
- 2. The method of claim 1 further comprising the act of determining whether the intercepted communication must be transmitted through an unsecure portion of the at least one network to reach the intended destination of said communication.
- 3. The method of claim 1, wherein the act of intercepting comprises intercepting the communication by a multi-level network security interface.
- 4. The method of claim 4 wherein the multi-level network security interface is transparent to the users and to the at least one network.
- 5. A system for communicating on a network having a secured plurality of users utilizing multi-level network security devices, each multi-level network security device being operable in a first and second mode, respectively, and an unsecured plurality of users employing no network security devices, said system comprising:
means for sending a communication from any first user; means for intercepting said communication by a first multi-level network security device; means for discarding said communication if said communication violates security parameters associated with said first multi-level network security device; and in said first mode, means for sending said communication from said first multi-level network security device to any second user; and in said second mode, means for encrypting said communication using said first multi-level network security device, sending said encrypted communication to a second multi-level network security device, decrypting said communication using said second multi-level network security device, and sending said decrypted communication from said second multi-level network security device to a third user selected from said secured plurality of users.
- 6. The system of claim 5, wherein said means for sending said encrypted communication to a second multi-level network security interface further comprises:
means for intercepting said encrypted communication sent by said first multi-level network security interface by a third multi-level network security interface; means for validating a signature of said first multi-level network security interface using said third multi-level network security interface; and means for sending said first multi-level network security interface encrypted communication from said third multi-level network security interface to said second multi-level network security interface.
- 7. The system of claim 5, wherein each multi-level network security interface comprises means for using association establishment messages for authenticating other multi-level network security interfaces.
- 8. The system of claim 5, further comprising means for using association establishment messages for exchanging security parameters between said multi-level network security interfaces.
- 9. A system for mixed enclave communications over a network including both secured and unsecured users, comprising:
means for permitting communications over the network between one of said secured users and one of said unsecured users; means for discovering dynamically by said secured user whether a user initiating communications is one of said secured users or one of said unsecured users; and means for controlling passage of information between said one of said secured users and said one of said unsecured users for securing given information residing with said one of said secured users against transference to said one of said unsecured users when not permissible.
- 10. The system of claim 9, wherein the means for discovering includes means for using Internet Protocol (IP) addresses for identifying the secured and unsecured users.
- 11. The system of claim 9, wherein the means for discovering includes means for using association establishment messages for said secured users authenticating each other.
- 12. The system of claim 9, wherein the means for discovering includes means for using association establishment messages for the secured users exchanging security parameters.
- 13. An apparatus for providing multi-level security on a computer network having a plurality of users and at least one relatively secure portion relative to at least one relatively unsecure portion of the network, the apparatus comprising:
means for intercepting a communication transmitted between said at least one secure and said at least one unsecure portions of said network; means for determining whether network security parameters will be violated by said intercepted communication; means for encrypting said intercepted communication if said intercepted communication:
will not violate said network security parameters; originates from a secure portion of said network; is destined for another secure portion of said network; and will traverse an unsecure portion of said network; and if said network security parameters will not be violated:
in a first mode, means for transmitting said intercepted communication; and, in a second mode, means for transmitting said encrypted intercepted communication.
- 14. The apparatus claim 13, wherein the means for determining whether network security parameters will be violated further comprises means for selecting the types of messages that are permissible.
- 15. The apparatus of claim 13, wherein the means for determining whether network security parameters will be violated further comprises means for using Internet protocol (IP) addresses for identifying the source and destination of said communication.
- 16. The apparatus of claim 15, further comprising means for using association establishment messages for allowing those users which reside in said at least one secure portion of said network to authenticate other users residing in other secure portions of said network.
- 17. The apparatus of claim 16, wherein said association establishment messages include security parameters.
- 18. The apparatus of claim 16, further comprising means for utilizing a message intended to evoke a response from a destination user selected from said plurality of users and intended to receive said communication to determine whether said destination user resides in the same portion of the network as a source user selected from said plurality which sent said message.
- 19. The apparatus of claim 18, wherein said message intended to evoke a response from said destination user is a message which evokes a response only if said destination user and source user reside in the same portion of said network.
- 20. The apparatus of claim 13, further comprising means for employing a waiting queue to influence passage of information.
- 21. The apparatus of claim 13, wherein the means for determining whether network security parameters will be violated further comprises means for creating an entry in an association table indicative of the source of a received message.
- 22. The apparatus of claim 21, wherein the means for determining whether network security parameters will be violated further comprises means for comparing the destination's security level to that of the source of said intercepted message, so as to determine if said intercepted communication may proceed.
- 23. The apparatus of claim 22, wherein when the destination's security level is higher than the source's, the source is writing up to the destination, and said intercepted communication is permissible to be released.
- 24. The apparatus of claim 22, wherein when the destination's security level is equivalent to that of the source, information transfers between the source and destination, and destination and source are permissible.
- 25. The apparatus of claim 22, wherein when the destination's security level is lower than the source's, the source is writing down to the destination, and said intercepted communication is not permissible to be released, unless said communication is predicted.
- 26. An apparatus for communicating on a network having a plurality of secured users utilizing multi-level network security devices, and unsecured users, wherein a first user selected from said plurality attempts to transmit a message to a second user selected from said plurality, when either said first user is a secured user, and said second user is an unsecured user, or when said first user is an unsecured user, and said second user is a secured user, the apparatus comprising:
means for intercepting said message with a multi-level network security device; means for determining whether network security parameters will be breached by said message; and, means for transmitting said message to said second user if network security parameters will not be breached by said message; and when both said first and second users are secured users:
means for intercepting said message with a multi-level network security device utilized by said first user; means for determining whether network security parameters will be breached by said message; means for encrypting said message using said multi-level network security device utilized by said first user if network security parameters will not be breached by transmission of said message; means for transmitting said encrypted message to a second multi-level network security device utilized by said second user if network security parameters will not be breached by transmission of said message; means for decrypting said encrypted message using said multi-level network security device utilized by said second user if network security parameters will not be breached by transmission of said message; and, means for transmitting said message to said second user.
- 27. The apparatus of claim 26, wherein said means for determining whether network security parameters will be breached further comprises means for comparing the destination's security level to that of the source of said intercepted message, so as to determine if said intercepted communication may proceed.
- 28. The apparatus of claim 27, wherein:
when the destination's security level is higher than the source's, the source is writing up to the destination, and said intercepted communication is permissible to be released; when the destination's security level is equivalent to that of the source, information transfers between the source and destination, and destination and source are permissible; and, when the destination's security level is lower than the source's, the source is writing down to the destination, and said intercepted communication is not permissible to be released, unless said communication is predicted.
RELATED APPLICATIONS
[0001] The present application is a continuation-in-part of U.S. application Ser. No. 08/688,524 to Holden et al., entitled MIXED ENCLAVE OPERATION IN A COMPUTER NETWORK WITH MULTI-LEVEL NETWORK SECURITY, filed Jul. 30, 1996; and related to U.S. Pat. No. 5,577,209, entitled APPARATUS AND METHOD FOR PROVIDING MULTI-LEVEL SECURITY FOR COMMUNICATION AMONG COMPUTERS AND TERMINALS ON A NETWORK, issued to Boyle et al, Nov. 19, 1996.
Continuations (1)
|
Number |
Date |
Country |
Parent |
09127280 |
Jul 1998 |
US |
Child |
09925079 |
Aug 2001 |
US |
Continuation in Parts (2)
|
Number |
Date |
Country |
Parent |
08688543 |
Jul 1996 |
US |
Child |
09127280 |
Jul 1998 |
US |
Parent |
08688524 |
Jul 1996 |
US |
Child |
08688543 |
Jul 1996 |
US |