The present invention generally relates to protecting sensitive data from being accessed by unauthorized persons. More specifically the present invention is directed to validating that only authorized users can view sensitive content displayed on a display.
Threats to secure computer data include the prying eyes of individuals that may see data displayed on a computer screen and software that can compromise or steal computer data. The government of the United States (US) is very concerned that individuals without proper security clearances may view documents that are considered classified, secret, or top secret. Any individual who may walk into a room where sensitive documents are located or displayed on a display is a security risk. Even individuals that are not physically in a room may be a security threat. For example, secure materials may be viewed by individuals who are far from a display screen by viewing that screen using a pair of binoculars or a telescope. Secure materials may also be viewed by persons who have placed hidden cameras in a room where secure materials are viewed. While the US government does setup facilities where sensitive data may be viewed in an environment free from prying eyes, setting up such facilities in new locations is an expensive and time consuming task. What are needed are new method and apparatus that allow secure data to be viewed virtually at any time and virtually at any location in a manner that maintains the highest level of security.
Malware, computer viruses, and eavesdropping software have been used to steal sensitive information, destroy computer data, and hold computer data for ransom. Malware broadly refers to malicious software designed to infiltrate and/or damage a computer system and/or network without the an owner of a computer or computer network being aware that their data has been compromised. Another problem that affects computing devices is the dissemination of undesired advertisements and messages. Damage from such “spam” messages or malware are not limited to time lost sorting through these undesired messages, yet also can include “phishing” attacks that can steal personal information or attacks like the “I Love You” virus that spawn excessive email traffic with the intent to crash a computer network.
Generally malware can be any software program that includes code that executes without the knowledge or authorization of an owner or user of a computing device. Malware is typically distributed by parties with nefarious intent. Malware is commonly used steal or destroy computer data or to snoop or spy the actions of a user when the user operates a computer. Malware is also frequently used to damage a computer or to damage computer data. For example, malware may be used to steal personal or financial information, blackmail computer users by denying access to their own data unless or until a fee is paid, damage infected computers by damaging data stored on those infected computers, or to steal classified information.
Because of the threats posed to computing devices in general and to government security requirements, new methods and apparatus are needed to secure these computing devices from exploitation by various forms of malicious program code or by prying eyes.
The presently claimed invention relates to a method, a non-transitory computer readable storage medium, or an apparatus/system that performs functions consistent with the present disclosure. A method consistent with the present disclosure may identify that a switch has been set in a first position after which a secure mode of operation may be initiated at a computing device. This secure mode of operation may control when sensitive data may be displayed on a display. Next, biometric data of a person may be received. This biometric data may be received after an eye of a person has been focused on the display. The received biometric data may be used to identify that the received biometric data matches biometric data of an authorized user. After the person has been identified as being the authorized user, the sensitive data may be displayed on the display.
When the method of the presently claimed invention is performed by a non-transitory computer readable storage medium, a processor executing instructions out of a memory may identify that a switch has been set in a first position after which a secure mode of operation may be initiated at a computing device. This secure mode of operation may control when sensitive data may be displayed on a display. Next, biometric data of a person may be received. This biometric data may be received after an eye of a person has been focused on the display. The received biometric data may be used to identify that the received biometric data matches biometric data of an authorized user. After the person has been identified as being the authorized user, the sensitive data may be displayed on the display.
An apparatus consistent with the present disclosure may include a display, a sensor that senses biometric data, a switch, a first memory, and a first processor. The processor may execute instructions out of the memory to identify that a switch has been set in a first position after which a secure mode of operation may be initiated at a computing device. The processor may then control when sensitive data is displayed on a display. The processor may then receive the biometric data of a person that is focusing an eye on the display, identify that the received biometric data matches biometric data of an authorized user, and then may control the display of the sensitive data on the display.
The present disclosure is directed to protecting sensitive information from being viewed or acquired by persons that are not authorized to view or receive this sensitive information. The present disclosure is also directed to preventing forms of malicious software from exploiting a computer. Methods and apparatus consistent with the present disclosure may protect primary computing environments and data from being exploited by individuals that do not have security clearances. Patent application Ser. No. 16/286,017, filed Feb. 26, 2019, entitled “Securing a Computer Processing Environment from Receiving Undesired Content” is incorporated by reference into the present application.
Methods and apparatus consistent with the present disclosure may receive sensor data from sensors that sense user biometric data when the identity of a user is validated. Apparatus consistent with the present discourse may include a display that may be worn on the head of a user. Methods consistent with the present disclosure may also require that an authorized user be identified as wearing this display on their head before sensitive data is displayed on a display of the head worn display. An apparatus consistent with the present disclosure may also include multiple different sets of different computers that are separated by one or more switches. Each of these different computers may include its own processor and memory. Data received by a first computer within an apparatus may be scanned for malicious program code before that data is allowed to be provided to a second computer within the apparatus.
Once visor 220 is placed around the eyes of the user, a processor at head unit 210 or at user device 270 may receive biometric data from one or more sensors. For example, a camera or an infrared (IR) sensor may capture images of the user's eyes and that image data may be used when a processor executes instructions that identify the identity of the user. Processors executing instructions out of a memory at user device 270 or head unit 210 may then selectively display content to the user. In certain instances, a user may not be required to strap a head mounted unit to their head, yet may be required to view a display by placing their eyes in a screen shade similar to screen shade 220 of
Methods consistent with the present disclosure do not require a computing device that can be physically separated from a head worn unit. In such instances, commercially available head worn computing devices similar to the Microsoft Hololens may be used to implement methods consistent with the present disclosure. A processor at a head worn computing device may perform steps consistent with the flow chart of
In an instance when determination step 330 identifies that the biometric data does match an authorized user, program flow may move to step 350 that identifies whether a set of sensitive data has been identified for display. Sensitive data may be selected by the user interacting with a user interface or data entry device, or a user may identify a data selection by looking at a portion of the screen and blinking their eyes or by providing some other gesture. Eye tracking software and gesture sensor detecting software may cause a processor to identify that a user has made a selection by evaluating data received via one or more sensors communicatively coupled to the processor. In either instance an authorized user may make selections of content to be displayed when the user has an access level or security clearance level commensurate with viewing a type of secure data. In certain instances, a first user may be able to select content to view, yet not be allowed to view that content because their security clearance is not high enough. In such an instance the user may select content and then pass a head mounted unit to another person that does have a security clearance high enough to view the sensitive content. This capability would allow support personnel to prepare documents to be viewed by their superiors while not allowing those support personnel to view the sensitive content. When the user access level does not match the authorization level, program flow may move from step 360 to step 340 where content displayed on the display is limited. When determination step 360 identifies that a user access level matches an authorization level program flow may move from step 360 to step 370 where the sensitive data is displayed on the display. After step 370 or after step 340, program flow may move back to step 310 of
Note that the user access levels may correspond to one or more security clearance levels of the United States government or other organization. As such, approved users may be assigned an access level of top secret, secret, classified, or be assigned to an administrative access level. Each of these levels may correspond to a set of authorization levels within which sensitive documents are classified. Users with top secret clearance level may be allowed to see all types of sensitive documents. Users with a secret clearance level may be able to see secret materials, classified materials, or materials associated with administrative functions. Users with a classified clearance level may be allowed to view classified documents or materials associated with administrative functions. Users with an administrative clearance level may be allowed to perform administrative functions while not being able to view or listen to content that is assigned a security clearance level that is above an administrative authorization level. Any particular user may, thus, be allowed to view content with clearance levels that match or that are below an access level assigned to that particular user.
In certain instances, these switches may connect a parallel communication bus or a serial communication connection. Parallel communication buses or serial communication connections may be implemented using any standard or non-standard communication bus known in the art. As such, parallel communications may be performed using any interface including, yet not limited to a local communication bus, a peripheral communication (PCI) bus, an Ethernet connection, a universal serial bus (USB), PCI express (PCIe), or other form of direct communication connection.
While methods and systems consistent with the present disclosure may use direct electrical interconnections, other embodiments may use wireless communication interfaces that may be turned off. In such instances, these wireless communication interfaces may be disabled by a switch, for example by a switch that turns off power to electronics associated with a wireless transmitter or receiver could disable reception or transmission of wireless signals. Alternatively a wireless transmission device or antenna may simply be switched out of a circuit when a communication pathway is disabled.
When intelligent switch 410B and secondary environment 420B are communicatively connected via interconnect 425B, intelligent switch 410B may receive the computer data from secondary environment 420B. After this point in time, intelligent switch 410B may test the received computer data to see if it contains undesired content. Intelligent switch 410B may perform tests that include pattern matching, whitelist/blacklist comparisons, and or other tests capable of detecting malware, viruses, or spam. Tests performed by Intelligent switch 410B may be performed in the neutral configuration illustrated in
In an instance when the tests performed by an intelligent switch identify that computer data received from a secondary environment do not include undesired content, that switch may be communicatively coupled to a primary environment in a configuration illustrated in
In an instance where an intelligent switch can sometimes receive communications from a secondary environment via a secondary communication mechanism, that secondary communication mechanism may be disabled (e.g. switched out of the circuit or turned off) when the intelligent switch is communicatively coupled to the primary environment such as the configuration shown in
While
Control signal CS1 may be used to close the switches of switch set 1530 to communicatively connect the intelligent switch 510 to the secondary environment 520. Control signal CS2 may be used to close the switches of switch set 2550 to connect the intelligent switch 510 to primary environment 540. Control signal CS1 may be used to connect the intelligent switch 510 to the secondary environment 520 after data control signal DTA-RCD informs the intelligent switch that computer data has been received by secondary environment 520. Once the switches of switch set 1530 are closed, communication connections are made such that secondary environment 520 may provide received computer data to intelligent switch 510. At this time primary environment 540 may be protected from hacking, screen-scraping, or key-logging because it is physically isolated from the secondary computing environment and from any external communication path.
After intelligent switch 510 receives the computer data from secondary environment 520, intelligent switch 510 may open the switches of switch set 1530 and may test the received computer data for undesired content. When intelligent switch 510 identifies that the received computer data does not include undesired content, it may close the switches of switch set 2550 using control signal CS2. After the switches of switch set 2550 are closed, intelligent switch 510 may provide the received computer data to primary environment 540. Preferably, switches associated with switch set 1530 and switch set 2550 will never be closed at the same time.
In certain instances, logic or processors at a secondary environment may perform a first set of initial tests on received computer data. The secondary environment may be configured to only transmit computer data to an intelligent switch only after this first set of initial test pass. Intelligent switches 510, the secondary environment 520, or the primary environment 540 may include logic or processors that may perform functions consistent with the present disclosure. Intelligent switch may be implemented using a set of field effect transistors (FETs) or bipolar transistors.
Various environments consistent with the present disclosure may include different forms of functionality. For example, secondary environments discussed in respect to
Primary environments and secondary environments consistent with the present disclosure may never be physically connected together at any time. A user associated with the primary environment may communicate securely with a second user device operated by a second user. After a message is received in the secondary environment from the second user device, an intelligent switch may be communicatively coupled to the secondary environment after which content included in the received message may be tested an provided to the primary environment securely according to the switching configurations and testing discussed in respect to
The functionality of a secondary environment and an intelligent switch may be combined, when desired. In such instances, a switch set may isolate functions of an intelligent switch from the secondary environment via switches. While the ability to isolate an intelligent switch from a secondary environment and from a primary environment may be preferred, alternative embodiments may couple the secondary environment to the intelligent switch without switches. This may include coupling the secondary environment to the intelligent switch via a proprietary communication interface or by using a proprietary communication technique. In such instances, the primary environment may only receive computer data after it has been tested and after a connection has been formed via operation of the intelligent switch that allows the primary environment to receive the tested computer data.
CPU 620 of non-secure environment 610 and CPU 645 of secure environment 640 may be processors of different types, may be processors that execute program instructions associated with different types of operating systems, or may be processors of different types that also execute different types of operating system program code. As such, CPU 620 could be an ARM processor and CPU 645 could be an Intel compatible processor. As such, the ARM processor could execute program code associated with a first type of software that is ARM compatible and the Intel compatible processor could execute program code consistent with the Microsoft Windows operating system, for example. Different types of processors and different types of program code operating in respective different environments should make computing devices consistent with the present disclosure less likely to be exploited by a set of malware. Even if malware were able to affect one environment, it would likely not be able to affect both environments.
Here again switches may be used to switch between different operating environments. Depending on a switching position, switches discussed in respect to
After the intelligent switch connects the primary environment to the intelligent switch in step 710, information from the primary environment may be received by the intelligent switch at step 720 of
After step 740, the secondary environment may be allowed to access data from an external computing device. For example, a URL provided with a request received from the primary environment in step 720 may be accessed by the secondary environment. As such, intelligent switches consistent with the present disclosure may selectively connect to either a primary or to a secondary computing environment based on a protocol that may include periodic switching, secondary communications, or proprietary communications that can cause the primary computing environment to always be disconnected/isolated from the secondary computing environment. By doing this, methods and apparatus consistent with present disclosure constitute a new form of “air-gapping” of specific parts of an overall computing system when performing a security function.
The components shown in
Mass storage device 830, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit 810. Mass storage device 830 can store the system software for implementing embodiments of the present invention for purposes of loading that software into main memory 820.
Portable storage device 840 operates in conjunction with a portable non-volatile storage medium, such as a FLASH memory, compact disk or Digital video disc, to input and output data and code to and from the computer system 800 of
Input devices 860 provide a portion of a user interface. Input devices 860 may include an alpha-numeric keypad, such as a keyboard, for inputting alpha-numeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. Additionally, the system 800 as shown in
Display system 870 may include a liquid crystal display (LCD), a plasma display, an organic light-emitting diode (OLED) display, an electronic ink display, a projector-based display, a holographic display, or another suitable display device. Display system 870 receives textual and graphical information, and processes the information for output to the display device. The display system 870 may include multiple-touch touchscreen input capabilities, such as capacitive touch detection, resistive touch detection, surface acoustic wave touch detection, or infrared touch detection. Such touchscreen input capabilities may or may not allow for variable pressure or force detection.
Peripherals 880 may include any type of computer support device to add additional functionality to the computer system. For example, peripheral device(s) 880 may include a modem or a router.
Network interface 895 may include any form of computer interface of a computer, whether that be a wired network or a wireless interface. As such, network interface 895 may be an Ethernet network interface, a BlueTooth™ wireless interface, an 802.11 interface, or a cellular phone interface.
The components contained in the computer system 800 of
The present invention may be implemented in an application that may be operable using a variety of devices. Non-transitory computer-readable storage media refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile and volatile media such as optical or magnetic disks and dynamic memory, respectively. Common forms of non-transitory computer-readable media include, for example, FLASH memory, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, RAM, PROM, EPROM, a FLASH EPROM, and any other memory chip or cartridge.
The present invention may be implemented in an application that may be operable using a variety of devices. Non-transitory computer-readable storage media refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile and volatile media such as optical or magnetic disks and dynamic memory, respectively. Common forms of non-transitory computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, RAM, PROM, EPROM, a FLASH EPROM, and any other memory chip or cartridge.
While various flow diagrams provided and described above may show a particular order of operations performed by certain embodiments of the invention, it should be understood that such order is exemplary (e.g., alternative embodiments can perform the operations in a different order, combine certain operations, overlap certain operations, etc.).
The foregoing detailed description of the technology herein has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the technology to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the technology and its practical application to thereby enable others skilled in the art to best utilize the technology in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the technology be defined by the claim.