The method of this disclosure belongs to the field of spectrometer systems. More specifically, it is a new security system for multi-bus spectrometers.
Spectrometers with several buses capable of communicating to client devices such as PCs are now commercially available. These buses typically include USB, Ethernet, and Wi-Fi connections. The disclosure of this application applies only to remote communications, i.e. those using Ethernet and Wi-Fi, not USB. Keeping remote multiple bus connections secure when several users have access to the multi-bus spectrometer has become a concern as these multi-bus spectrometers proliferate in insecure environments. The system of this disclosure ensures that only one ‘open’ (non-encrypted) remote connection can be established, and that all other remote connections then must communicate over a Transport Layer Security/Secure Sockets Layer (TLS/SSL) encrypted layer or not be connected.
Thus there is a need to have a security self-aware spectrometer system as disclosed herein.
The security self-aware spectrometer system of this disclosure ensures that only one ‘open’ (non-encrypted) remote connection can be established, and that all other remote connections then must communicate over a Transport Layer Security/Secure Sockets Layer (TLS/SSL) encrypted layer or not be connected.
For a fuller understanding of the nature and objects of the invention, reference should be made to the following detailed description, taken in connection with the accompanying drawings, in which:
The security self-aware spectrometer protocol system of this disclosure, (included as part of the communications protocol identified in
The preferred embodiment security self-aware spectrometer protocol system of this disclosure will hold a place, typically in non-volatile memory, called a private session key (PSK). This PSK can be of any arbitrary byte length between 24 or 32 bytes. As shown in
Other remote connections can be made but only via Transport Layer Security/Secure Sockets Layer (TLS/SSL) where a trusted certificate, public and private key, are involved in creating a session key. This type of remote connection lacks the speed performance of an ‘open’ connection. Once the session key is established, performance is somewhat maintained because only that key is used for symmetrical encryption with all following transactions. Another avenue would be that no TLS/SSL connection is permitted once the single ‘open’ connection is established, effectively allowing only one connection to spectrometer.
In conclusion, this design requires a simple identical match be performed between a spectrometer and one other network remote connection to establish an open (non-encrypted) channel for communications.
Since certain changes may be made in the above described security self-aware system for a spectrometer without departing from the scope of the invention herein involved, it is intended that all matter contained in the description thereof or shown in the accompanying figures shall be interpreted as illustrative and not in a limiting sense.
The present application claims the benefit of previously filed co-pending Provisional Patent Application Ser. No. 62/477,177 filed on Mar. 27, 2017.
Number | Date | Country | |
---|---|---|---|
62477177 | Mar 2017 | US |