|
|
|
|
|
|
|
|
| ( 1 of 1 ) |
| United States Patent | 5,692,124 |
| Holden , et al. | November 25, 1997 |
| **Please see images for: ( Certificate of Correction ) ** |
A method is disclosed for limited write downs of data from higher security classification users to lower security classification users across computer networks, while preserving the security of classified data at the higher security classification user from covert transmission via acknowledgment messages from the higher user to the lower user. The intended acknowledgment message is released to the lower user when it matches the user content of a predicted acknowledgment message. In TCP/IP interface applications, the acknowledgment messages are IP based data transfer protocols acknowledging the transfer of data from the lower side to the higher side. With IP datagram transfers, deterministic portions are predicted and non-deterministic portions are identified. Where the number of non-deterministic bits exceed a predetermined rate, the acknowledgment message is discarded.
| Inventors: | Holden; James M. (Valley Center, CA), Levin; Stephen E. (Poway, CA), Wrench, Jr.; Edwin H. (San Diego, CA) |
|---|---|
| Assignee: |
ITT Industries, Inc.
(White Plains,
NY)
|
| Family ID: | 24831285 |
| Appl. No.: | 08/704,896 |
| Filed: | August 30, 1996 |
| Current U.S. Class: | 726/2; 709/225; 707/999.009 |
| Current CPC Class: | H04L 29/06 (20130101); H04L 63/105 (20130101); G06F 21/6218 (20130101); G06F 21/556 (20130101); H04L 63/0823 (20130101); G06F 2211/005 (20130101); G06F 2221/2101 (20130101); G06F 2221/2113 (20130101); G06F 2221/2141 (20130101); G06F 2211/009 (20130101); Y10S 707/99939 (20130101) |
| Current International Class: | G06F 21/00 (20060101); H04L 29/06 (20060101); G06F 1/00 (20060101); H04L 009/00 (); G06F 012/14 (); G06F 017/30 () |
| Field of Search: | ;395/186,187.01,200.06,609 ;364/286.4,222.5 |
| 4984272 | January 1991 | McIlroy et al. |
| 5204961 | April 1993 | Barlow |
| 5355474 | October 1994 | Thrasaisingham et al. |
| 5469556 | November 1995 | Clifton |
| 5469569 | November 1995 | Grube et al. |
| 5574912 | November 1996 | Hu et al. |
Browne, R. "An Architecture for Covert Channel Control in Real Time Networks and Multiprocessors," 1995 IEEE Symposium on Security and Privacy, May 1995, pp. 155-168. . Thomas et al., "A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases," IEEE Transactions on Knowledge and Data Engineering, vol. 8, No. 1, pp. 16-31, Feb. 1996. . Keefe et al., "Multilevel Secure Database Concurrency Control," Sixth International Conference on Data Engineering, pp. 337-344, 1990. . Venkatraman et al., "Transmission Schedules to Prevent Traffic Analysis," Computer Security Application conference, pp. 108-115, 1993. . Mathur et al., "The Concurrency Control and Recovery Problem for Multilevel Update Transactions in MLS Systems," 1993 Computer Security Foundation Workshops VI, pp. 10-23, 1993.. |
|
|