会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • A SYSTEM AND A METHOD FOR SECURE DATA TRANSFER USING AIR GAPPING HARDWARE PROTOCOL
    • WO2021148461A1
    • 2021-07-29
    • PCT/EP2021/051188
    • 2021-01-20
    • FUNDACJA "BLOCKCHAIN DEVELOPMENT FOUNDATION"
    • GANCARZ, Kamil Rafal
    • H04L29/06H04B1/44G06F21/85G06F13/4022G06F21/72G06F9/544H04L63/0209H04L63/0442H04L63/0471H04L9/006H04L9/0825H04L9/083H04L9/3213H04L9/3247
    • A system for secure data transfer using air gapping. A first module (100) comprises: a first module communication interface (102) configured to communicate with a public network; a first module controller (105) and a first module data interface (106) configured send and/or receive data from the public network. A second module (200) comprises: a first read-only memory (202) storing an operating system; a second module communication interface (208) configured to communicate with a secured machine or a secured network to transmit data from and to the second module; a microcontroller (205) and a second module data interface (206, 207) for communicating with a bridge module (300). The bridge module (300) comprises: a bridge module controller (305); a bridge module data interface (309) for communicating with the bridge module controller (305); memory (303) for storing data; a switch (310) configured to selectively connect the bridge module data interface (309) to either the first module data interface (106) or to the second module data interface (206, 207) such that the first module data interface (106) is never connected with the second module data interface (206, 207). The bridge module controller (305) is configured to receive data from the second module (200), store the data in the memory (303), and send the data to the first module (100) and/or to receive data from the first module (100), store the data in the memory (303), and send the data to the second module (200). The second module (200) further comprises a second read-only memory (203) storing sets of private keys of the second module (200) and at least one public key of another remote entity; a cryptographic unit (209) configured to encrypt and/or decrypt data using the keys stored in the second read-only memory (203).