摘要:
A software-defined radio includes a pair of radio subsystems such as a red (command) and black (data) radio subsystem having an operating environment conforming to the Software Communications Architecture (SCA) specification, for example, as used for Joint Tactical Radio System (JTRS). A clock is read by at least one of the radio subsystems for determining time of day. A processor of the radio subsystem is operative for distributing the time of day to the radio subsystems using a global hardware timing pulse. Each processor can include a free-running timer to which any time sources within the pair of radio subsystems are set.
摘要:
System for providing a secure file service includes an MLS file service module (300) comprised of a cryptographic processor (302). The MLS file service module also includes an MLS file system (301) hosted by the cryptographic processor. A secure user processor (402) includes programming and communications hardware for requesting at least one classified file from the MLS file service module. The cryptographic processor includes cryptographic hardware and software to decrypt the classified file. The cryptographic processor is also performs an integrity check on the classified file. Once the file is decrypted and its integrity checked by the cryptographic processor, the MLS file service module serves the classified file to the secure user processor in decrypted form. If the classified file is an executable file, the method also includes selectively enabling a write function for program memory of the secure user processor. This write function is disabled immediately after the classified executable file has been loaded into the program memory to guard against self modifying programs.
摘要:
Mobile PDA computer system (300) includes a secure user processor (302), a non-secure user processor (306), a cryptographic engine (304), and a shared human/machine interface (HMI) (308). The secure user processor (302) can be comprised of a first trusted microprocessor and a first trusted operating system executing on the first trusted microprocessor. The non-secure user processor (306) can be comprised of a second non-trusted microprocessor and a second non-trusted operating system executing on the second non-trusted microprocessor. A cryptographic engine (304) can be comprised of a third trusted cryptographic processor and a third trusted operating system executing on the third trusted cryptographic processor. The cryptographic engine can be configured for encrypting and decrypting data. A first data communication link (303) communicates data between the secure user processor and the cryptographic engine. A second data communication link (305) communicates data between the cryptographic engine and the non-secure user processor. In this way, the cryptographic engine forms a bridge between the secure user processor and the non-secure user processor. An HMI (308) comprised of trusted hardware for user input and output is time-multiplex-shared among the secure user processor (302), the non-secure user processor (304), and the cryptographic engine (306) in a secure fashion.
摘要:
A method of setting or adjusting a cardiac pacemaker in a patient diagnosed with cardiac asynchrony, which method comprises the steps of: i) implanting cardiac pacing wires into at least the right ventricle and the left ventricle of the heart of the patient, ii) continuously monitoring and recording the cardiac output, nominal stroke volume and/or arterial pressure of the patient on a beat-by-beat basis, iii) continuously monitoring and recording the respiratory cycle of the patient, and iv) adjusting the conduction delay between the electronic impulses to the cardiac pacing wires until a synchronization of respiratory changes with changes in the cardiac output, stroke volume or arterial pressure of the patient is obtained.
摘要:
A secure file service includes a cryptographic processor (302, 602) and a secure file system (301, 601). The cryptographic processor is comprised of a trusted microprocessor and a trusted operating system executing on the trusted cryptographic processor. The cryptographic processor includes hardware and software for accessing at least one classified data file from the secure file system, decrypting the classified data file, and serving the classified data file in decrypted form to a secure user processor (402, 502, 702) that has requested the file. The secure file system can be either a single-level secure file system (301) or a multi-level secure file system (601).
摘要:
A marker sleeve assembly having a length of marker sleeves and a carrier configured such that the length of marker sleeves is oriented parallel to the carrier. The length of marker sleeves is held in a fixed, straight line adjoining the carrier, thereby reducing movement during the printing operation. Additionally, markings may be applied to both the length of marker sleeves and the carrier in a single printing operation.
摘要:
Method for providing a single level secure (SLS) user processor (402, 502) with access to a multi-level secure (MLS) file system (300). The method begins by authenticating a user to a cryptographic processor (302) by communicating one or more types of user authentication information to the cryptographic processor. Based on such authentication, the MLS file system services are provided such that the SLS user processor (402, 502) has access to files (306, 308, 310, 312, 314) at only one defined security classification level at a time. The method also includes zeroizing one or more data stores used by the SLS user processor each time the SLS user processor transitions between accessing classified data files at a first security classification level and a second security classification level.
摘要:
Method for synchronizing stored data in one device (102, 106, 202, 206, 210) with other devices (102, 106, 202, 206, 210) at multiple levels of security classification. The methods and systems disclosed herein can advantageously utilize unique protocols and, optionally, cryptographic technologies to effect data synchronization in a secure manner.
摘要:
Mobile PDA computer system (300) includes a non-secure processor (306), comprising an untrusted microprocessor and an untrusted operating system executing on the untrusted microprocessor. The system also includes a secure processor (302), comprising a trusted microprocessor and a trusted operating system executing on the trusted microprocessor. A cryptographic engine (304) is provided for encrypting and decrypting data. A first data communication link (303) communicates data between the secure processor and the cryptographic engine. A second data communication link (305) communicates data between the non-secure processor and the cryptographic engine. In this way, the cryptographic engine forms a bridge between the secure user processor and the non-secure user processor.