US20130339752A1 - Remote circuit locking switch system - Google Patents
Remote circuit locking switch system Download PDFInfo
- Publication number
- US20130339752A1 US20130339752A1 US13/966,097 US201313966097A US2013339752A1 US 20130339752 A1 US20130339752 A1 US 20130339752A1 US 201313966097 A US201313966097 A US 201313966097A US 2013339752 A1 US2013339752 A1 US 2013339752A1
- Authority
- US
- United States
- Prior art keywords
- port
- switch
- optical
- encrypted
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/27—Arrangements for networking
- H04B10/278—Bus-type networks
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- an apparatus comprising: a command receiver comprising an encrypted signal input port and an encrypted data output port and electronic circuitry operatively configured to receive and demodulate an encrypted command signal from the encrypted signal input port and output encrypted data from the encrypted data output port; a decryption sub-assembly comprising an encrypted data input port, electrically connected to the encrypted data output port, and a decrypted data output port and electronic circuitry operatively configured to decrypt encrypted data applied to the encrypted data input port and output decrypted data from the decrypted data output port; an optical switch, interconnected between components of an information processing infrastructure, and comprising an input optical port, an output optical port, and a control signal input port electrically connected to the decrypted data output port, the switch characterized by a first switch state that optically connects the input optical port and the output optical port, the switch further characterized by a second switch state that optically isolates the input optical port from the output optical port, the first switch state and the second switch state selected by application of corresponding control
- a method comprising: operatively interconnecting components of an optical bus interconnected information processing infrastructure with an optical switch; receiving an encrypted command signal; demodulating the encrypted command signal to produce a encrypted data signal; decrypting the encrypted data signal to produce switch control signal; and changing state of the optical switch from a first state to a second state in response to the switch control signal.
- FIG. 1 is a simplified block diagram of an information processing infrastructure comprising a Remote Circuit Locking system.
- FIG. 2 is a simplified block diagram of the major components of the Remote Circuit Locking system.
- FIG. 3 schematically indicates potential alternative locations for the Remote Circuit Locking system switch in a exemplar simplified information processing infrastructure.
- FIG. 4 illustrates a Remote Circuit Locking switch configuration were only a portion of an exemplar information processing infrastructure is to be locked.
- FIG. 5 illustrates a Remote Circuit Locking system where activation requires remote control from more than one remote location.
- FIG. 6 is a simplified schematic of a magneto-optical switch for use in the Remote Circuit Locking system.
- FIGS. 7 a - f is a symbolic portrayal of the phase relationships of a signal propagating through a Remote Circuit Locking switch.
- the Remote Circuit Locking system provides the ability to remotely activate or deactivate an information processing infrastructure. Activation or deactivation is independent of the infrastructures software operating system and is not vulnerable to software based hacking from points throughout the infrastructure network.
- FIG. 1 schematically illustrates a block diagram of an information processing infrastructure 100 comprising a central processing unit 105 , one or more electronic memories 110 . multiple input/output peripheral devices 115 , and an optical bus 120 operatively interconnecting each of component units.
- Optical bus technologies are widely employed to interconnect the infrastructure components.
- the various system components may either be locally or remotely located.
- the central processing unit must be connected to sources of clock, timing, and control waveforms. Interruption of one or more of these infrastructure interconnections, by a switch located in a critical signal path, can prevent operation of all or a portion of the infrastructure.
- the information processing system further comprises a Remote Circuit Locking system 125 that performs a remote activation/deactivation function.
- the Remote Circuit Locking Switch system 200 comprises a command signal receiver 205 , a decryption sub-system 210 , and a locking switch 215 .
- the command receiver 205 receives an encrypted command signal 220 from a remotely located command transmitter (not shown).
- the encryption/decryption algorithms employed are selected to provide adequate security, to protect from the defined threat environment, as is known to those in the field.
- the encrypted command signal 220 may be transmitted via wired or wireless transmission technologies. Suitable wireless technologies are exemplified by radio frequency, optical frequency, and acoustic frequency communications systems.
- the command receiver demodulates the encrypted signal 220 and outputs the demodulated signal 225 to the decryption sub-system 210 .
- the decryption sub-system 210 decodes the demodulated signal 225 and outputs the appropriate control signals 230 to the Remote Locking switch 215 .
- One or more optical switches are placed at one or more locations within the data signal paths comprising the information processing infrastructure.
- Each of the optical switches is characterized by an on-state, where the signal passes through the switch, and an off-state where the signal does not pass.
- FIG. 3 potential placements of the switch 400 on a typical central processing unit 305 , for example, include the data bus input 310 , the data bus output 315 , clock and timing signal input and output 320 .
- a locking switch is located between the central processing unit 305 and the central processing unit clock, timing and control waveform sources 325 .
- the Remote Locking Switch may be configured to control only a portion of the infrastructure.
- FIG. 4 illustrates an exemplary embodiments where selected input/output peripherals 400 are locked by a first additional Remote Locking Switch system 410 while protected memories 420 are locked by a second additional Remote Locking Switch system 430 .
- FIG. 5 schematically portrays a configuration where a first Remote Locking Switch 510 and a second Remote Locking Switch 520 are placed in series at the data bus input 540 to a central processing unit 550 . Operation of the central processing unit 550 in this configuration requires separate activation of each of the two switches 510 , 520 .
- the state of the first switch 510 may be changed by application of a first encrypted command signal 560 .
- the state of the second switch 520 may be changed by application of a second encrypted command signal 570 .
- the properties and encryption of the first and second command signals may be dissimilar.
- the switches 510 , 520 are located so that in the off-state, data signal transmission between the components is interrupted and the operation of the infrastructure is prevented.
- the control signal for each switch 510 , 520 is provided by decryption sub-system 210 .
- a command signal receiver 205 receives encrypted command signals 560 , 570 which may originate at a remote location.
- the command signals may be transmitted from the remote location using wired or wireless technologies. Examples of such technologies comprise electrical and optical cables, radio frequency wireless, and free space acoustic and optical.
- the encrypted command signals 560 , 570 , received by the command receiver 205 are demodulated and fed to the decryption sub-system 210 where they are decoded and converted into the control signals 230 that control the corresponding switch 215 .
- an embodiment of an optical switch 600 comprises an polarization beam splitter 605 , a first phase shifter 610 and, optionally, a second phase shifter 615 , and a polarization beam combiner 620 .
- the polarization beam splitter 605 divides the input signal, which is applied to the input port 625 , into two approximately equal magnitude output signals having orthogonal polarizations at the two output ports 630 , 635 . At least one of the splitter output ports is connected to a phase shifter 610 .
- Each phase shifter 610 , 615 may be implemented as a Faraday rotator.
- Each phase shifter 610 , 615 advances or retards the phase of the applied signal in accordance with a control signal 640 , 645 .
- the output ports 650 , 655 of the phase shifters 610 , 615 are individually connected to each of the respective input ports 660 . 665 of the polarization beam combiner 620 .
- the output port of the polarization beam splitter 635 is directly connected to the input port of the polarization beam combiner 665 .
- the signals applied to the input ports of the polarization beam combiner are vectorally summed and output from the combiner output port 670 .
- FIG. 7 schematically illustrates the relationship between the data signal components at various points of the switch.
- a linear vector is employed to represent the phase of the polarization of the signal.
- the vector 700 representing the input signal is portrayed at an angle of zero degrees relative to the x-axis of a Cartesian coordinate system in FIG. 7 a .
- the two polarization beam splitter output signals 705 , 710 as shown in FIG. 7 b , are half the magnitude of the input vector 700 and are orthogonal with respect to one another.
- the Cartesian coordinate reference system of FIG. 7 b and that of FIG. 7 a may be arbitrarily rotated with respect to each other as long as the angular relationship between the vector components is correct.
- FIG. 7 schematically illustrates the relationship between the data signal components at various points of the switch.
- FIG. 7 schematically illustrates the relationship between the data signal components at various points of the switch.
- a linear vector is employed to represent the phase of the polarization of the signal.
- FIG. 7 c portrays a first condition where the first and second phase shifters 610 , 615 are set to advance the relative phase between the two vector components 705 , 710 by ninety degrees.
- the vector components 705 , 710 are now in-phase.
- FIG. 7 d portrays a second condition wherein the phase shifters are set to retard the relative phase between the two vector components 705 , 710 by ninety degrees.
- the vector components 705 , 710 are now in opposite phase.
- FIG. 7 e portrays the output of the polarization beam combiner 620 in response to inputs from the two phase shifters under the advance ninety degree relative phase shift (first condition). The input signal, for this condition, appears at the combiner output port 670 .
- phase shifters meeting the performance requirements of the remote circuit locking switch may be implemented using a material the imparts Faraday rotation of polarized light as it passes through a magneto-optical material in the direction of an applied magnetic field.
- Bismuth-substituted iron garnet and/or orthoferrites are suitable Faraday rotation materials.
- Electro-magnetic coils surrounding the Faraday rotation material provide the required magnetic field, in response to an applied electrical control signal.
- the control signal may be derived from the output of the decryption sub-system.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Optical Modulation, Optical Deflection, Nonlinear Optics, Optical Demodulation, Optical Logic Elements (AREA)
- Optical Communication System (AREA)
- Selective Calling Equipment (AREA)
Abstract
A method and apparatus for remotely controlling access to the components of an optically interconnected information processing infrastructure is presented. Access to the infrastructure is controlled independently of the infrastructure operating system.
Description
- This non-provisional patent application claims the benefit of U.S. Provisional Patent Application Ser. No. 61/166,460, filed Apr. 3, 2009, the entire disclosure of which is incorporated by reference in its entirety herein.
- The high data rate demands of modern information processing infrastructure have led to the use of optical data transmission technology for the interconnection of infrastructure components. As the threat to information processing infrastructures continues to increase, the requirements for security become more demanding. Computer systems, communications systems and traffic control systems, all of which are computer processor based, are examples of highly autonomous information processing infrastructures that require the highest level of protection from unauthorized access. In each of these systems, the various components of the infrastructure are accessed by one or more data communications networks. Typically, access control for these systems is provided by internally implemented security software operating integrally within the network. The weakness of such an approach is that the security system is vulnerable to attack from anywhere within the data communications network. There is a requirement for a security system that is not accessible from within the data communications network.
- In embodiments there is provided an apparatus comprising: a command receiver comprising an encrypted signal input port and an encrypted data output port and electronic circuitry operatively configured to receive and demodulate an encrypted command signal from the encrypted signal input port and output encrypted data from the encrypted data output port; a decryption sub-assembly comprising an encrypted data input port, electrically connected to the encrypted data output port, and a decrypted data output port and electronic circuitry operatively configured to decrypt encrypted data applied to the encrypted data input port and output decrypted data from the decrypted data output port; an optical switch, interconnected between components of an information processing infrastructure, and comprising an input optical port, an output optical port, and a control signal input port electrically connected to the decrypted data output port, the switch characterized by a first switch state that optically connects the input optical port and the output optical port, the switch further characterized by a second switch state that optically isolates the input optical port from the output optical port, the first switch state and the second switch state selected by application of corresponding control signal to the control signal input port. The optical switch may comprises a polarization beam splitter, at least one Faraday polarization rotator, and a polarization beam combiner.
- In further embodiments there is provided a method comprising: operatively interconnecting components of an optical bus interconnected information processing infrastructure with an optical switch; receiving an encrypted command signal; demodulating the encrypted command signal to produce a encrypted data signal; decrypting the encrypted data signal to produce switch control signal; and changing state of the optical switch from a first state to a second state in response to the switch control signal.
- The accompanying figures incorporated in and forming a part of the specification illustrate several aspects of embodiments of the invention and. together with the description, serve to explain the embodiments. In the drawings:
-
FIG. 1 is a simplified block diagram of an information processing infrastructure comprising a Remote Circuit Locking system. -
FIG. 2 is a simplified block diagram of the major components of the Remote Circuit Locking system. -
FIG. 3 schematically indicates potential alternative locations for the Remote Circuit Locking system switch in a exemplar simplified information processing infrastructure. -
FIG. 4 illustrates a Remote Circuit Locking switch configuration were only a portion of an exemplar information processing infrastructure is to be locked. -
FIG. 5 illustrates a Remote Circuit Locking system where activation requires remote control from more than one remote location. -
FIG. 6 is a simplified schematic of a magneto-optical switch for use in the Remote Circuit Locking system. -
FIGS. 7 a-f is a symbolic portrayal of the phase relationships of a signal propagating through a Remote Circuit Locking switch. - The Remote Circuit Locking system provides the ability to remotely activate or deactivate an information processing infrastructure. Activation or deactivation is independent of the infrastructures software operating system and is not vulnerable to software based hacking from points throughout the infrastructure network.
- In an embodiment, a system and method is described which provides the capability of remotely controlling operation of a central processing unit or other component(s) of an information processing infrastructure.
FIG. 1 schematically illustrates a block diagram of aninformation processing infrastructure 100 comprising acentral processing unit 105, one or moreelectronic memories 110. multiple input/outputperipheral devices 115, and anoptical bus 120 operatively interconnecting each of component units. Optical bus technologies are widely employed to interconnect the infrastructure components. The various system components may either be locally or remotely located. in addition to the interconnection with the memories and peripheral devices, the central processing unit must be connected to sources of clock, timing, and control waveforms. Interruption of one or more of these infrastructure interconnections, by a switch located in a critical signal path, can prevent operation of all or a portion of the infrastructure. - The information processing system, portrayed in
FIG. 1 , further comprises a RemoteCircuit Locking system 125 that performs a remote activation/deactivation function. As shown inFIG. 2 , the Remote CircuitLocking Switch system 200 comprises acommand signal receiver 205, adecryption sub-system 210, and alocking switch 215. Thecommand receiver 205 receives anencrypted command signal 220 from a remotely located command transmitter (not shown). The encryption/decryption algorithms employed are selected to provide adequate security, to protect from the defined threat environment, as is known to those in the field. The encryptedcommand signal 220 may be transmitted via wired or wireless transmission technologies. Suitable wireless technologies are exemplified by radio frequency, optical frequency, and acoustic frequency communications systems. Suitable wired technologies are exemplified by conductive cable, waveguide and optical fiber communications systems. The command receiver demodulates theencrypted signal 220 and outputs the demodulatedsignal 225 to thedecryption sub-system 210. Thedecryption sub-system 210 decodes the demodulatedsignal 225 and outputs theappropriate control signals 230 to theRemote Locking switch 215. - One or more optical switches are placed at one or more locations within the data signal paths comprising the information processing infrastructure. Each of the optical switches is characterized by an on-state, where the signal passes through the switch, and an off-state where the signal does not pass.
- As schematically shown in
FIG. 3 , potential placements of theswitch 400 on a typicalcentral processing unit 305, for example, include thedata bus input 310, thedata bus output 315, clock and timing signal input andoutput 320. In this embodiment, a locking switch is located between thecentral processing unit 305 and the central processing unit clock, timing andcontrol waveform sources 325. In some applications, rather than activating or deactivating the whole infrastructure, the Remote Locking Switch may be configured to control only a portion of the infrastructure.FIG. 4 illustrates an exemplary embodiments where selected input/output peripherals 400 are locked by a first additional RemoteLocking Switch system 410 while protectedmemories 420 are locked by a second additional RemoteLocking Switch system 430. - In another embodiment, activation/deactivation of all or a portion of the infrastructure can require remote control from more than a single remote controller.
FIG. 5 schematically portrays a configuration where a firstRemote Locking Switch 510 and a second Remote Locking Switch 520 are placed in series at thedata bus input 540 to acentral processing unit 550. Operation of thecentral processing unit 550 in this configuration requires separate activation of each of the twoswitches first switch 510 may be changed by application of a firstencrypted command signal 560. The state of thesecond switch 520 may be changed by application of a secondencrypted command signal 570. The properties and encryption of the first and second command signals may be dissimilar. Theswitches - The control signal for each
switch decryption sub-system 210. Acommand signal receiver 205 receivesencrypted command signals encrypted command signals command receiver 205 are demodulated and fed to thedecryption sub-system 210 where they are decoded and converted into thecontrol signals 230 that control thecorresponding switch 215. - As shown in
FIG. 6 , an embodiment of anoptical switch 600 comprises anpolarization beam splitter 605, afirst phase shifter 610 and, optionally, asecond phase shifter 615, and a polarization beam combiner 620. Thepolarization beam splitter 605 divides the input signal, which is applied to theinput port 625, into two approximately equal magnitude output signals having orthogonal polarizations at the twooutput ports phase shifter 610. Eachphase shifter phase shifter control signal output ports phase shifters respective input ports 660. 665 of thepolarization beam combiner 620. For switch architectures employing a single phase shifter, the output port of thepolarization beam splitter 635 is directly connected to the input port of thepolarization beam combiner 665. The signals applied to the input ports of the polarization beam combiner are vectorally summed and output from thecombiner output port 670. -
FIG. 7 schematically illustrates the relationship between the data signal components at various points of the switch. In each illustration a linear vector is employed to represent the phase of the polarization of the signal. Thevector 700 representing the input signal is portrayed at an angle of zero degrees relative to the x-axis of a Cartesian coordinate system inFIG. 7 a. The two polarization beam splitter output signals 705, 710, as shown inFIG. 7 b, are half the magnitude of theinput vector 700 and are orthogonal with respect to one another. The Cartesian coordinate reference system ofFIG. 7 b and that ofFIG. 7 a may be arbitrarily rotated with respect to each other as long as the angular relationship between the vector components is correct.FIG. 7 c portrays a first condition where the first andsecond phase shifters vector components vector components FIG. 7 d portrays a second condition wherein the phase shifters are set to retard the relative phase between the twovector components vector components FIG. 7 e portrays the output of thepolarization beam combiner 620 in response to inputs from the two phase shifters under the advance ninety degree relative phase shift (first condition). The input signal, for this condition, appears at thecombiner output port 670.FIG. 7 f portrays thecombiner output 620 for the retard ninety degree relative phase shift (second condition). The vector components cancel each other resulting in zero output at thecombiner output port 670. The switch thus provides signal transmission or interruption depending on the settings of the phase shifters. - In an embodiment, phase shifters meeting the performance requirements of the remote circuit locking switch may be implemented using a material the imparts Faraday rotation of polarized light as it passes through a magneto-optical material in the direction of an applied magnetic field. Bismuth-substituted iron garnet and/or orthoferrites are suitable Faraday rotation materials. Electro-magnetic coils surrounding the Faraday rotation material provide the required magnetic field, in response to an applied electrical control signal. The control signal may be derived from the output of the decryption sub-system.
- An optical switch suitable for use in this application is described in the literature. (Magnetically Controlled Switches for Optoelectronics Networking: The Problem, Available Technology, New Implementations; Jin-Wei Tioh, Mani Mina, Robert J. Weber; IEEE Transactions on Magnetics, June 2007, Vol 43, No. 6, pp 2698 - 2700).
- While the invention has been described with respect to preferred embodiments, those skilled in the art will readily appreciate that various changes and/or modifications can be made to the invention without departing from the spirit or scope of the invention as defined by the appended claims. All documents cited herein are incorporated by reference herein where appropriate for teachings of additional or alternative details, features, and/or technical background.
Claims (3)
1. An apparatus comprising:
a command receiver comprising an encrypted signal input port and an encrypted data output port and electronic circuitry operatively configured to receive and demodulate an encrypted command signal from said encrypted signal input port and output encrypted data from said encrypted data output port;
a decryption sub-assembly comprising an encrypted data input port, electrically connected to said encrypted data output port. and a decrypted data output port and electronic circuitry operatively configured to decrypt encrypted data applied to said encrypted data input port and output decrypted data from said decrypted data output port;
an optical switch, interconnected between components of an information processing infrastructure, and comprising an input optical port, an output optical port, and a control signal input port electrically connected to said decrypted data output port, said switch characterized by a first switch state that optically connects said input optical port and said output optical port, said switch further characterized by a second switch state that optically isolates said input optical port from said output optical port, said first switch state and said second switch state selected by application of corresponding control signal to said control signal input port.
2. An apparatus in accordance with claim 1 wherein said optical switch comprises a polarization beam splitter, at least one Faraday polarization rotator, and a polarization beam combiner.
3. A method comprising:
operatively interconnecting components of an optical bus interconnected information processing infrastructure with an optical switch;
receiving an encrypted command signal;
demodulating said encrypted command signal to produce a encrypted data signal;
decrypting said encrypted data signal to produce switch control signal;
changing state of said optical switch from a first state to a second state in response to said switch control signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/966,097 US20130339752A1 (en) | 2009-04-03 | 2013-08-13 | Remote circuit locking switch system |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16646009P | 2009-04-03 | 2009-04-03 | |
US12/753,249 US8509436B2 (en) | 2009-04-03 | 2010-04-02 | Remote circuit locking switch system |
US13/966,097 US20130339752A1 (en) | 2009-04-03 | 2013-08-13 | Remote circuit locking switch system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/753,249 Continuation US8509436B2 (en) | 2009-04-03 | 2010-04-02 | Remote circuit locking switch system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130339752A1 true US20130339752A1 (en) | 2013-12-19 |
Family
ID=42826196
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/753,249 Expired - Fee Related US8509436B2 (en) | 2009-04-03 | 2010-04-02 | Remote circuit locking switch system |
US13/966,097 Abandoned US20130339752A1 (en) | 2009-04-03 | 2013-08-13 | Remote circuit locking switch system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/753,249 Expired - Fee Related US8509436B2 (en) | 2009-04-03 | 2010-04-02 | Remote circuit locking switch system |
Country Status (2)
Country | Link |
---|---|
US (2) | US8509436B2 (en) |
WO (1) | WO2010115071A2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021146382A1 (en) * | 2020-01-16 | 2021-07-22 | Lightmatter, Inc. | Pin sharing for photonic processors |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7555177B1 (en) * | 2006-04-12 | 2009-06-30 | Iowa State University Research Foundation, Inc. | All fiber magneto-optic on-off switch for networking applications |
US7787678B2 (en) * | 2005-10-07 | 2010-08-31 | Siemens Corporation | Devices, systems, and methods for processing images |
US7940685B1 (en) * | 2005-11-16 | 2011-05-10 | At&T Intellectual Property Ii, Lp | Method and apparatus for monitoring a network |
US8019449B2 (en) * | 2003-11-03 | 2011-09-13 | At&T Intellectual Property Ii, Lp | Systems, methods, and devices for processing audio signals |
US8027473B2 (en) * | 2003-01-13 | 2011-09-27 | Conexant Systems, Inc. | System and method for improved data protection in PONs |
US8228818B2 (en) * | 2005-06-24 | 2012-07-24 | At&T Intellectual Property Ii, Lp | Systems, methods, and devices for monitoring networks |
US8346960B2 (en) * | 2005-02-15 | 2013-01-01 | At&T Intellectual Property Ii, L.P. | Systems, methods, and devices for defending a network |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5321774A (en) * | 1993-07-30 | 1994-06-14 | National Research Council Of Canada | Polarization independent transmissive/reflective optical switch |
US5712915A (en) * | 1995-06-07 | 1998-01-27 | Comsat Corporation | Encrypted digital circuit multiplication system |
US6202153B1 (en) * | 1996-11-22 | 2001-03-13 | Voltaire Advanced Data Security Ltd. | Security switching device |
US6594068B2 (en) * | 2000-07-05 | 2003-07-15 | Zhifeng Sui | High switching speed digital faraday rotator device and optical switches containing the same |
US6973576B2 (en) * | 2000-12-27 | 2005-12-06 | Margent Development, Llc | Digital content security system |
US6834146B2 (en) * | 2002-01-03 | 2004-12-21 | The Boeing Company | Differential phase shift keyed demodulator system |
KR100853233B1 (en) * | 2002-01-17 | 2008-08-20 | 김영호 | Information security device and encryption device using optical switch |
US20040086118A1 (en) * | 2002-10-31 | 2004-05-06 | Sweetser John N. | Encrypting and decrypting optical communications with matched encoders and decoders |
WO2006071971A2 (en) * | 2004-12-23 | 2006-07-06 | Massachusetts Institute Of Technology | Reconfigurable polarization independent interferometers and methods of stabilization |
US20070139213A1 (en) * | 2005-12-20 | 2007-06-21 | Akers Thomas W | Remote activated kill switch system |
JP2007288694A (en) * | 2006-04-19 | 2007-11-01 | Nec Corp | Secret communication system and channel control method |
US7583803B2 (en) * | 2006-07-28 | 2009-09-01 | Magiq Technologies, Inc. | QKD stations with fast optical switches and QKD systems using same |
JP4838166B2 (en) * | 2007-02-19 | 2011-12-14 | ソニー株式会社 | Quantum cryptographic communication device and communication terminal |
JP5288087B2 (en) * | 2007-06-11 | 2013-09-11 | 日本電気株式会社 | Encryption key management method and apparatus in a secret communication network |
US8164170B2 (en) * | 2007-11-21 | 2012-04-24 | Frampton E. Ellis | Devices with faraday cages and internal flexibility sipes |
US8279901B2 (en) * | 2010-02-24 | 2012-10-02 | Alcon Lensx, Inc. | High power femtosecond laser with adjustable repetition rate and simplified structure |
-
2010
- 2010-04-02 WO PCT/US2010/029735 patent/WO2010115071A2/en active Application Filing
- 2010-04-02 US US12/753,249 patent/US8509436B2/en not_active Expired - Fee Related
-
2013
- 2013-08-13 US US13/966,097 patent/US20130339752A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8027473B2 (en) * | 2003-01-13 | 2011-09-27 | Conexant Systems, Inc. | System and method for improved data protection in PONs |
US8019449B2 (en) * | 2003-11-03 | 2011-09-13 | At&T Intellectual Property Ii, Lp | Systems, methods, and devices for processing audio signals |
US8346960B2 (en) * | 2005-02-15 | 2013-01-01 | At&T Intellectual Property Ii, L.P. | Systems, methods, and devices for defending a network |
US8228818B2 (en) * | 2005-06-24 | 2012-07-24 | At&T Intellectual Property Ii, Lp | Systems, methods, and devices for monitoring networks |
US7787678B2 (en) * | 2005-10-07 | 2010-08-31 | Siemens Corporation | Devices, systems, and methods for processing images |
US7940685B1 (en) * | 2005-11-16 | 2011-05-10 | At&T Intellectual Property Ii, Lp | Method and apparatus for monitoring a network |
US7555177B1 (en) * | 2006-04-12 | 2009-06-30 | Iowa State University Research Foundation, Inc. | All fiber magneto-optic on-off switch for networking applications |
Also Published As
Publication number | Publication date |
---|---|
WO2010115071A2 (en) | 2010-10-07 |
US20100254535A1 (en) | 2010-10-07 |
WO2010115071A3 (en) | 2011-01-13 |
US8509436B2 (en) | 2013-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101370829B1 (en) | Method of encrypting and decrypting data, and Bus System using the same | |
CN102447557A (en) | Quantum encryption communication apparatus, quantum encryption communication method, and quantum encryption communication system | |
KR20010011667A (en) | Keyboard having secure function and system using the same | |
US9306294B2 (en) | Smart antenna | |
GEP20032936B (en) | Mechanism For Matching a Receiver With a Security Module and System for its Performance | |
US11411719B2 (en) | Security system and method thereof using both KMS and HSM | |
US20100027790A1 (en) | Methods for authenticating a hardware device and providing a secure channel to deliver data | |
US7720226B2 (en) | Private and secure optical communication system using an optical tapped delay line | |
US8509436B2 (en) | Remote circuit locking switch system | |
WO2006135722A2 (en) | Apparatus and method for all-optical encryption and decryption of an optical signal | |
WO2014098901A1 (en) | Active component embedded in cable | |
KR100480998B1 (en) | Security apparatus and method for digital hardware system | |
US6999655B2 (en) | Optical communication system and optical communication method having confidentiality | |
US8577035B2 (en) | Electronic circuit for securing data interchanges between a computer station and a network | |
Kavya et al. | Vulnerability analysis and security system for NFC-enabled mobile phones | |
US20140254800A1 (en) | High-Security Outdoor Wireless Communications Bridge | |
Ramaccia et al. | Spatio-temporal modulated Doppler cloak for antenna matching at relativistic velocity | |
KR101375670B1 (en) | Method of encrypting and decrypting data, and Bus System using the same | |
EP2077651B1 (en) | Method and apparatus for encrypted authentication | |
CN117955728B (en) | Single block chain system and block chain data transmission method for different networks | |
US11657169B2 (en) | Pin-level encryption for electrical systems | |
KR20050033780A (en) | Active shield removal detector improving core chip preservation and method thereof | |
CN218850785U (en) | Network data isolation encryption system | |
KR102653869B1 (en) | Method for secure communication and recoding medium storing program to implement the method | |
JP2001094536A (en) | System and device for data transmission and reception |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |