Multi-level secure computer with token-based access control

作者: Terence T. Flyntz

DOI:

关键词:

摘要: A multilevel computer security system including a with multiple subsystems for secure data storage and communications at each level, smart-card reader controlling user access to an electronically-activated switch activating only the selected authorized mechanically-activated that detects availability of level selected. The will automatically power-up first activate subsystem which is allocated processing restricted data. Access requires insert-his smart card into verify identity through entered PIN or from stored biometrics allow those levels as in card. selection generates activation signal, permitted assets electronically activated connects power removes all other subsystems. If required not available within sense this condition default level. Since one ever active switching one-level another RAM be powered off there can no possibility unauthorized

参考文章(15)
Richard E. Rieck, Gerald E. Tayler, Arthur H. Nolta, Terrell N. Truan, John S. Williams, John H. Christian, David G. Reed, Methods and apparatus for resetting peripheral devices addressable as a plurality of logical devices ,(1981)
James M. Holden, David W. Snow, Edwin H. Wrench, Stephen E. Levin, Mixed enclave operation in a computer network with multi-level network security ,(1996)
Gideon Intrater, James Scott Johnson, Tim Short, Memory management circuit which provides simulated privilege levels ,(1995)
Danny M. Nessett, William Paul Sherer, Multilayer firewall system ,(1998)
William E. Boebert, Thomas R. Markham, Mark H. Hanson, Trusted path subsystem for workstations ,(1993)
Frank Huggins, Aurelio Azpiazu, Single computer system having multiple security levels ,(1996)
James B. Edson, Patrick G. Monroe, Security system with multiple levels of access ,(1983)