US 11,750,571 B2
Multi-independent level secure (MILS) storage encryption
Richard J. Takahashi, Layton, UT (US)
Assigned to SECTURION SYSTEMS, INC., Centerville, UT (US)
Filed by SECTURION SYSTEMS, INC., Centerville, UT (US)
Filed on Jun. 1, 2020, as Appl. No. 16/889,365.
Application 16/889,365 is a continuation of application No. 15/332,059, filed on Oct. 24, 2016, granted, now 10,708,236.
Claims priority of provisional application 62/246,299, filed on Oct. 26, 2015.
Prior Publication US 2021/0119979 A1, Apr. 22, 2021
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01); H04L 9/08 (2006.01); H04L 45/00 (2022.01); H04L 9/14 (2006.01); H04L 69/22 (2022.01)
CPC H04L 63/0428 (2013.01) [H04L 9/0819 (2013.01); H04L 9/0894 (2013.01); H04L 9/14 (2013.01); H04L 45/00 (2013.01); H04L 63/0227 (2013.01); H04L 63/105 (2013.01); H04L 69/22 (2013.01); H04L 63/126 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, by a first computing device on a first port of a plurality of ports, a data packet, wherein each of the ports corresponds to one of a plurality of security classes including a first security class that corresponds to the first port, and the first computing device comprises a plurality of cryptographic modules each dedicated to one of the plurality of security classes;
routing, based on at least one header, the data packet to a first cryptographic module of the plurality of cryptographic modules of the first computing device, the first cryptographic module of the first computing device being dedicated to the first security class;
encrypting the data packet using the first cryptographic module;
tagging the data packet using tagging data that identifies the first security class and the first port;
outputting the encrypted data packet to a first data storage;
transmitting the encrypted data packet from the first data storage to a second data storage;
receiving, by a second computing device, the encrypted data packet from the second data storage, wherein the second computing device comprises a plurality of cryptographic modules each dedicated to one of the plurality of security classes;
selecting, based on the tagging data, one of the plurality of cryptographic modules of the second computing device; and
decrypting, using the selected cryptographic module of the second computing device, the data packet.