US 12,106,176 B2
True secure airgap
Stav Sapir, Beer Sheva (IL); Naor Radami, Shokeda (IL); Jehuda Shemer, Kfar Saba (IL); and Amihai Savir, Sansana (IL)
Assigned to EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed by EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed on Jul. 19, 2021, as Appl. No. 17/305,968.
Prior Publication US 2023/0012696 A1, Jan. 19, 2023
Int. Cl. G06F 21/57 (2013.01); G06F 21/55 (2013.01); G06F 21/60 (2013.01); G06F 21/64 (2013.01); G06K 7/10 (2006.01); G06K 7/14 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01)
CPC G06K 7/10722 (2013.01) [G06F 21/552 (2013.01); G06F 21/57 (2013.01); G06F 21/602 (2013.01); G06F 21/64 (2013.01); G06K 7/1413 (2013.01); G06K 7/1417 (2013.01); H04L 9/30 (2013.01); H04L 9/3247 (2013.01); G06F 2221/034 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method for securely monitoring an air-gapped machine, the method comprising:
generating a status message representing a state of an air-gapped machine disposed in a secure environment accessible to only authorized users;
converting the status message to a visual code;
encrypting the visual code using an encryption key stored on the air-gapped machine;
displaying the visual code to a display monitor connected to the air-gapped machine, wherein the splay monitor connected to the a ir achine is inside the secure environment;
capturing image data of the visual code at a camera connected to a monitoring machine, wherein the camera is positioned to prevent an attack from occuring in a line of sight between the camera and the display monitor connected to the air-gapped machine; and
transmitting the image data to the monitoring machine, thereby causing the visual code to be accessible by a user of the monitoring machine; and
decrypting the status message included in the visual code using a decryption key stored on the monitoring machine.