Apparatus and Method for Blocking Malicious Code Embedded in Digital Data
20230229768 ยท 2023-07-20
Inventors
Cpc classification
International classification
Abstract
The present invention is a device, system, and method for improving network security using pictorial communication and in preferred embodiments optical character recognition for the communication of digital information so as to block malicious code embedded in digital data. More specifically, the present invention in preferred embodiments receives a digital data stream from an open network; identifies and extracts desired digital content from the digital data stream; deletes all remaining digital data; displays the extracted digital content as an pictorial image containing alphanumeric or other characters on one side of an analog air gap; captures the pictorial image on the opposite side of the air gap in a closed network; converts the pictorial image to a digital image file; uses optical character recognition algorithms to recognize and convert the pictorial image into a clean digital content file; and stores a copy of the clean digital content file in the closed network.
Claims
1. A method for one way data communication of information from an open network to a closed network across an air gap, the method comprising the steps of: providing from a digital data stream from a source network to a digital filter located in the open network; recognition and extraction of digital content embedded in said digital data stream; deletion of the remaining digital data stream; conversion of the digital content into pictorial character images; display of the pictorial character images on the open network side of an air gap barrier; capture of the pictorial character images by an image sensing device located on a closed network side of the air gap barrier; conversion of the captured pictorial character images to a digital image file; and conversion of the digital image file to a digital clean content file utilizing optical character recognition algorithms.
2. The method of claim 1 wherein the digital filter includes digital filtering, data dictionary, pattern matching, artificial intelligence, and machine learning to recognize and extract the digital content from the digital data stream.
3. The method of claim 2, including the further step of conversion of the extracted digital content into pictorial characters.
4. The method of claim 3, including the further step of parsing the pictorial characters to identify and mark for manual review or automatic deletion strings of characters which may represent obfuscated malicious code.
5. The method of claim 4, including the further step of insertion and/or deletion of characters so as to render the string of characters incapable of encoding malicious code.
6. The method of claim 5, including the further step of formatting and adjusting the resolution of the characters to optimize recognition by the character recognition algorithms.
7. The method of claim 3, including the further step of displaying the digital content on the sending side of an air gap as a pictorial character image.
8. The method of claim 5, including the further step of capturing the pictorial character image on the receiving side of an air gap.
9. The method of claim 8, including the further step of conversion of the analog pictorial image to a digital image file.
10. The method of claim 9, including the further step of parsing the digital image file to remove and/or minimize aliasing and other anomalous digital artifacts and improve the resolution of the pictorial characters in the digital image file.
11. The method of claim 9, including the further step of parsing the digital image file utilizing optical character recognition algorithms to convert the pictorial character images into a digital content file.
12. The method of claim 11, including the further step of adding an index and other utility digital code into the digital content file to facilitate storage, retrieval, security, encryption, and other similar file properties.
13. The method of claim 12, including the further step of saving said digital content file in archival storage on read only media.
14. A data communication device for one way data transmission of information from an open network to a closed network across and air gap, the device comprising: a digital processor in at least one control device capable of receiving a digital data stream from the open network; at least one device capable of recognition and extraction of digital content embedded in the data stream; at least one device capable of conversion of the digital content into pictorial character images; at least one device capable of display of the pictorial character images on the open network side of an air gap barrier; at least one device capable of capture of the pictorial character images in a dedicated receiving device on the closed network side of the air gap barrier; and at least one device capable of conversion of the captured pictorial character images into a digital content file; and at least one device capable of storage of the digital content file in the closed network.
15. The devices of claim 14, further comprising one or more devices to encrypt, store, and retrieve copies of read only archived clean digital content files from the closed network.
16. The device of claim 14, further comprising a second capture device in the closed network used to record and store an unprocessed pictorial image of content in the source digital data stream which is not suited to conversion into characters.
17. The device of claim 16, further comprising a digital processor device which alters the pictorial image of the content not suited to conversion into characters to eliminate any malicious code vectors in the image while preserving the digital content in the image.
18. The device of claim 14, further comprising a second display, airgap, and capture device in the open network used to recognize the format of the digital information in the source digital data stream and encode the format using extended markup language, which is then transmitted as pictorial characters displayed on the open network and captured on the closed network.
19. The devices of claim 18, further comprising a defined digital device to utilize copies of the clean digital content files, the encoded format, and the pictorial image to reconstruct the content, format, and layout of information in the source digital data stream.
20. The devices of claim 14, further comprising one or more database servers from which authorized users can retrieve copies of archived clean digital content.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
DETAILED DESCRIPTION OF THE INVENTION
[0052] Referring initially to
[0053] Referring to
[0054] The digital content is converted into a pictorial character image consisting of alphanumeric characters and/or defined characters utilizing a dedicated digital processor in display driver device 15 programmed to execute digital conversion and display device driver algorithms. The pictorial character image is displayed on a display device 20, for example a computer monitor.
[0055] The display device 20 is attached to the external wall of the data preparation area 70 facing an image sensor device 30. The pictorial image of characters displayed on the sending display device 20 is communicated in a one way direction across the analog air gap 80 and captured on the image sensor device 30 which is located on the opposite side of the analog air gap. The dedicated image sensor device 30 consists of one or more optical lenses, one or more image sensors, and one or more dedicated digital processors (similar to a lens, image sensor, and digital processor in a digital photographic camera) configured and programmed to capture and convert the pictorial image on display device 20 into a digital image file 33, for example a portable network graphics (.png) file, for further processing in the digital conversion device 35. The dedicated digital processor in the image sensor device 30 may also be programmed to remove unintended and unwanted digital artifacts from the pictorial image, for example aliasing resulting from the capture of the displayed pictorial image.
[0056] The analog air gap 80 is enclosed in a protective barrier or sheath 85, designed to meet the same or higher security standards as the secure digital data facility 90 to prevent interception of information crossing the analog air gap or injection of malicious code between the display device 20 and image sensor device 30. The protective barrier 85 surrounding the analog air gap 80 is affixed to the outer wall of the data preparation area 70 and the outer wall of the secure protected data facility 90, and acts as a sheath enclosing the analog air gap 80 to isolate and protect both the display device 20, the one way communication path, and the image sensor device 30 from cyberthreats.
[0057] The dedicated image sensor device 30 is located within a secure protected data facility 90 which isolates and protects both the image sensor device and other devices inside the protected data facility 90 from cyberthreats. The image sensor device 30 captures the image through a protected opening in the outer wall of the secure data facility 90 which maintains the integrity and security of the secure data facility. The secure data facility may be designed to meet various levels of security standards up to or exceeding the security requirements of the United States Department of Defense for certification as a Sensitive Compartmented Information Facility (as prescribed in Intelligence Community Directive 705, 705-1, 705-2, and successor regulations).
[0058] The pictorial character images encoded in the digital image file 33 are processed by the dedicated digital processor in the digital conversion device 35 which is programmed to execute optical character recognition algorithms to convert the pictorial character images in the digital image file 33 into digital data in the clean content file 39.
[0059] The digital content contained in the clean content files 39 is an accurate unformatted copy of the information extracted from the digital content 9 in the source data 5 and is archived as a permanent reference copy in the closed network storage device 40 located within the secure protected digital data facility 90. The archival reference copy is recorded on encrypted write once read many (WORM) times magnetic tapes, optical discs, holographic media, and/or other storage media restricted to the one time recording and multiple reading of the digital data. At the request of an authorized individual or entity or entity a copy of the archival reference copy may be generated and transmitted across the digital air gap 50 to the requesting party through the destination network 55, however the reference copy is never altered or removed from the protected data facility 90.
[0060] In some embodiments of the present invention, to reduce aliasing frame rates may be chosen that are approximately the same for both display device 20 and image capture sensor device 30 and/or a sufficient delay between communication of images may be employed so that multiple display refresh and image sensor capture cycles may be recorded for each displayed pictorial image, with the digital processor within the image sensor device 30 and/or the digital conversion device 35 selecting the image containing the least number of unwanted digital artifacts and/or combining images to generate a composite image having the least number of unwanted digital artifacts. To increase throughput, continuous display and capture of multiple frames containing pictorial images (similar to stop motion photography) may be employed with the frames having the least number of unwanted digital artifacts selected by the image sensor device 30 and/or the digital conversion device 35 for further processing.
[0061] The digital conversion device 35 may add index and other digital code to the digital character strings which is useful in the storage, maintenance, and retrieval of the digital content, for example unique index values may be added identifying the open network source of the digital content.
[0062] The flow of all digital data received from open source networks 5, processed by the present invention, and sent to designation networks 55 outside the secure data facility is one way, unidirectional. In some embodiments of the present invention, a request for a copy of a clean content file 39 stored within the closed network storage device 40 is transmitted into the secure data facility 90 utilizing the same and/or similar one way apparatus and methods used to transmit pictorial character digital content into the secure protected data facility 90. The alphanumeric index value of the requested archived reference copy may be displayed on the display device 20, captured by the digital image sensor 30, and programmatically recognized by the digital conversion device 35 utilizing optical character recognition algorithms as a request to retrieve a copy of clean digital content with the matching alphanumeric index. A copy of the archival reference copy 49 of the clean content file 39 is retrieved from the closed network storage device 40 and sent across a unidirectional digital air gap 50 utilizing one way digital diodes 51 and 52 and/or similar devices to the authorized requesting party in the destination network 55. The methods and devices utilized to process a request for a copy of the stored clean content file enforce one way transmission of clean content and do not allow the transmission of digital data into the secure data facility 90.
[0063] Digital data diodes 51 and 52 and/or similar devices enforce one way data flow and are used as the only method of transmission of information from inside the secure protected data facility 90 across an out bound digital air gap to the destination network 55 outside the facility. To maintain unidirectional data flow, transmission of data is accomplished utilizing devices and methods which do not require bidirectional exchange of timing or other digital information. For example, but without limitation, digital diodes 51 and 52 (and as described in other embodiments digital diodes 53 and 54) are designed to transmit unidirectional data flow by operating in a standby mode, with the receiving diode 52 waking on detection of output from the sending diode 51. Timing may be synchronized by the digital diode receiving unit 52 monitoring a one way signal (such as activation of a red light) from the digital diode sending unit 51 which is not capable of transmitting digital data. There is no transmission of data or other digital signals from a digital diode and/or other device outside the secure data facility 90 (and as described in other embodiments the secure data area 91) to a digital diode and/or other device inside the secure protected data facility 90.
[0064] In some embodiments of the present invention, the digital processors and sensors utilized in devices 10, 15, 30, and 35 may be physically and/or programmatically restricted to the recognition and processing of pictorial character sets selected for communication of digital content, and rendered incapable of any other recognition and processing. For example, but without limitation, the digital content may be processed by the display driver device 15 capable of displaying the selected pictorial character set on a monitor or other similar display device 20 and rendered physically or programmatically incapable of displaying other information. This may be accomplished by the digital processor in the display driver device 15 being programmed to activate only those pixels necessary to display the selected pictorial character set and to reject the activation of any other display pixels, and/or the display pixels may be physically disabled in the display device 20 circuitry and/or the physical components of the display device. For further example, specific pixels in an LED/LCD monitor may be physically rendered incapable of activation and display.
[0065] In some embodiments of the present invention, optical character recognition algorithms utilized in the digital conversion device 35 may include artificial intelligence and machine learning methods to improve the accuracy of the capture; recognize and correct data bytes having values outside the range of the selected set of characters; warn of the possible use of steganography to obfuscate malicious code in strings of alphanumeric characters; and/or perform other functions useful for the creation, storage, and retrieval of clean digital content. To facilitate recognition of pictorial character images, the digital processor in the display driver device 15 may be programmed to display the digital content utilizing a font and format that is optimized for recognition by the optical character recognition algorithms executed by the digital conversion device 35.
[0066] In some embodiments of the present invention, additional methods may be applied in the digital processors in digital devices 10 and 35 which recognize executable code transformed into human readable pseudo content by cybercriminals using steganographic techniques to obfuscate malicious code. For example, but without limitation, the digital processors in devices 10 and 35 may utilize artificial intelligence to recognize pseudo content and embedded malicious code which use the least significant bits of ASCII values of otherwise valid characters to inject malicious code. Another example, artificial intelligence may be used to train filters to recognize and block, or warn operators of, non-sensical or otherwise grammatically incorrect words or sentences and numerical values outside an expected range.
[0067] In some embodiments of the present invention, data processing algorithms may be executed in virtual machine processing environments within the digital processors utilized in devices 10, 15, 30, 35, and other digital processors which process digital content. The virtual machines isolate the digital content, algorithms, and data on which they operate from other digital processors and data in the closed network. For example, but without limitation, all processing of pictorial images within the protected data facility 90 may occur in virtual machines utilizing hardware implemented virtualization technology and operating systems which effectively isolate virtual machines containing digital content from any and all other virtual machines containing digital data within the closed network.
[0068] In some embodiments of the present invention, the pictorial image of alphanumeric characters and/or other defined characters is communicated from the sender to the receiver across an analog air gap 80 by electromagnetic waves with frequencies outside the human visible spectrum, by light transmitted through fiber optic bundles, and/or by other mediums capable of communicating analog information.
[0069] In some embodiments of the present invention, multiple parallel input, processing, storage, and/or output devices may be employed to increase the throughput into and out of the protected data facility 90.
[0070] Referring to
[0071] In such embodiments the capture, conversion, and storage of the digital pictorial image file 34 occurs in a closed network within a designated secure data area 91 inside the protected data facility 90, which is separate and isolated from other areas within the protected data facility 90 and which meets or exceeds the isolation standards applied to the protected data facility 90. There is no physical, electronic, or other communication between the secure data area 91 and other areas within the protected data facility 90. Digital data diodes 53 and 54 and/or similar devices enforcing one way data flow are used as a method of transmission from the designated secure data area 91 to a destination network 55 outside the secure data facility.
[0072] For example, but without limitation, a document containing text, illustrations, photographs, and inked signatures may be displayed on a monitor or other display device 20, captured by an image sensor and converted to a digital image file 34 in the dedicated image sensor device 31, and stored in the second closed network storage device 41 within the secure data facility secure data area 91. Because the displayed image is a pictorial image which is captured by the image sensor and converted into the new digital image file 34 it is unlikely to be capable of containing malware. Furthermore, in some embodiments, the dedicated digital processor device in the image sensor device 31 may be programmed to perform bit operations on the digital image file 34 which preserve pictorial digital content while deconstructing any obfuscated malicious code in the image, such as an embedded QR code.
[0073] If requested by an authorized individual or entity, the clean content file 39 and digital image file 34 may be utilized to reconstruct the digital content, by applying a digital method and/or device (not shown) inside or outside the protected data facility 90 and the designated digital secure data area 91, in a format and layout closely approximating the format and layout in the source digital data stream, for example a reconstructed copy having the same illustrations, inked signatures, particular font, font size, and margins as in the source digital data stream. A warning accompanies any copy of the digital image file retrieved by an authorized individual or entity stating that the image may contain malicious code in the form of pixel patterns, and that the archival reference copy retrieved from the closed network storage device 40 should be considered to be the only version known to contain only clean digital content. The reconstructed copy may be delivered utilizing print or other similar analog pictorial medium to eliminate any digital cyberthreat vectors.
[0074] Referring to
[0075] Referring to
[0076] Furthermore, the pictorial image of the digital content as originally formatted may be captured and parsed outside the protected data facility 90 in the data preparation area 70 to determine the layout of original content, which may then be recorded in a meta data format utilizing markup language (for example XML, or Rich Text Format). The meta data is constructed from an image of the original document displayed on the display device 11; captured by the image sensor device 12, which consists of an optical lens, one or more image sensors, and dedicated digital processors; and converted into a pictorial character image of the meta data by the digital processor in the display device driver 16, and is not obtained from meta data embedded in the source digital data stream from the source network 5. In the embodiments illustrated in
[0077] If requested by an authorized party, the digital content file, the meta data, and the digital image file may be utilized to reconstruct the digital content, utilizing a digital process or device (not shown) inside or outside the protected data facility 90 and the designated secure data area 91, in a format and layout closely approximating the format and layout in the source digital data stream, for example having illustrations, inked signatures, particular font, font size, and margins. A warning accompanies any copy of the digital image file retrieved by an authorized individual or entity stating that the image may contain malicious code in the form of pixel patterns, and that the archival reference copy retrieved from the closed network storage device 40 should be considered to be the only version known to contain only clean digital content. The reconstructed copy may be delivered in print or other similar analog pictorial medium to eliminate any cyberthreat vectors.
[0078] Referring to
[0079] Referring to
[0080] In some embodiments of the present invention, the modules may be portable and self-contained. In such embodiments a self-contained environmental module 105 is attached, usually as a base, which provides electrical isolation, cooling, physical and electronic security, and other functions required by the chosen level of security. In such configurations the entire apparatus may be designed to meet or exceed the requirements of the United States Department of Defense for certification as a Sensitive Compartmented Information Facility (as prescribed in Intelligence Community Directive 705, 705-1, 705-2, and successor regulations) regardless of the security level of the facility in which the modules are located and operated.
[0081] Referring to
[0082] Referring to
[0083] An authorized individual or entity may make a unidirectional request for access to PII and/or other data stored in the database server 45 utilizing the same and/or similar one way apparatus and methods used to transmit clean content into the protected data facility 90. In some embodiments of the present invention, the request may be made using an application programing interface (API) which transmits the request utilizing the same and/or similar one way apparatus and methods used to transmit clean content into the secure data facility 90. The database device 45 validates and services authorized requests by real time transactional or delayed transmission across the digital diode air gap 50 to authorized entities or individuals who provided the data or are otherwise authorized to possess the requested digital content. As part of authorization to access data stored in database server 45, individuals and entities are required to provide evidence of compliance with privacy laws, regulations, policies, and best practices.
[0084] In some embodiments of the present invention, the database server and database software 45 may contain copies of PII and other data related to one individual which was submitted by more than one individual or entity. In such cases a many to one index is maintained in the database server by the database software associating more than one authorized individual or entity with a single individual's PII. The database is normalized so that there is no duplication of PII or other data. Authorized requests for copies of PII and other data from more than one authorized individual or entity are served from the single, normalized, PII data record for the individual.
[0085] Algorithms in the digital processor in the database server 45 monitor requests for retrieval of PII and other protected data and generate operator warnings and/or deny requests if the volume is abnormally high; other anomalous patterns of request are detected; and/or if a request for PII is received from an unauthorized individual or entity. The apparatus and methods of the present invention protect PII, including data subject to HIPAA (Health Insurance Portability and Accountability Act) and GDPR (General Data Protection Regulation) regulations, and significantly reduce the risk of data breaches.
[0086] The foregoing descriptions of possible implementations consistent with the present disclosure does not represent a comprehensive list of all such implementations or all variations of the implementations described. The description of some implementations should not be construed as an intent to exclude other implementations described. For example, artisans will understand the present specification as describing how to implement the disclosed embodiments in many other ways, using equivalents and alternatives that do not depart from the scope of the disclosure. Moreover, unless indicated to the contrary in the preceding description, no particular component described in the implementations is essential to the invention. It is thus intended that the embodiments disclosed in the specification be considered illustrative, with a true scope and spirit of invention as described herein.