Tech Note #110: Concept for a Secure Network Computer
©
2000 Bionic Buffalo Corporation; All Rights Reserved.
Tuesday, 11 January 2000
http://www.tatanka.com
[tn0110]
Page 12 of 18
Host
Computer
Operating
System
Interior
Network
Adaptor
(INA)
tn011009 ©2000 Bionic Buffalo Corp
Host
Computer
(HC)
Host
Computer
BIOS Boot
Software
Security
Module
Boot
Software
Interior
Boundary
Controller
(IBC)
Interior SM
CPU
(ISMCPU)
Exterior
Boundary
Controller
(EBC)
Exterior
Network
Remote
Boundary
Controller
Remote OS
or Disk
Image
Exterior
SM CPU
(ESMCPU)
Exterior
Network
Adaptor
(ENA)
Remote File
Server
Remote
Enclave
hosts
hosts
loads
and
starts
transfers OS or disk image to
connects to
connects to
hosts
hosts
connects to
connects
to
connects
to
connects to
contains
contains
provides
network
access to
provides network access to
hosts
tunnels
through
tunnels
through
contains
transfers
to HC
through
Thus, the INA does triple duty, and may have three distinct interfaces, for use in: (1) HC
memory, cache, and register clearing, (2) the HC boot process, and (3) standard network
adapter emulation.
Physical Security
To achieve its purpose, the SNC must be physically secure. The level of physical security
needed will vary depending on the application, but it is generally required that, except where
intentionally allowed: