Embedded computing systems with cyber security for mission processing introduced by General Micro Systems

Nov. 19, 2024
Different from multi-domain Red/Black systems, cross-domain systems link secure classified systems and insecure-often public-systems and networks.

RANCHO CUCAMONGA, Calif. – General Micro Systems Inc. (GMS) in Rancho Cucamonga, Calif., is introducing four cross-domain systems: an airborne 3-domain system; two ground-based systems, and a 1/4 ATR OpenVPX system for mission processing, secure storage and authentication, encryption, networking, and options for SATCOM, AI and data diodes.

Each system supports the GMS Enhanced SecureDNA cyber security suite and will be TEMPEST certified. This lightweight compact form factor combines four customizable airborne and ground-based cross-domain systems by GMS, and provides secure gigabit battlefield communications between secure, classified, and insecure communications links.

Different from multi-domain Red/Black systems, cross-domain systems provide the gateway between secure classified systems and insecure-often public-systems and networks.

These embedded computing systems offer higher levels of security than multi-domain, such as via data diodes for rules-based routing, and beefier crypto and sanitization for data-at-rest within storage devices.

Related: The different trusted computing and cyber security approaches for embedded computing and enterprise systems

Generically and insufficiently called Red/Black systems, the U.S. Department of Defense SIPR (classified) and NIPR (unclassified) networks co-exist because data often must transit between U.S. allies and disparate networks, and often travels across public networks like Wi-Fi, 5G cellular, and satellite communications.

The cross-domain system filters the data, makes decisions about what data can pass between the domains, and encrypts/de-crypts data on-the-fly and at-rest on storage drives-all in real time.

The cross-domain systems also must prepare for the eventuality that the vehicle, platform or location come under enemy control, so it must sanitize and eradicate its data in all kinds of circumstances, often autonomously with no operator ever pushing the big red button.

For more information contact General Micro Systems online at www.gms4sbc.com.

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!