What is a “Secure Computing Interface”?


A Secure Computing Interface (SCI) is a peripheral, that works with a computer (laptop, tablet, phone, etc.) to provide the human user an extra layer of security for critical communications functions. It works with the main computer, but is not part of it. That separation provides the user an extra layer of protection against attacks that compromise their main computer (host). In essence, it’s the users shield against a hostile host.

The SCI can take many forms but, ideally, would be peripherals that already exist and people use regularly, such as keyboards, audio headsets, or cell phone cases. Each peripheral can be dedicated to certain functions or categories of interactions. For example. keyboards would be dedicated to text-based cryptography functions, while the audio headset would handle audio cryptography functions.

One key aspect of these peripherals is that they would connect to the main computer the same way as a normal peripheral, using the same protocols, appearing as a “dumb” device to the host. The host doesn’t need to be aware of, or have any special software support for, the extra security features that the SCI’s provide. To a hostile or compromised computer, the SCI keyboard would appear as just another USB keyboard.

As an SCI is a standards-based, common peripheral it can be used with any, and multiple, main computers. You can connect the SCI USB keyboard to your laptop or phone, or even a PC in a hotel business center or internet cafe. It can work with your personal Apple phone and your company Windows laptop and your kids Android tablet. It provides the human user portability and control over the critical security functions it handles.

This model is a different paradigm from how computers typically work today. It breaks up certain security functions into separate devices, rather than the current all-eggs-in-one-basket model. It puts the user in control of key communications functions and limits the visibility of the Big Tech vendor platforms. It gives the user a choice that they don’t have today. And most importantly, its designed from the hardware up, to be reliable.


about     source     copyright 2022 Anomie Technologies Inc.     articles     contact