Secure MIL-STD TEMPEST 4-Port KVM Switch

Overview
Features
Specifications
Downloads
How to Order

HSL’s 4-Port Ruggedized secure KVM Switch, is designed to provide military users with superior security in the most challenging environmental conditions. It's designed to be installed on a military vehicle, submarines and airborne platforms. For easier mounting and better situational awareness, the SK41D-4TR is optionally equipped with a remote control that can be mounted on the operator dashboard.

 KVM device models addressed in this page:

  • SK41D-4TR - Secure MIL-STDTE MPEST 4-Port HDMI KVM Switch

-------------------------------------------------------------------------------

Highly Ruggedized

The SK41D-4TR device designed for MILSTD harsh environmental requirements. It features robust sealed aluminum enclosure, all metallic MIL-DTL-38999 connectors and sealed front panel illuminated push-buttons.

Tempest level I complaint & NIAP Common Criteria PP4.0 Certification

The SK41D-4TR is the only KVM switch in the world that is NIAP PP 4.0 Compliant, Tempest level I complaint, Mil-STD 810G Complaint and MIL-STD-1275A complaint.

Versatile Interfaces

Product supports up to four computers/video sources with HDMI or DVI interfaces. Video sources supported ranging from 480p legacy to 1920x1200@60Hz, 2560x1600@60Hz and 3840x2160@30HZ (4K30) resolutions.

Unidirectional optical data diodes

HSL products provides the highest level of isolation between connected computers or sources. The SK41D-4TR KVM is equipped with four patented Unidirectional optical data diodes to prevent potential APT on the KVM from the host and from connected peripherals. No reverse data flow possible by design. Designed to support isolation between national security networks and internet.

Hardware Based peripheral protection/isolation

The SK41D-4TR security functions depend on physics. Absolutely no dependency on firmware or software. All firmware is in protected ROM (Read Only Memory). No keyboard buffering or memory. Peripheral devices can be defined through configurable white-list and black-list.

Display Plug & Play (DDC) protection

HSL patented EDID protection is the most secure video protection method in the market today. Leakage prevention through emulation technology.

Signaling attacks prevented by design.

Always-on Active Anti-tampering

Enclosure tampering attempt can be sensed by multiple sensors. Battery powered anti-tampering circuitry prevents normal KVM operation.

Protected Power Input

The KVM is powered directly from 12-28VDC power vehicle bus and is fully complaint with MIL-STD-1275A.

Product is optionally protected from High Radiation Nuclear events.

 

 

System Diagram

  • Interact with four isolated computers using a single set of keyboard, video, mouse, audio and USB peripherals.
  • Freeze USB (SK41DU-3, SK41PU-3, SK41HU-3):
    Assign the USB port to a specific computer while switching the keyboard, video, mouse and audio between other computers. Useful for various scenarios, for instance, when a USB smart card reader  must remain mapped to a certain computer.
  • Smoothly switch between computers (Virtual Display Technology):
    Automatically switch control from one computer to another by dragging the mouse cursor over the computer’s display border. Peripherals switch to the next computer without hav‌ing to press any buttons once the mouse is passing the display border.
  • View applications in Ultra High Definition (UHD) 4K video quality:
    Never compromise on video quality. Run graphic-intensive, ultrahigh definition applications on all single and dual monitor KVM models.
  • Avoid typing mistakes:
    Since two-way communication is blocked by the KVM security, keyboard lock LEDs do not function. Help users avoid typing mistakes by visually indicating the status of keyboard locks (CAPS-LOCK | NUM LOCK | SCROLL LOCK) on the product’s front facing panel.
  • Keep up with future requirements through interchangeable KVM / KM functionality: 
    Adjust with versatile setup scenarios. The device can be configured in two modes, KVM and KM. In KVM mode (default) one display, keyboard and mouse set is shared between all computers. In KM mode each computer is connected to a separate display while keyboard and mouse are shared, thus allowing simultaneous work on multiple computers.

 

Keyboard & Mouse Threats Protection

Attack Type Vulnerability Risk
Signal/Virus
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • May include memory chips that can store data
  • Bi-directional keys (Num Lock, Scroll Lock, Cap Lock, Pause Break) can be used to send and decode data between systems
Data leakage from one system to another
Solution Components Solution Highlights 
Unidirectional Optical Data Diodes 
  • Allowing data to flow only in one direction, from the device- to-host computer.
  • Preventing host-to-peripheral data flow eliminates data leakage through the shared peripheral.
  • Preventing host-to-host connectivity isolates all hosts from each other.
Hardware-based Peripheral Isolation per Port
  • Each port is fully isolated from other ports.
Hardcoded HID Filter
  • Accepts only USB HID Devices (Keyboard & Mice) rules out others.
  • Hardcoded ASCII keyboard / mice characters.
  • Incapable of processing any other code than HID-ASCII. 

 

 

Monitor / Display Threats Protection

Attack Type Vulnerability Risk
Signal/Virus
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Manipulating monitor settings can be used to send and decode data between systems
Data leakage from one system to another
Solution Components Solution Highlights 
Extended Display Identification Data (EDID) Emulation 
  • Prevent direct access to the monitor’s Extended Display Identification Data (EDID).
  • Dedicated, read-only, EDID emulation for each computer provides complete isolation.
No Shared Circuitry
  • Computer video input interfaces are isolated through the use of different electronic components, power and ground domains.
Block Monitor Control Command Set (MCCS)
  • Ignore MCCS commands, so they cannot pass through and exploit the monitor’s internal memory.

 

 

Audio Threats Protection

Attack Type Vulnerability Risk
Signal/Virus/Hot Microphone
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Manipulated sound card can reprogram a speaker into a microphone to act as an audio reception tool (e.g. microphone).
Data leakage and eavesdropping
Solution Components Solution Highlights 
Unidirectional Diodes 
  • Enforce computer-to-speaker, one-way flow of sound through unidirectional optical data diodes.
  • Prevent re-tasking of the audio line-in (headset/speaker) into a microphone line and thus block eavesdropping attempts by reprograming a speaker to act as an audio reception tool (e.g. microphone).

 

 

USB Threats Protection

Attack Type Vulnerability Risk
Virus
  • Highly popular standard commonly used by computer and mobile users.
  • Provides on-the-fly high speed, bidirectional flow of data to and from the computer.
  • Multifunctional port: numerous device types can connect through the same physical port
  • Programmable components may include malicious code and are vulnerable to manipulation.
  • Can be used to store/inject data.
Data leakage from one system to another
Solution Components Solution Highlights 
Block un-authorized USB
  • Completely block and disable unauthorized USB devices and traffic
Secure & Dedicated Keyboard / Mouse Ports
  • Accepts only USB HID Devices (Keyboard & Mice) rules out others
  • Refer to Keyboard & Mouse threats table for additional information
Biometric/Smart-Card reader support
  • Special secured port (fUSB) for smart-card/biometric reader with patented Freeze function to support user authentication across multiple isolated networks.
Filter USB Peripherals
  • Whitelist and blacklist specific USB devices based on VID/PID characteristics.

 

 

Hardware Tampering Protection

Attack Type Vulnerability Risk
Implant malicious hardware
  • Open product and implant malicious hardware.
Data leakage and eavesdropping
Solution Components Solution Highlights 
Always-ON tamper evident system 
  • Any attempt to open the product enclosure will activate an anti-tamper system making the product inoperable.
Blinking LEDs provide a clear indication of a tampering event.
  • Special holographic tampering evident labels on the product’s enclosure provide a clear visual indication if the product has been opened or compromised.

 

 

Firmware Tampering Protection

Attack Type Vulnerability Risk
Firmware Reprogramming
  • Attempt to reprogram firmware components to include malicious code.
  • Attempt to store/inject data.
Data leakage and eavesdropping
Solution Components Solution Highlights 
Tamper-proof electrical design 
  • There is no access to the product’s firmware or memory through any port.
  • Firmware is permanently stored on a nonreprogrammable Read Only Memory (ROM) to prevent any modification.
  • Firmware integrity is verified through a self-test procedure during power-up. Upon detection of a critical failure the device disables normal operation and provides the user with a clear visual indication of failure.

 

 

Model Description CPN
SK41D-4TR

4P MIL-STD Secure KVM

CPN21854

-

Remote Controller for SK41D-TR

CPN22654

 -

Test cables kit for SK41D-TR

 

CPN20162

Related Products