Movatterモバイル変換


[0]ホーム

URL:


WO2003012606A2 - Security apparatus - Google Patents

Security apparatus
Download PDF

Info

Publication number
WO2003012606A2
WO2003012606A2PCT/GB2002/003520GB0203520WWO03012606A2WO 2003012606 A2WO2003012606 A2WO 2003012606A2GB 0203520 WGB0203520 WGB 0203520WWO 03012606 A2WO03012606 A2WO 03012606A2
Authority
WO
WIPO (PCT)
Prior art keywords
security apparatus
casing
encryption device
hdd
storage medium
Prior art date
Application number
PCT/GB2002/003520
Other languages
French (fr)
Other versions
WO2003012606A3 (en
Inventor
Peter Ferguson Western
Timothy David Stone
Original Assignee
Stonewood Electronics Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Stonewood Electronics LtdfiledCriticalStonewood Electronics Ltd
Publication of WO2003012606A2publicationCriticalpatent/WO2003012606A2/en
Publication of WO2003012606A3publicationCriticalpatent/WO2003012606A3/en

Links

Classifications

Definitions

Landscapes

Abstract

There is described a security apparatus for protecting data held on storage media against unauthorised access. The apparatus is in the form of a storage medium, for example a hard disc drive which is located in a single casing together with a data encryption device. The data encryption device is encapsulated in resin within the casing.

Description

SECURITY APPARATUS
This invention relates to security apparatus, and in particular, but not exclusively, to apparatus for protecting computer data and other digital data against unauthorised access.
Known methods for protecting the confidentiality of data stored on desktop and laptop PCs employ cryptographic methods. Cryptographic methods utilise software encryption solutions to prevent unauthorised access to data, however such methods are not infallible as keys (passwords) can often be deciphered by unauthorised users.
More robust methods are available which allow non- recoverable emergency destruction of data held on storage media in the event that unauthorised access is attempted. Alternatively, the use of an inline hardware encryption device can render the data useless by the use of full disk encryption.
However, previously proposed devices remain vulnerable since the encryption hardware can nevertheless be physically accessed by an unauthorised user. Accordingly, a determined intruder may force access to the device and physically disable its data protection capabilities. Once physically disabled, conventional methods could be employed to obtain the keys and illicitly retrieve the confidential data from the storage medium.
Another disadvantage of previously proposed devices is that they rely on conventional techniques to dissipate heat generated by their electrical components. Ventilation openings must therefore be provided in the casing to enable heated air to escape by convection to the ambient air. The necessity for ventilation openings is therefore a flaw in the design of such devices from a tamperproofing perspective.
A particular disadvantage of previously proposed devices is the increased space requirements of the additional hardware required to enable data encryption. As the trend is for PCs to become smaller, space within a PC is at a premium. Moreover, it is inevitable that installation costs will rise accordingly. According to the present invention there is provided security apparatus for protecting data held on storage media against unauthorised access, said apparatus comprising a storage medium and an encryption device located within a single casing.
Preferably, the encryption device is encapsulated in resin.
Preferably, the storage medium is a hard disk drive (HDD) .
Preferably, the form factor of the casing is chosen so that it accommodates both the hard disk drive (HDD) and the encryption device.
Preferably, the encryption device is mounted on a printed circuit board (PCB) .
Preferably, the encryption device contains a VLSI device .
Preferably, the VLSI device provides a program to a host to facilitate a keying process thereby allowing access to the storage medium.
Preferably, the casing has one or more internally mounted heat conducting surfaces arranged to be in physical contact with heat producing components of the apparatus, thereby defining a heat path to the exterior surface of the casing. Preferably, the internally mounted heat conducting surfaces are made of a resilient and/or flexible material .
Preferably, the casing is tamper evident to provide evidence of tampering.
Also, in the event of the tampering the keying process is irrevocably disabled, thereby denying access to the storage medium.
Preferably, the hard disk drive (HDD) is open to the ambient air.
Preferably, the resin is made of a thermally conductive material which acts as an internally mounted heat conducting surface.
Embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which: -
Fig. 1 shows a cross-sectional view of security apparatus made in accordance with a first embodiment of the present invention;
Fig. 2 is an exploded perspective view of the security apparatus shown in Fig. 1; and
Fig. 3 is an exploded perspective of security apparatus made in accordance with a second embodiment of the present invention. As shown in Fig. 1, there is provided security apparatus comprising a hard disk drive (HDD) 10 and a printed circuit board (PCB) 12 located within a casing 14 defined by an upper enclosure 16 located above the PCB 12 and a lower enclosure 18 located below the PCB 12.
A VLSI (Very Large Scale Integration) device 22 is mounted on the underside of PCB 12 and projects into the lower enclosure 18. The lower enclosure 18 is filled with resin 24 thereby encapsulating the VLSI 22 and contacting the underside of the PCB 12.
The length, width and height of the upper and lower enclosures 16, 18 determine the overall dimensions of the assembled casing 14. In the art, the dimensions of the casing 14 define its "form factor" .
The form factor of the casing 14 is chosen so that it accommodates both the HDD 10 and the VLSI 22.
A heat transfer pad 20 is in physical contact with both the HDD 10 and the inner surface of the upper enclosure 16 of the casing 14.
A channel 26 within the upper enclosure 16 is open to ambient air pressure.
In use, the security apparatus represents a straightforward replacement for existing HDD casings since it conforms to standard form factors already used in PCs .
When booting the PC, all data read from the security apparatus prior to keying is supplied from the VLSI 22. When the host requests the Master Boot Record, the security apparatus supplies its own program from the VLSI 22. Once executed on the host, this facilitates the keying process.
Prior to keying, all data is read only from the VLSI 22 and any writes are ignored. The HDD 10 and the data it holds are therefore inaccessible before keying .
Following keying, all data is read from and written to the HDD 10. The Master Boot Record within a solid state drive (SSD) of the VLSI 22 is therefore inaccessible after keying.
The security apparatus facilitates a technique for BIOS cascading whereby several such security devices are placed in a single computer and the BIOS is configured to boot each security device in turn. Only the last security device is bootable, thus when the user powers up the system, each security device can be keyed in turn and once the last security device has been keyed the system will boot.
The security apparatus provides high level encryption using the widely recognised AES algorithm or other algorithm and is both tamper resistant and tamper evident . For added protection the tamper respondent sensor, when activated, can function to disable the keying process, thereby denying access to the storage medium.
The HDD 10 and VLSI 22 become heated in use. Normally, in the absence of conventional ventilation openings to aid heat dissipation, the temperature within the casing 14 would rise and ultimately result in premature failure of the security apparatus. The present security apparatus obviates the need for ventilation openings by providing a heat conducting path from both the hard disk drive 10 and the VLSI 22 to the exterior surface of the casing 14.
Referring once more to Fig. 1, a first heat path is provided by a heat transfer pad 20 which contacts the HDD 10 and the inner surface of the upper enclosure 16 of the casing 14.
A second heat path is provided between the VLSI 22 and the inner surface of the lower enclosure 18 of the casing 14. However, in this case, the resin 24 is made of heat conducting material and acts in a similar fashion to the heat transfer pad 20.
The channel 26 in the casing is open to the ambient air in order that the HDD can compensate for pressure changes. However, the casing may be hermetically sealed when the data storage media device, such as a HDD, is not affected by pressure changes .
Fig. 2 shows an exploded perspective view of the security apparatus of Fig. 1 and indicates how the casing is defined by the upper and lower enclosures 16 and 18 respectively. It further shows how the HDD 10 is of a smaller form factor than its casing in order that the additional VLSI 22 and other optional hardware extensions can be co-located therewith.
Fig. 3 shows a second embodiment of the present invention. The arrangement is similar to that of Fig. 2, however, a ribbon cable is provided on the PCB 12 to ease assembly of the security apparatus by eliminating problems arising due to manufacturing tolerances.
It will be appreciated that since the security apparatus fits within a casing of standard form factor means that it can act as a straightforward and cost effective "fit and forget" replacement for conventional HDD form factors.
Moreover, the security apparatus is both tamper resistant and, by its very nature, tamper-evident. Additionally, the security apparatus may be arranged to be tamper respondent .
Further advantages of the security apparatus are as follows. It requires no previous knowledge of encryption on the part of the user, it is platform and operating system independent and users are not required to save data onto designated areas on the PC or concern themselves with key management.
Modifications and improvements may be made to the above without departing from the scope of the present invention.

Claims

1. Security apparatus for protecting data held on storage media against unauthorised access, said apparatus comprising a storage medium and an encryption device located within a single casing.
2. Security apparatus according to claim 1, wherein the encryption device is encapsulated in resin.
3. Security apparatus according to claim 1 or 2 , wherein the storage medium is a hard disk drive
(HDD) .
4. Security apparatus according to claim 3, wherein the dimensions of the casing are chosen so that it accommodates both the hard disk drive (HDD) and the encryption device.
5. Security apparatus according to any of claims 1 to 4, wherein the encryption device is mounted on a printed circuit board (PCB) .
6. Security apparatus according to any of claims 1 to 5, wherein the encryption device contains a VLSI device.
7. Security apparatus according to claim 6, wherein the VLSI device provides a program to a host to facilitate a keying process thereby allowing access to the storage medium.
8. Security apparatus according to any of claims 1 to 7, wherein the casing has one or more internally mounted heat conducting surfaces arranged to be in physical contact with heat producing components of the apparatus, thereby defining a heat path to the exterior surface of the casing.
9. Security apparatus according to claim 8, wherein the internally mounted heat conducting surfaces are made of a resilient and/or flexible material.
10. Security apparatus according to any of claims 1 to 9, wherein the casing is tamper evident to provide evidence of tampering.
11. Security apparatus according to claim 10, wherein in the event of the tampering the keying process is irrevocably disabled, thereby denying access to the storage medium.
12. Security apparatus according to any of claims 3 to 11, wherein the hard disk drive (HDD) is open to the ambient air.
13. Security apparatus according to any of claims 2 to 12, wherein the resin is made of a thermally conductive material which acts as an internally mounted heat conducting surface.
PCT/GB2002/0035202001-07-312002-07-31Security apparatusWO2003012606A2 (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
GB0118573.52001-07-31
GB0118573AGB0118573D0 (en)2001-07-312001-07-31Flag stone

Publications (2)

Publication NumberPublication Date
WO2003012606A2true WO2003012606A2 (en)2003-02-13
WO2003012606A3 WO2003012606A3 (en)2004-02-05

Family

ID=9919478

Family Applications (1)

Application NumberTitlePriority DateFiling Date
PCT/GB2002/003520WO2003012606A2 (en)2001-07-312002-07-31Security apparatus

Country Status (2)

CountryLink
GB (1)GB0118573D0 (en)
WO (1)WO2003012606A2 (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
FR2866450A1 (en)*2004-02-172005-08-19Enertec "ANTI-COMPROMISE" TYPE DATA RECORDING CARTRIDGE AND CORRESPONDING ANTI-COMPROMISE METHOD
WO2005088461A1 (en)*2004-03-172005-09-22Digisafe Pte LtdMethod and device for protecting data stored in a computing device
US7359144B2 (en)*2005-06-282008-04-15Seagate Technology LlcOvermold component seal in an electronic device housing
EP1790114A4 (en)*2004-04-292009-12-23Walker Digital LlcMethod and apparatus for outputting a result of a game via a container
JP2016522471A (en)*2013-03-282016-07-28ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Shield for electronic devices
US9661747B1 (en)2015-12-182017-05-23International Business Machines CorporationTamper-respondent assemblies with enclosure-to-board protection
US9717154B2 (en)2015-09-252017-07-25International Business Machines CorporationEnclosure with inner tamper-respondent sensor(s)
US9858776B1 (en)2016-06-282018-01-02International Business Machines CorporationTamper-respondent assembly with nonlinearity monitoring
US9881880B2 (en)2016-05-132018-01-30International Business Machines CorporationTamper-proof electronic packages with stressed glass component substrate(s)
US9894749B2 (en)2015-09-252018-02-13International Business Machines CorporationTamper-respondent assemblies with bond protection
US9904811B2 (en)2016-04-272018-02-27International Business Machines CorporationTamper-proof electronic packages with two-phase dielectric fluid
US9913389B2 (en)2015-12-012018-03-06International Business Corporation CorporationTamper-respondent assembly with vent structure
US9913370B2 (en)2016-05-132018-03-06International Business Machines CorporationTamper-proof electronic packages formed with stressed glass
US9913416B2 (en)2015-09-252018-03-06International Business Machines CorporationEnclosure with inner tamper-respondent sensor(s) and physical security element(s)
US9911012B2 (en)2015-09-252018-03-06International Business Machines CorporationOverlapping, discrete tamper-respondent sensors
US9916744B2 (en)2016-02-252018-03-13International Business Machines CorporationMulti-layer stack with embedded tamper-detect protection
US9924591B2 (en)2015-09-252018-03-20International Business Machines CorporationTamper-respondent assemblies
US9978231B2 (en)2015-10-212018-05-22International Business Machines CorporationTamper-respondent assembly with protective wrap(s) over tamper-respondent sensor(s)
US9999124B2 (en)2016-11-022018-06-12International Business Machines CorporationTamper-respondent assemblies with trace regions of increased susceptibility to breaking
WO2018103883A1 (en)*2016-12-092018-06-14Giesecke+Devrient Mobile Security GmbhSecure storage device
WO2018154523A1 (en)*2017-02-242018-08-30Dark Matter L.L.C.Unique hardware fingerprint device and method
US10098235B2 (en)2015-09-252018-10-09International Business Machines CorporationTamper-respondent assemblies with region(s) of increased susceptibility to damage
US10136519B2 (en)2015-10-192018-11-20International Business Machines CorporationCircuit layouts of tamper-respondent sensors
US10168185B2 (en)2015-09-252019-01-01International Business Machines CorporationCircuit boards and electronic packages with embedded tamper-respondent sensor
US10172239B2 (en)2015-09-252019-01-01International Business Machines CorporationTamper-respondent sensors with formed flexible layer(s)
US10237964B2 (en)2015-03-042019-03-19International Business Machines CorporationManufacturing electronic package with heat transfer element(s)
US10271424B2 (en)2016-09-262019-04-23International Business Machines CorporationTamper-respondent assemblies with in situ vent structure(s)
US10299372B2 (en)2016-09-262019-05-21International Business Machines CorporationVented tamper-respondent assemblies
US10321589B2 (en)2016-09-192019-06-11International Business Machines CorporationTamper-respondent assembly with sensor connection adapter
US10327343B2 (en)2015-12-092019-06-18International Business Machines CorporationApplying pressure to adhesive using CTE mismatch between components
US10327329B2 (en)2017-02-132019-06-18International Business Machines CorporationTamper-respondent assembly with flexible tamper-detect sensor(s) overlying in-situ-formed tamper-detect sensor
US10426037B2 (en)2015-07-152019-09-24International Business Machines CorporationCircuitized structure with 3-dimensional configuration
US10531561B2 (en)2018-02-222020-01-07International Business Machines CorporationEnclosure-to-board interface with tamper-detect circuit(s)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4751594A (en)*1986-05-221988-06-14Magnetic Peripherals Inc.Low diffusion disk drive breather vent
US4997032A (en)*1987-09-251991-03-05Minnesota Mining And Manufacturing CompanyThermal transfer bag
CA2035697A1 (en)*1991-02-051992-08-06Brian James SmythEncryption apparatus for computer device
US5998858A (en)*1995-07-201999-12-07Dallas Semiconductor CorporationMicrocircuit with memory that is protected by both hardware and software
KR100319838B1 (en)*1995-08-102002-04-22윤종용 Personal computer with security device, security method thereof, and installation and removal method of the security device
GB2330682A (en)*1997-10-221999-04-28Calluna Tech LtdPassword access to an encrypted drive
US7178031B1 (en)*1999-11-082007-02-13International Business Machines CorporationWireless security access management for a portable data storage cartridge

Cited By (62)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
FR2866450A1 (en)*2004-02-172005-08-19Enertec "ANTI-COMPROMISE" TYPE DATA RECORDING CARTRIDGE AND CORRESPONDING ANTI-COMPROMISE METHOD
WO2005088461A1 (en)*2004-03-172005-09-22Digisafe Pte LtdMethod and device for protecting data stored in a computing device
EP1790114A4 (en)*2004-04-292009-12-23Walker Digital LlcMethod and apparatus for outputting a result of a game via a container
US7359144B2 (en)*2005-06-282008-04-15Seagate Technology LlcOvermold component seal in an electronic device housing
JP2016522471A (en)*2013-03-282016-07-28ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Shield for electronic devices
US9846459B2 (en)2013-03-282017-12-19Entit Software LlcShield for an electronic device
US10237964B2 (en)2015-03-042019-03-19International Business Machines CorporationManufacturing electronic package with heat transfer element(s)
US10524362B2 (en)2015-07-152019-12-31International Business Machines CorporationCircuitized structure with 3-dimensional configuration
US10426037B2 (en)2015-07-152019-09-24International Business Machines CorporationCircuitized structure with 3-dimensional configuration
US10172239B2 (en)2015-09-252019-01-01International Business Machines CorporationTamper-respondent sensors with formed flexible layer(s)
US10378925B2 (en)2015-09-252019-08-13International Business Machines CorporationCircuit boards and electronic packages with embedded tamper-respondent sensor
US9894749B2 (en)2015-09-252018-02-13International Business Machines CorporationTamper-respondent assemblies with bond protection
US10685146B2 (en)2015-09-252020-06-16International Business Machines CorporationOverlapping, discrete tamper-respondent sensors
US10257939B2 (en)2015-09-252019-04-09International Business Machines CorporationMethod of fabricating tamper-respondent sensor
US9913362B2 (en)2015-09-252018-03-06International Business Machines CorporationTamper-respondent assemblies with bond protection
US10624202B2 (en)2015-09-252020-04-14International Business Machines CorporationTamper-respondent assemblies with bond protection
US9913416B2 (en)2015-09-252018-03-06International Business Machines CorporationEnclosure with inner tamper-respondent sensor(s) and physical security element(s)
US9911012B2 (en)2015-09-252018-03-06International Business Machines CorporationOverlapping, discrete tamper-respondent sensors
US10271434B2 (en)2015-09-252019-04-23International Business Machines CorporationMethod of fabricating a tamper-respondent assembly with region(s) of increased susceptibility to damage
US9924591B2 (en)2015-09-252018-03-20International Business Machines CorporationTamper-respondent assemblies
US9936573B2 (en)2015-09-252018-04-03International Business Machines CorporationTamper-respondent assemblies
US10175064B2 (en)2015-09-252019-01-08International Business Machines CorporationCircuit boards and electronic packages with embedded tamper-respondent sensor
US9717154B2 (en)2015-09-252017-07-25International Business Machines CorporationEnclosure with inner tamper-respondent sensor(s)
US10395067B2 (en)2015-09-252019-08-27International Business Machines CorporationMethod of fabricating a tamper-respondent sensor assembly
US10264665B2 (en)2015-09-252019-04-16International Business Machines CorporationTamper-respondent assemblies with bond protection
US10098235B2 (en)2015-09-252018-10-09International Business Machines CorporationTamper-respondent assemblies with region(s) of increased susceptibility to damage
US10378924B2 (en)2015-09-252019-08-13International Business Machines CorporationCircuit boards and electronic packages with embedded tamper-respondent sensor
US10178818B2 (en)2015-09-252019-01-08International Business Machines CorporationEnclosure with inner tamper-respondent sensor(s) and physical security element(s)
US10334722B2 (en)2015-09-252019-06-25International Business Machines CorporationTamper-respondent assemblies
US10331915B2 (en)2015-09-252019-06-25International Business Machines CorporationOverlapping, discrete tamper-respondent sensors
US10168185B2 (en)2015-09-252019-01-01International Business Machines CorporationCircuit boards and electronic packages with embedded tamper-respondent sensor
US10143090B2 (en)2015-10-192018-11-27International Business Machines CorporationCircuit layouts of tamper-respondent sensors
US10136519B2 (en)2015-10-192018-11-20International Business Machines CorporationCircuit layouts of tamper-respondent sensors
US9978231B2 (en)2015-10-212018-05-22International Business Machines CorporationTamper-respondent assembly with protective wrap(s) over tamper-respondent sensor(s)
US9913389B2 (en)2015-12-012018-03-06International Business Corporation CorporationTamper-respondent assembly with vent structure
US10327343B2 (en)2015-12-092019-06-18International Business Machines CorporationApplying pressure to adhesive using CTE mismatch between components
US9877383B2 (en)2015-12-182018-01-23International Business Machines CorporationTamper-respondent assemblies with enclosure-to-board protection
US9661747B1 (en)2015-12-182017-05-23International Business Machines CorporationTamper-respondent assemblies with enclosure-to-board protection
US10217336B2 (en)2016-02-252019-02-26International Business Machines CorporationMulti-layer stack with embedded tamper-detect protection
US10169967B1 (en)2016-02-252019-01-01International Business Machines CorporationMulti-layer stack with embedded tamper-detect protection
US10169968B1 (en)2016-02-252019-01-01International Business Machines CorporationMulti-layer stack with embedded tamper-detect protection
US10115275B2 (en)2016-02-252018-10-30International Business Machines CorporationMulti-layer stack with embedded tamper-detect protection
US9916744B2 (en)2016-02-252018-03-13International Business Machines CorporationMulti-layer stack with embedded tamper-detect protection
US9904811B2 (en)2016-04-272018-02-27International Business Machines CorporationTamper-proof electronic packages with two-phase dielectric fluid
US9913370B2 (en)2016-05-132018-03-06International Business Machines CorporationTamper-proof electronic packages formed with stressed glass
US10535619B2 (en)2016-05-132020-01-14International Business Machines CorporationTamper-proof electronic packages with stressed glass component substrate(s)
US10535618B2 (en)2016-05-132020-01-14International Business Machines CorporationTamper-proof electronic packages with stressed glass component substrate(s)
US9881880B2 (en)2016-05-132018-01-30International Business Machines CorporationTamper-proof electronic packages with stressed glass component substrate(s)
US9858776B1 (en)2016-06-282018-01-02International Business Machines CorporationTamper-respondent assembly with nonlinearity monitoring
US10321589B2 (en)2016-09-192019-06-11International Business Machines CorporationTamper-respondent assembly with sensor connection adapter
US10271424B2 (en)2016-09-262019-04-23International Business Machines CorporationTamper-respondent assemblies with in situ vent structure(s)
US10667389B2 (en)2016-09-262020-05-26International Business Machines CorporationVented tamper-respondent assemblies
US10299372B2 (en)2016-09-262019-05-21International Business Machines CorporationVented tamper-respondent assemblies
US9999124B2 (en)2016-11-022018-06-12International Business Machines CorporationTamper-respondent assemblies with trace regions of increased susceptibility to breaking
WO2018103883A1 (en)*2016-12-092018-06-14Giesecke+Devrient Mobile Security GmbhSecure storage device
EP3552142A1 (en)*2016-12-092019-10-16Secunet Security Networks AktiengesellschaftSecure storage device
US11443075B2 (en)2016-12-092022-09-13Secunet Security Networks AgSecure storage system
AU2017370818B2 (en)*2016-12-092022-09-29Secunet Security Networks AktiengesellschaftSecure storage device
US10327329B2 (en)2017-02-132019-06-18International Business Machines CorporationTamper-respondent assembly with flexible tamper-detect sensor(s) overlying in-situ-formed tamper-detect sensor
WO2018154523A1 (en)*2017-02-242018-08-30Dark Matter L.L.C.Unique hardware fingerprint device and method
US10531561B2 (en)2018-02-222020-01-07International Business Machines CorporationEnclosure-to-board interface with tamper-detect circuit(s)
US11083082B2 (en)2018-02-222021-08-03International Business Machines CorporationEnclosure-to-board interface with tamper-detect circuit(s)

Also Published As

Publication numberPublication date
GB0118573D0 (en)2001-09-19
WO2003012606A3 (en)2004-02-05

Similar Documents

PublicationPublication DateTitle
WO2003012606A2 (en)Security apparatus
EP1834328B1 (en)Rendering disk data unrecoverable using encryption
US6512454B2 (en)Tamper resistant enclosure for an electronic device and electrical assembly utilizing same
EP1001329B1 (en)A user-computer interaction method for use by flexibly connectable computer systems
RU2067313C1 (en)Device for protection against unauthorized access to information that is stored in personal computer
KR970006392B1 (en) Personal computer system with security function
US8812875B1 (en)Virtual self-destruction of stored information
US9378156B2 (en)Information handling system secret protection across multiple memory devices
US20060053308A1 (en)Secured redundant memory subsystem
US20050262361A1 (en)System and method for magnetic storage disposal
US12361180B2 (en)Method and apparatus for a modular digital chassis lock assembly in an information handling system
KR101476222B1 (en)Storage system having security storage device and managing method thereof
US8275996B1 (en)Incremental encryption of stored information
US20080168545A1 (en)Method for Performing Domain Logons to a Secure Computer Network
JP2011503689A (en) Computer storage device having removable read-only area and read / write area, removable media component, system management interface, and network interface
JP2006268851A (en)Data transcription in data storage device
RU2494447C2 (en)Method to code memory stick and assembly for its realisation
US20090217055A1 (en)Apparatus and Method for Preventing Unauthorized Copying
US7441118B2 (en)Network appliance having trusted device for providing verifiable identity and/or integrity information
TWI689840B (en) Data storage device
US20180239912A1 (en)Data security method and local device with switch(es)
JP4550526B2 (en) Information processing system, information processing apparatus, registration server, control program, and control method
US20080195872A1 (en)Method and Device for Protecting Data Stored in a Computing Device
CN113761602B (en)Encryption key for removable storage media
CN110472443A (en)A kind of local device of data security methods and belt switch

Legal Events

DateCodeTitleDescription
AKDesignated states

Kind code of ref document:A2

Designated state(s):AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

Kind code of ref document:A2

Designated state(s):AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM

ALDesignated countries for regional patents

Kind code of ref document:A2

Designated state(s):GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

Kind code of ref document:A2

Designated state(s):GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG

121Ep: the epo has been informed by wipo that ep was designated in this application
WWEWipo information: entry into national phase

Ref document number:2002767595

Country of ref document:EP

WWWWipo information: withdrawn in national office

Ref document number:2002767595

Country of ref document:EP

REGReference to national code

Ref country code:DE

Ref legal event code:8642

122Ep: pct application non-entry in european phase
NENPNon-entry into the national phase

Ref country code:JP

WWWWipo information: withdrawn in national office

Country of ref document:JP


[8]ページ先頭

©2009-2025 Movatter.jp