US20120303920A1 - Hard drive eraser - Google Patents
Hard drive eraser Download PDFInfo
- Publication number
- US20120303920A1 US20120303920A1 US13/525,770 US201213525770A US2012303920A1 US 20120303920 A1 US20120303920 A1 US 20120303920A1 US 201213525770 A US201213525770 A US 201213525770A US 2012303920 A1 US2012303920 A1 US 2012303920A1
- Authority
- US
- United States
- Prior art keywords
- drive
- hard drive
- erase
- data
- hard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B5/00—Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
- G11B5/02—Recording, reproducing, or erasing methods; Read, write or erase circuits therefor
- G11B5/024—Erasing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00666—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of erasing or nullifying data, e.g. data being overwritten with a random string
Abstract
Systems, apparatuses and methods for erasing hard drives. A system, which can be configured as a stand-alone and portable apparatus, includes a control device configured to support an erase module. The erase module is configured to erase a hard drive such that data erased from the hard drive is forensically unrecoverable. The system further includes a user interface and at least one drive bay configured to provide communication between a hard drive and the control device.
Description
- This application claims benefit to U.S. Provisional Patent Application No. 60/728,320 filed on Oct. 20, 2005, the disclosure of which is incorporated herein by reference.
- The present invention relates to computer and data security, particularly to an apparatus and method for erasing data contained upon magnetic data storage media.
- Computer and data security are important concerns for individuals, businesses and governments. Particularly, secure techniques for erasing or otherwise disposing of electronically stored data are growing concerns. U.S. Patent Application Publication No. 2004/0252628, which is commonly assigned to Ensconce Data Technology, Inc. and is incorporated herein by reference, describes the developing importance of secure data destruction for individuals, businesses and governments. Legislation has also pushed the importance of data security to the forefront. To comply with federal regulations, companies now need to completely and reliably eliminate all sensitive data on hard disk drives prior to disposing of or reusing the drive. Specifically provisions of the Financial Services Modernization Act (2003)(Gramm-Leach-Bliley), the Fair and Accurate Credit Transaction Act of 2003 (FACT Act), the Corporate and Criminal Fraud Accountability Act of 2002 (Sarbanes-Oxley), and the Health Insurance Portability and Accountability Act (HIPPA) all contain data security requirements. The regulations under these acts set requirements for securely handling sensitive data.
- In response to the increasing need for computer and data security, techniques for erasing or destroying electronically stored data have been developed. One such development is data eraser software, which is intended to make deleted files unrecoverable as well as eliminate the extraneous data that is created and stored by many applications, especially those involving the Internet. Such software is run on the computer containing the hard drive that stores the information to be deleted. The software causes an over-write of certain data on the hard drive. However, the computer's BIOS and/or components of the hard drive itself may interfere with the software, preventing complete erasure of data on the hard drive. For example, the BIOS of the computer and/or hard drive components may prevent data on certain areas of the hard drive from being erased. Therefore, the data is not securely erased or destroyed and can often be recovered by known forensic data recovery techniques.
- Accordingly, what is needed is an apparatus and method for erasing data contained on a storage medium, such as a hard drive, such that it is unrecoverable by known forensic data recovery techniques.
- Embodiments provide apparatuses and methods for erasing hard drives. A system, which can be configured as a stand-alone and portable apparatus, includes a control device configured to support an erase module. The erase module is configured to erase a hard drive such that data erased from the hard drive is forensically unrecoverable. The system further includes a user interface and at least one drive bay configured to provide communication between a hard drive and the control device. According to exemplary methods, a hard drive is erased using a low frequency. According to another aspect, a certificate is generated certifying that a hard drive was erased.
- Additional features and embodiments will be apparent from the following detailed description and drawings, which illustrate exemplary embodiments.
-
FIG. 1 is a block diagram illustrating a hard drive erase system according to an exemplary embodiment of the invention; -
FIG. 2 is a schematic diagram of a portion of a hard drive; -
FIG. 3 is a flow chart illustrating a method for erasing a hard drive according to an exemplary embodiment of the invention; and -
FIGS. 4-13 depict structural configurations for a hard drive erase system according to exemplary embodiments of the invention. - In the following detailed description, reference is made to the accompanying drawings, which form a part hereof and show by way of illustration specific embodiments that the invention may be practiced. In the drawings, like reference numerals refer to like elements. The illustrated embodiments are described in sufficient detail to enable those skilled in the art to practice them, and it is to be understood that other embodiments may be utilized, and that structural and logical changes may be made. The progression of process steps described is exemplary of the embodiments; however, the sequence of steps is not limited to that set forth herein and may be changed, with the exception of steps necessarily occurring in a certain order.
-
FIG. 1 illustrates a harddrive erase system 100 according to an exemplary embodiment. Thesystem 100 is a stand-alone system that provides secure erasure capability of hard disk drives. Thesystem 100 enables hard disk drives to be erased such that the data selected for erasure is forensically unrecoverable. The term forensically unrecoverable means that data is not recoverable by presently used techniques. - The
system 100 includes acontrol device 120 capable of supporting software applications. For example, thedevice 120 can be a central processing unit, a server, among others. Thecontrol device 120 supports anerase module 140. Theerase module 140 can be one or more computer software program applications for erasing data from storage media. For example, themodule 140 can include software available from the Magnetic Recording Research Center (MRRC) at the University of California, San Diego, specifically the software titled “HDDErase 2.0 Beta,” among other software applications. - The
control device 120 is in communication with astorage device 122. The storage device can be any form of memory capable of storing electronic data. According to one exemplary embodiment of the invention, theerase module 140 causes data about each erase procedure to be stored on thestorage device 122. In this manner, thesystem 100 maintains a log of erase procedures. The stored data can include hard drive identification information, such as the drive serial number, the drive manufacture, drive model, drive size; a start date/time stamp; an end date/time stamp; the erasure method; an indication of success or failure; the user who initiated the erase procedure; erase certificates; among others. - The
system 100 also includes auser interface 101, which enables the user to input information into thesystem 100 and gain information from thesystem 100. Preferably theuser interface 101 is a graphical user interface (GUI). Theuser interface 101 can be for example, a display device and keyboard, or a touch screen monitor, among others. - The system also includes at least one
hard drive bay 110. In the illustrated embodiment thesystem 100 includes a plurality ofhard drive bays 110. Eachbay 110 can be populated with at least onehard drive 170. Accordingly, thesystem 100 can support the erasure of multiplehard drives 170 simultaneously. The drive bays can support at least one type ofhard drive 170, but preferably supports multiplehard drive 170 types. Eachbay 100 optionally includes alocking mechanism 111 and astatus indicator 112 for signaling the status of thehard drive 170 in thebay 110. Preferably, thecontrol device 120 is in communication with thelocking mechanism 111 and is aware of whether thelocking mechanism 111 is in a locked or unlocked state. Although thestatus indicator 112 is shown on thedrive bay 110, status ofhard drive 170 in eachbay 110 could instead be displayed on theuser interface 101. - Each
drive bay 110 can be operated independently ofother drive bays 110 and individualhard drives 170 can be connected and disconnected from thesystem 100drive bays 110 without interfering with the operation ofother drive bays 110. Accordingly, the user can remove onehard drive 170 from and connect ahard drive 170 to thesystem 100 without powering down thesystem 100 or interrupting an ongoing erase procedure. - The
drive bays 110 enable communication between one or morehard drives 170 and thesystem 100 such that thesystem 100 can erase data contained on the hard drive(s) 170. Optionally, thesystem 100 can be configured such that the user can access and read the contents of ahard drive 170 that is in adrive bay 110 via theuser interface 101. - Each
drive bay 110 includes at least one connecting device, such as a port, cable, probe, or any device, mechanism or means for establishing communication betweensystem 100 and ahard drive 170. In one embodiment, adrive bay 110 includes one ormore cables 110 a that connect to ahard drive 170, e.g., a data cable and a power cable. Other devices and means for providing communication between thesystem 100 and thehard drive 170 can also be employed. Thesystem 100 can accommodate differenthard drive 170 types that have differing cabling requirements. Additionally, adrive bay 110 can include a probe 11013, which attaches to ahard drive 170 at locations other than typical cable attachment locations. For example, the probe 11013 can connect to inject a signal the printed circuit board of thehard drive 170. Alternatively, thesystem 100 is configured to communicate with thehard drive 170 in situ, i.e., as it is found in a particular device, such as a personal computer. It should be understood that thesystem 100 can include one ormore dive bays 110 and also be configured to connect directly to one or morehard drives 170 in situ. - Optionally, the
system 100 is in communication with anoutput device 125 for outputting information, such as the status ofhard drives 170 and erase certificates, for example by printing, emailing, or other output mechanism. In one embodiment, the output device is a printer for printing certificates (e.g., in the form of labels) certifying that a particularhard drive 170 has been erased. Alternatively, the output device could be integrated with thesystem 100. - Also optionally, the
system 100 can be in communication with theInternet 151 or other computer network (not shown). Thecontrol device 120 can be configured to provide erase certificates and logs to aremote device 150, such as a computer, which can be part of a computer network controlled by a third party independent of thesystem 100 user. According to one embodiment, the third party receives erase certificates from a variety of sources, for example, frommultiple systems 100, and stores the erase certificates. In this manner, the third party keeps data regarding hard drive erasures which can be readily accessed as needed. - In conventional write-over erase procedures, a read/write head writes over a portion of a
disk drive 170.FIG. 2 is a schematic diagram of the surface of a storage portion of ahard drive 170. The read/write head moves in the paths ortracks 225 depicted inFIG. 2 . Thefringes 226 of thetracks 225 may be magnetized to some extent during the data writing process, although thefringes 226 may be magnetized relatively weakly as compared to the central area of thetracks 225. Moreover, data in thefringes 226 may be incompletely erased by the write-over process. Such incompletely erased data may be recovered with forensic technologies. Thesystem 100, however, enables complete erasure of ahard drive 170, such that data erased from thedrive 170 cannot be forensically recovered. Note that thetrack 225 andfringes 226 are only shown schematically and that there may be relatively gradual rather than sudden transitions between where the tracks 225 (where a write-over is sufficiently complete so that data is unrecoverable) and the fringes 226) where data is recoverable due to incomplete write-over). - In one embodiment, the
control module 140 provides a “low frequency” write-over of the entirehard drive 170 to be erased. The write over may be performed, for example by a software program, such as the HDDErase 2.0 Beta Software. The low-frequency is the frequency of the magnetizing electrical current provided to the magnetizing write heads in thehard drive 170 being erased. The low-frequency is chosen to be lower than the frequency normally used by thehard drive 170 to write data. As the frequency is lowered, the effective write-over area of thetrack 225 is widened Preferably, the low-frequency for a given drive is chosen to be low enough to increase the area of thetrack 225 so that there are nofringes 226 left with sufficient data that may be forensically recovered, i.e., to completely erase thedrive 170. A predetermined number of such write-overs are conducted to erase thedrive 170. The user can select the number of write-overs or use a default selection. - The low-frequency of the write-over depends on the type of
hard drive 170 to be erased. For example, for a Seagate Barracuda drive, the low-frequency used is preferably between about 20 Mhz and about 0 Mhz as compared to the normal frequency of about 50 Mhz or greater. A frequency of 0 Mhz causes thedrive 170 to be overwritten with a DC signal. As conventionally used,hard drives 170 will not perform a “DC Erase.” In an exemplary embodiment, the erase module causes thehard drive 170 to perform a DC Erase by providing a signal to thehard drive 170 through the printed circuit board (not shown) of thehard drive 170. - Optionally, the
module 140 is configured to erasehard drives 170 by a variety of different methods. For example, the system can be configured to erase ahard drive 170 using a low-frequency erase procedure as described above and one or more conventional write-over processes, such as multiple write-over procedures or off-track write-over procedures. - In another embodiment, the
module 140 copies predetermined files from thehard drive 170 to thestorage device 122, a differenthard drive 170 in adifferent bay 110, or an external hard drive (not shown). Themodule 140 then completely erases the drive and replaces the predetermined copied files on the drive. Themodule 140 can also be configured to ghost (i.e., completely copy) ahard drive 170 onto a differenthard drive 170. Further, themodule 140 can also be configured to provide post-erase procedures, such as reformatting or repartitioning of thehard drive 170. - In an additional embodiment, the
module 140 is configured to provide privacy protection erase processes that do not require any data on ahard drive 170 to be read prior to the erase procedure. For this, themodule 140 writes sectors of thehard drive 170 with one or more flags (i.e., predetermined data). After the erase procedure is complete, themodule 140 reads the previously flagged portions of thedrive 170 to ensure that the data was erased. Alternatively, themodule 140 could first write over thedrive 170, then perform an erase procedure and then read the drive to ensure that the data was erased. With these procedures, there is no need to read the data originally contained on ahard drive 170. - In a further embodiment,
module 140 is configured to provide certificates providing information regarding ahard drive 170 that has been erased or otherwise processed by thesystem 100. The certificate can contain, for example, hard drive identification information, such as the drive serial number, the drive manufacture, drive model, drive size; a start date/time stamp; an end date/time stamp; the erasure method or procedure conducted (e.g., ghosting, formatting, etc.); an indication of success or failure; the user who initiated the erase procedure; among other information In one aspect, a condition for certification is that thedrive bay 110 remains closed and locked for the entire erasure process. The certificate can be in any format (e.g., any file format, electronic, printed, among others). -
FIG. 3A illustrates one embodiment of a process for erasing ahard drive 170 using the system 100 (FIG. 1 ) according to an embodiment of the invention. It should be understood that the sequence of the steps described in connection withFIG. 3A can be altered and additional steps may be added. - In
step 201 thesystem 100 is activated or “booted up” by the user. Upon system boot, the user is presented with agraphical user interface 101. Optionally, the user is required to enter login information using theuser interface 101. The requirement for login information is particularly useful if use of thesystem 100 is to be restricted to specific users. Any suitable login scheme can be used, such as a pass code, biometrics, and voice recognition, among others. - Upon entering invalid login information in
step 202, the user is prevented from accessing the erasemodule 140 instep 203. If the user inputs valid login information instep 202 the user is able to interface with themodule 140 atstep 204. Multiple users may have access to thesystem 100 at a same time. - Using the
user interface 101, the user can begin an erase procedure, view erase logs and certificates stored on thestorage device 122, and manage thesystem 100. These procedures will be described in more detail below. - The user begins an erase procedure at
step 205 For this, theuser 140 installs ahard drive 170 to be erased and locks thedrive bay 110 to which thehard drive 170 was installed. Alternatively, thesystem 100 can be connected to thehard drive 170 in situ. Atstep 206, the erasemodule 140 detects that thehard drive 170 is installed and thelocking mechanism 111 is in a locked state. - In
step 207, the user can then select the erase method to be used by inputting information into theuser interface 101. Alternatively, the user can accept a default erase method preset in thesystem 100. In one embodiment, the user can also select to have certain files copied from thehard drive 170 to storage device 122 (or a differenthard drive 170 in a different bay 110), and then replaced on the drive after it is erased, or to have the contents of thehard drive 170 ghosted to the differenthard drive 170. - Once the erase method is selected, the user initiates the erase procedure in
step 208. The user may allow the erase procedure to be completed or may terminate the procedure prior to completion. Upon completion or termination of the erase procedure in step 209 (whether or not successful), the results are stored on thestorage device 122. - In
step 211, the user selects to receive an erase certificate. In one embodiment the certificate is printed in the form of a label to be affixed to thedrive 170. Optionally, the certificate can also be sent in electronic form or other form, to a third party. For example, the erase certificate may be sent in electronic form via theInternet 151 to a third party. The third party can be a certificate service that will verify the certificate to prove that thehard drive 170 has been successfully or unsuccessfully erased. - In
step 213, the user removes the erasedhard drive 170 from thedrive bay 110. If the user has printed an erase certificate (e.g., in label form), the user places the erase certificate on the erasedhard drive 170. - In
step 210, the user can manage thesystem 100, including allbays 110. The user can, for example set, or change their own password, select default erase methods for thedrive bays 100, among others. The user can also receive updates for the erasemodule 140. - In step 212, the user can view the
system 100 logs and erase certificates. Optionally, the erasemodule 140 can be configured to enable the user to search the erase logs based on desired search criteria. -
FIG. 3B illustrates a process of using asystem 100 having at least first second and third drive bays 110-1, 110-2, 110-3, respectively according to another embodiment of the invention. The method depicted inFIG. 3B is particularly useful in forensic applications. If evidence of a crime or event is in the form of ahard drive 170 or data thereon, it is necessary to preserve thehard drive 170 and any data thereon, but it is also desirable to analyze thehard drive 170 and its data without unduly disturbing the evidence and while maintaining a clear chain of custody. A solution is to copy the evidence hard drive to one or more other hard drives that are known to be free of data. - In
step step 303, the erase procedures are certified as described above in connection withstep 211 ofFIG. 3A . - In
step 304, the evidence hard drive 170-3 is placed in a third drive bay 110-3. The drive is then ghosted to each of the first and second drives 170-1, 170-2 in drive bays 110-1, 110-2. That is, all data from the evidence drive is copied to each of the first and second drives 170-1, 170-2 in drive bays 110-1, 110-2. - If desired, the evidence drive 170-3, the drive is erased securely in
step 306. A certificate for this erase procedure and/or ghosting procedure can also be provided instep 307. The evidence drive, whether or not erased, may then be kept by appropriate authorities or returned to its owner. The copied first andsecond drives 170 can be analyzed. Alternatively, if needed, one of the copied hard drives 170-1, 170-2 can be stored by appropriate authorities as evidence. - Although the process described above in connection with
FIG. 3B include making two copies of ahard drive 170, additional or fewer copies can be made as necessary or desired. -
FIGS. 4-13 depict structural configurations for a hard drive erase system 100 (FIG. 1 ) according to exemplary embodiments of the invention. - Referring to
FIG. 4 , thesystem 100 includes a stand-alone base apparatus 700. The term stand-alone means that theapparatus 700 is configured to receive or connect to ahard drive 170 such that impediments to data erasure, such as the native device's BIOS, components of the hard drive itself, among others, are avoided. For example, theapparatus 700 can receive ahard drive 170 that is normally used with a efferent device, such as a personal computer (PC) for allowing the PC user functional access to the data. Alternatively, theapparatus 700 can be connected to ahard drive 170 in situ in its native device. - This is distinguishable from the conventional erasure technique described above of simply loading erasure software onto the PC to attempt to erase data from the PC
hard drive 170 in its native device or as it is conventionally connected to enable user access to the data stored on thehard drive 170. Preferably, theapparatus 700 is physically separate from other apparatuses. However, theapparatus 700 may be physically adjacent to or physically incorporated into another apparatus or device, and may be in communication with another device via theInternet 151 or a computer network. - The
base apparatus 700 can includedrive bays 110, which are accessible via an access means, such asdoor 705, an opening, among others. Alternatively, where theapparatus 700 is to connect to ahard drive 170 in situ, one or more of thedrive bays 110 can instead be a connecting means, such as a cable, probe or other device for providing communication between components of theapparatus 700 and the in situhard drive 170. - The
apparatus 700 also includes auser interface 101. Hard drives 170 a placed in theapparatus 170 and connected to a connecting device, such as a port, cable, probe, or any device, mechanism or means for establishing communication betweensystem 100 and ahard drive 170. In one embodiment, thehard drive 170 is connected such that components that interfere with data erasure of thehard drive 170 are avoided.Cable connections 110 a are shown inFIG. 5 as the connecting device, but other connections, such as aprobe 110 b, among others, can be used. -
FIG. 5 depicts a more complex embodiment of thesystem 100 including thebase apparatus 700. In the illustrated embodiment, theadditional bays 110 are included insupplemental apparatuses Supplemental apparatuses drive bays 110 and means for interfacing with the base apparatus 700 (e.g., a port, cable, or any device, mechanism or means for establishing communication between thesupplemental apparatus base apparatus 700 such that thedrive bays 110 of thesupplemental apparatus FIG. 5 , the supplemental apparatuses can be stackable over or under thebase apparatus 700 and can be in the form ofdrawers 805 or aplatform 806. -
FIGS. 6-10 depict a readily portable structural embodiment of thesystem 100. As shown inFIGS. 6 and 7 , thesystem 100 can configured within a singleportable base apparatus 1000.FIG. 6 is a front and side view of theapparatus 1000 andFIG. 7 is a rear view of theapparatus 1000. Thebase apparatus 1000 includes an optional handle 1002 (FIG. 6 ) to promote portability. Thebase apparatus 1000 includes aninterface 1156 for a power cord, so that thebase apparatus 1000 can be connected to a power source. Thebase apparatus 1000 can also include a rechargeable battery (not shown) to enable use where a power source is not readily available. - The base apparatus also includes user interface 101 (
FIG. 6 ), which is shown as a touch screen interface. The user interface could also be another type of interfaces, such as a screen and keyboard and/or an audio interface. Theoutput device 125 is an integrated label printer having alabel dispenser 1125 for printing certificates in the form of labels as described above. Thebase apparatus 1000 also includes ports 1155 (FIG. 7 ) (e.g., USB, ethernet and phone ports) to allow the base apparatus to be connected to the Internet and/orother base apparatuses 1000 or devices. - The
apparatus 1000 also includesdrive bays 110. Eachdrive bay 110 includes anopening 1012, which is configured to receive adrive module 1100. Thedrive module 1100, in turn, is configured to receive ahard drive 170.FIGS. 8-10 show additional views of thedrive module 1100. As explained in more detail below, with the configuration of thedrive bays 110 and drivemodules 1100 illustrated in FIGS. 6 and 8-10, cables are not needed to provide a connection betweenhard drives 170 and thesystem 100. - As shown in
FIG. 6 , eachdrive bay 110 includes aport 1010, shown as a USB port, within theopening 1012. Eachdrive module 1100 includes aport 1110 configured to connect to theport 1010 of thedrive bay 110. Thus, eachdrive module 1100 can be used interchangeably in each of thedrive bays 110. It should be understood that any suitable port or connection providing communication between thedrive module 1100 and thedrive bay 110 can be used. - Each
drive module 1100 also includes one or morehard drive ports 1160, 1161 (FIG. 8 ) configured to receive ahard drive 170. So that thesystem 100 can accommodate different types ofhard drives 170,different drive modules 1100 can havedifferent ports hard drives 170. - Preferably, the one or
more ports interface ports different ports drive module 1100 and replaced with another interface board. This provides a cost reduction as compared to replacing theentire drive module 1100. - The
drive module 1100 also includes a harddrive support portion 1120. Thesupport portion 1120 serves to stabilize thehard drive 170 when it is connected to thedrive module 1100. In the illustrated embodiment, thesupport portion 1120 also serves as a guide when thedrive module 1100 is placed in adrive bay 110 to ensure that thedrive module port 1110 connects to thedrive bay port 1010.FIG. 10 depicts a side view of ahard drive 170 connected to adrive module 1100. - In the illustrated embodiment, the support portion is connected to the
drive module 1100 by ahinge 1121. Accordingly, thesupport portion 1120 can be position in an open position (FIG. 8 ) or a closed position (FIG. 9 ). When in a closed position,support portion 1120 covers and protects theports - Each
drive module 1100 includes alatch 1111, which activates alocking mechanism 111, such as a solenoid lock, among others. As shown inFIG. 6 , eachdrive module 1100 also includes astatus indicator 112. In the embodiment ofFIG. 6 , the status indicator includes LEDs of varying colors, which signal the status of thehard drive 170 in thedrive bay 110. For example, green can indicate that a procedure is complete and thehard drive 170 can be removed, while red can indicate that a procedure is in progress and thedrive bay 110 should not be opened. - It should be understood that one or
more drive bays 110 according to the embodiments described herein could also be included in a conventional computer device. For example, adrive bay 110, including adrive module 1100, can be provided in a personal computer or other device to enable the device to accommodate various types of hard drives. -
FIGS. 11-13 depict more complex embodiments of thesystem 100 including thebase apparatus 1000. -
FIG. 11 shows the base apparatus in communication with a laptop computer 1199 (or other personal computer device) and an externalhard drive 1198 via ports 1155 (FIG. 7 ). In this configuration, thebase apparatus 1000 serves as an external hard drive to thelaptop 1199. The externalhard drive 1198 can serve as thestorage device 122 and/or receive data copied fromhard drives 170 within thedrive bays 110. -
FIG. 12 illustrates multiple base apparatuses connected together via ports 1155 (FIG. 7 ) in a “daisy-chain” manner. In this configuration, eachapparatus 1000 can function as both a client and a host device. Further, anexpansion bay 1210 is connected to and in communication with abase apparatus 1000. Theexpansion bay 1210 includesadditional drive bays 110, which are operated through thebase apparatus 1000 to which theexpansion bay 1210 is connected. -
FIG. 13 depicts a “hub-and spoke” configuration ofapparatuses 1000. In theFIG. 13 embodiment, theapparatuses 1000/1300 that are connected to multipleother apparatuses 1000 serve as a hub for controlling thoseother apparatuses 1000. - It should be understood that a variety of other configurations including one or
more apparatuses 1000 are possible. Further, such other configurations can include anexpansion bay 1210, laptop 1199(or other personal computing device) or externalhard drive 1198. - The structural configurations depicted in
FIGS. 4-13 are examples only and other structural configurations are possible. Further, the processes and devices described above illustrate preferred methods and devices of many that could be used and produced. The above description and drawings illustrate exemplary embodiments, which achieve the objects, features, and advantages of the present invention. It is not intended, however, that the present invention be strictly limited to the above-described and illustrated embodiments. Any modifications of the present invention that come within the spirit and scope of the following claims should be considered part of the present invention.
Claims (52)
1. An apparatus for erasing hard drives, the apparatus comprising:
a control device, the control device configured to support an erase module, the erase module configured to erase a hard drive such that data erased from the hard drive is forensically unrecoverable;
a user interface; and
at least one drive bay configured to provide communication between a hard drive and the control device.
2. The apparatus of claim 1 , wherein the erase module is configured to provide a current having a lower frequency than a current used to write the data.
3. The apparatus of claim 1 , wherein the communication between the hard drive and the control device is configured such that impediments to data erasure in the hard drive are avoided.
4. The apparatus of claim 1 , wherein communication between the hard drive and control device is provided by a cable.
5. The apparatus of claim 1 , wherein the drive bay comprises:
an opening, a first port located within the opening, and a drive module, the drive module having at least one second port configured to receive a hard drive and at least one third port for connecting to the first port.
6. The apparatus of claim 5 , wherein the drive module further comprises a support portion configured to stabilize the received hard drive.
7. The apparatus of claim 1 , further comprising a storage device configured to store information about an erase procedure.
8. A system for erasing hard drives, the system comprising: a control device, the control device configured to support an erase module, the erase module configured to erase a hard drive such that data erased from the hard drive is forensically unrecoverable;
a user interface enabling user input;
a plurality of drive bays connected to the control device, each drive bay configured to provide communication between a hard drive and the control device;
a storage device in communication with the control unit for storing information; and an output device in communication with the control unit for outputting information.
9. The system of claim 8 , further comprising a network connection device enabling the control device to connect to a computer network.
10. The system of claim 9 , wherein the network connection device enables the control device to connect to the Internet.
11. The system of claim 8 , wherein at least one drive bay further comprises a locking device, the locking device being in communication with the control device.
12. The system of claim 8 , wherein the user interface is a touch screen monitor.
13. The system of claim 8 , wherein the output device is a printer.
14. The system of claim 8 , wherein the plurality of drive bays are configured to be modular, such that one or more drive bays can be connected or disconnected from the control device.
15. The system of claim 8 , wherein at least one drive bay comprises a cable for providing communication between the hard drive and the control device.
16. The system of claim 8 , wherein each drive bay comprises:
an opening, a first port located within the opening, and a drive module, the drive module having at least one second port configured to receive a hard drive and at least one third port for connecting to the first port.
17. The system of claim 16 , wherein the second port of a first drive module is configured to receive a first type of hard drive and the second port of a second hard drive module is configured to receive a second type of hard drive.
18. The system of claim 16 , wherein the at least second port is provided on an interface board, and wherein the interface board is removable from the drive module.
19. The system of claim 16 , further comprising a plurality of locking devices, each locking device configured to lock a drive module into the opening of the respective drive bay.
20. The system of claim 16 , wherein each drive module further comprises a support portion configured to stabilize the received hard drive.
21. The system of claim 20 , wherein the support portion is affixed to the drive module by a hinge, such that the support portion is moveable between an opened position and a closed position.
22. The system of claim 21 , wherein, in the closed position, the support portion covers the second and third ports.
23. The system of claim 8 , wherein the control device, storage device and plurality of drive bays are integrated within a single apparatus.
24. The system of claim 23 , wherein the apparatus is portable.
25. The system of claim 23 , wherein the output device is integrated within the apparatus.
26. A computer device comprising:
at least one drive bay comprising a first port and configured to receive a drive module, and at least one drive module, the at least one drive module having at least one second port configured to receive a hard drive and at least one third port for connecting to the first port.
27. The device of claim 26 , wherein the second port of a first drive module is configured to receive a first type of hard drive and the second port of a second hard drive module is configured to receive a second type of hard drive.
28. The device of claim 26 , wherein the at least second port is provided on a first interface board, and wherein the first interface board is removable from the drive module.
29. The device of claim 28 , wherein the drive module is configured to receive a second interface board in place of the first interface board, the second interface board comprising at least a fourth port configured to receive a second type of hard drive.
30. The device of claim 26 , wherein each drive module further comprises a support portion configured to stabilize the received hard drive.
31. The device of claim 30 , wherein the support portion is affixed to the drive module by a hinge, such that the support portion is moveable between an opened position and a closed position.
32. The system of claim 31 , wherein, in the closed position, the support portion covers the second and third ports.
33. The device of claim 26 , wherein the drive module is removable from the drive bay.
34. A method for erasing at least one hard drive, the method comprising the acts of:
providing an apparatus configured to erase a hard drive, the apparatus comprising a plurality of drive bays, each drive bay for receiving a hard drive and providing communication between the hard drive and the apparatus;
placing a first hard drive to be erased in a first drive bay; copying data from the hard drive;
storing the copied data; and
operating the apparatus to conduct an erase procedure to erase data from the first hard drive, such that the data is forensically unrecoverable.
35. The method of claim 34 , further comprising, subsequent to the erase procedure, operating the apparatus to rewrite the copied data to the first hard drive.
36. The method of claim 34 , further comprising placing a second hard drive in a second drive bay, wherein the copied data is stored to the second hard drive.
37. The method of claim 36 , further comprising, prior to storing the copied data, operating the apparatus to conduct an erase procedure to erase data from the second hard drive.
38. The method of claim 34 , wherein the apparatus further comprises a storage device, and further comprising operating the apparatus to store information about the erase procedure to the storage device, the stored information comprising at least one item from the group consisting of a drive serial number, a drive manufacture, a drive model, a drive size, a start date/time stamp, an end date/time stamp, an erasure method, an indication of success or failure, and a user who initiated the erase procedure.
39. The method of claim 34 , wherein the apparatus further comprises an output device and further comprising operating the output device to output a certificate containing information about the erase procedure, the certificate information comprising at least one item from the group consisting of: a drive serial number, a drive manufacture, a drive model, a drive size, a start date/time stamp, an end date/time stamp, an erasure method, an indication of success or failure, and a user who initiated the erase procedure.
40. A method for erasing at least one hard drive, the method comprising the acts of:
providing an apparatus configured to erase a hard drive, the apparatus comprising a storage device, an output device and at least one drive bay for providing communication between a hard drive and the apparatus; placing a first hard drive in a first drive bay;
operating the apparatus to conduct a first erase procedure to erase data from the first hard drive; and storing information to the storage device about the first erase procedure, the stored information comprising at
least one item from the group consisting of: a drive serial number, a drive manufacture, a drive model, a drive size, a start date/time stamp, an end date/time stamp, an erasure method, an indication of success or failure, and a user who initiated the erase procedure.
41. The method of claim 40 , wherein the apparatus further comprises an output device and further comprising operating the output device to output a certificate containing information about the first erase procedure, the certificate information comprising at least one item from the group consisting of: a drive serial number, a drive manufacture, a drive model, a drive size, a start date/time stamp, an end date/time stamp, an erasure method, an indication of success or failure, and a user who initiated the erase procedure.
42. The method of claim 40 , wherein conducting the first erase procedure comprises writing over the data to be erased using a current having a lower frequency than a current used to write the data.
43. The method of claim 40 , wherein the act of placing the first hard drive in the first drive bay comprises providing communication between the hard drive and the apparatus such that impediments to data erasure in the hard drive are avoided.
44. The method of claim 40 , further comprising locking the first hard drive within the first drive bay using a locking device.
45. The method of claim 40 , further comprising detecting a locked or unlocked status of the locking device.
46. The method of claim 45 , wherein, if, during the first erase procedure, the detected status of the locking device is unlocked, designating the erase procedure as failed.
47. The method of claim 40 , wherein the first erase procedure renders the erased data forensically unrecoverable.
48. The method of claim 40 , wherein the act of conducting the first erase procedure comprises conducting a predetermined number of write-overs.
49. The method of claim 40 , further comprising placing a second hard drive in a second drive bay.
50. The method of claim 40 , further comprising conducting a second erase procedure during at least a portion of a same time that the first erase procedure is being conducted.
51. The method of claim 40 , wherein the first erase procedure comprises:
(a) writing over the first hard drive, erasing all data from the first drive such that the erased data is forensically unrecoverable, and (b) confirming that the data was erased by reading at least a portion of the first hard drive, wherein (a), (b) and (c) are conducted in order.
52. The method of claim 40 , wherein the first erase procedure comprises:
(a) writing predetermined data to a plurality of portions of the first hard drive, (b) erasing all data from the first drive such that the erased data is forensically unrecoverable, and (c) confirming that the data was erased by reading only the plurality of portions of the first hard drive written to in (a), wherein (a), (b) and (c) are conducted in order.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/525,770 US20120303920A1 (en) | 2005-10-20 | 2012-06-18 | Hard drive eraser |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US72832005P | 2005-10-20 | 2005-10-20 | |
US11/583,150 US7725674B2 (en) | 2005-10-20 | 2006-10-19 | Hard drive eraser |
US12/777,321 US20100220572A1 (en) | 2005-10-20 | 2010-05-11 | Hard drive eraser |
US13/525,770 US20120303920A1 (en) | 2005-10-20 | 2012-06-18 | Hard drive eraser |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/777,321 Continuation US20100220572A1 (en) | 2005-10-20 | 2010-05-11 | Hard drive eraser |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120303920A1 true US20120303920A1 (en) | 2012-11-29 |
Family
ID=37963260
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/583,150 Expired - Fee Related US7725674B2 (en) | 2005-10-20 | 2006-10-19 | Hard drive eraser |
US12/777,321 Abandoned US20100220572A1 (en) | 2005-10-20 | 2010-05-11 | Hard drive eraser |
US13/525,770 Abandoned US20120303920A1 (en) | 2005-10-20 | 2012-06-18 | Hard drive eraser |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/583,150 Expired - Fee Related US7725674B2 (en) | 2005-10-20 | 2006-10-19 | Hard drive eraser |
US12/777,321 Abandoned US20100220572A1 (en) | 2005-10-20 | 2010-05-11 | Hard drive eraser |
Country Status (8)
Country | Link |
---|---|
US (3) | US7725674B2 (en) |
EP (1) | EP1952248A4 (en) |
JP (1) | JP2009512968A (en) |
CN (1) | CN101331467A (en) |
CA (1) | CA2666963A1 (en) |
IL (1) | IL190950A0 (en) |
RU (1) | RU2008120022A (en) |
WO (1) | WO2007047802A2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793299A (en) * | 2014-02-18 | 2014-05-14 | 重庆爱思网安信息技术有限公司 | Evidence taking all-in-one machine |
US20150309754A1 (en) * | 2014-04-24 | 2015-10-29 | Michael Smithwick | System and Method for Erasing Data on an Electronic Device |
CN105824577A (en) * | 2016-03-10 | 2016-08-03 | 福州瑞芯微电子股份有限公司 | Method and system for optimizing secure erase |
GB2559398A (en) * | 2017-02-04 | 2018-08-08 | PQ Solutions Ltd | Controlled and verifiable information destruction |
US11113227B2 (en) * | 2019-04-10 | 2021-09-07 | Steven Bress | Erasing device for long-term memory devices |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8793457B2 (en) * | 2007-01-22 | 2014-07-29 | International Business Machines Corporation | Method and system for policy-based secure destruction of data |
US20080201342A1 (en) * | 2007-02-03 | 2008-08-21 | Stec, Inc | Data storage device management system and method |
JP4937863B2 (en) * | 2007-09-05 | 2012-05-23 | 株式会社日立製作所 | Computer system, management computer, and data management method |
DE102008012199A1 (en) | 2008-03-03 | 2009-09-17 | Weber, Christof | Data media e.g. hard disk, erasing device, has insert elements provided for receiving data media in fiber channel and small computer system interface formats, and controllers for simultaneous controlling of different data medium types |
US8145891B2 (en) * | 2009-04-09 | 2012-03-27 | Dell Products L.P. | Bios-selectable data wiping system |
GB2470198A (en) * | 2009-05-13 | 2010-11-17 | Evidence Talks Ltd | Digital forensics using a control pod with a clean evidence store |
US8832459B2 (en) * | 2009-08-28 | 2014-09-09 | Red Hat, Inc. | Securely terminating processes in a cloud computing environment |
US8554741B1 (en) | 2010-06-16 | 2013-10-08 | Western Digital Technologies, Inc. | Timeline application for log structured storage devices |
US9454355B2 (en) | 2010-07-15 | 2016-09-27 | Dell Products L.P. | Information handling system image restoration |
US9007961B2 (en) | 2010-11-22 | 2015-04-14 | May Patents Ltd. | Apparatus and method for using and solving linear programming problem and applications thereof |
CN103164341B (en) * | 2012-07-04 | 2016-08-03 | 北京安天电子设备有限公司 | The quickly method and system of file in erasing mass-memory unit |
JP2014206967A (en) * | 2013-03-18 | 2014-10-30 | 株式会社Genusion | Storage device |
US9396359B2 (en) * | 2013-09-09 | 2016-07-19 | Whitecanyon Software, Inc. | System and method for encrypted disk drive sanitizing |
US9244627B2 (en) * | 2013-10-15 | 2016-01-26 | Synetic Technologies, Inc. | Secure data erasure system for erasing a plurality of data storage devices |
US9363085B2 (en) | 2013-11-25 | 2016-06-07 | Seagate Technology Llc | Attestation of data sanitization |
CN103956172B (en) * | 2014-03-28 | 2017-11-07 | 华为技术有限公司 | Hard disk and its demagnetization method and degaussing gear |
US9763895B2 (en) | 2014-08-02 | 2017-09-19 | Heart Healthy Spirits, LLC | Tincture for infusing flavonoids and methods of use |
US9358216B2 (en) | 2014-08-02 | 2016-06-07 | Heart Healthy Spirits, LLC | Tincture for infusing resveratrol and methods of use |
US9971899B2 (en) | 2016-01-04 | 2018-05-15 | International Business Machines Corporation | Secure, targeted, customizable data removal |
CN108335694B (en) | 2018-02-01 | 2021-10-15 | 北京百度网讯科技有限公司 | Far-field environment noise processing method, device, equipment and storage medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4494156A (en) * | 1982-05-14 | 1985-01-15 | Media Systems Technology | Selectable format computer disk copier machine |
US5375243A (en) * | 1991-10-07 | 1994-12-20 | Compaq Computer Corporation | Hard disk password security system |
JPH08129864A (en) * | 1994-10-28 | 1996-05-21 | Meisei Electric Co Ltd | Loading structure and device structure for equipment unit |
USD382861S (en) * | 1996-03-15 | 1997-08-26 | Micronet Technology, Inc. | Housing for removable computer storage modules |
US6070228A (en) * | 1997-09-30 | 2000-05-30 | International Business Machines Corp. | Multimedia data storage system and method for operating a media server as a cache device and controlling a volume of data in the media server based on user-defined parameters |
US6076142A (en) * | 1996-03-15 | 2000-06-13 | Ampex Corporation | User configurable raid system with multiple data bus segments and removable electrical bridges |
US20010051963A1 (en) * | 2000-03-22 | 2001-12-13 | Shinichi Nishikawa | Network print system |
US6351374B1 (en) * | 1996-08-19 | 2002-02-26 | Raymond C. Sherry | Removable hard disk drive module |
US20020042919A1 (en) * | 2000-05-25 | 2002-04-11 | Sturza Mark Alan | Method for utilizing excess communications capacity |
US20020078026A1 (en) * | 2000-12-14 | 2002-06-20 | Fergus Joseph E. | Method and apparatus for bulk data remover |
US20030074576A1 (en) * | 2001-10-17 | 2003-04-17 | Kelly Thomas W. | Positive disconnect device for networked computer |
US20030103288A1 (en) * | 2001-11-30 | 2003-06-05 | Kabushiki Kaisha Toshiba | Recording and regeneration apparatus and data erasure method for use in the recording and regeneration apparatus |
Family Cites Families (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0754564B2 (en) * | 1982-12-15 | 1995-06-07 | キヤノン株式会社 | Erasing device in recording or reproducing device |
JPS59142705A (en) * | 1983-02-02 | 1984-08-16 | Canon Inc | Erasing device of recording or reproducing device |
US4984225A (en) | 1987-03-31 | 1991-01-08 | Kabushiki Kaisha Toshiba | System for applying magnetic field to opto-magnetic memory |
JPH01269260A (en) * | 1988-04-21 | 1989-10-26 | Fujitsu Ltd | Magneto-optical recording method |
US4932522A (en) | 1989-09-21 | 1990-06-12 | Milovich Steven L | CD storage with automatic opening device |
US5056081A (en) | 1990-01-02 | 1991-10-08 | Tandy Corporation | System and method for erasing light-responsive optical disks |
JPH0487002A (en) | 1990-07-31 | 1992-03-19 | Toshiba Corp | Information recording medium processor |
JPH08249819A (en) * | 1995-03-10 | 1996-09-27 | Matsushita Electric Ind Co Ltd | Recording and reproducing device |
US5652695A (en) * | 1995-05-05 | 1997-07-29 | Dell Usa, L.P. | Hard drive carrier design permitting floating retention of a connector assembly to facilitate blind mating of the connector assembly in a hard drive bay |
US5721665A (en) | 1995-08-18 | 1998-02-24 | Data Security, Inc. | Modulated magnet field bulk degaussing system |
US5845319A (en) * | 1995-08-23 | 1998-12-01 | Fujitsu Limited | Disk array device which separates local and physical disks using striping and operation mode selection |
KR100190529B1 (en) * | 1996-08-12 | 1999-06-01 | 윤종용 | Computer system with vtr |
US6131141A (en) | 1996-11-15 | 2000-10-10 | Intelligent Computer Solutions, Inc. | Method of and portable apparatus for determining and utilizing timing parameters for direct duplication of hard disk drives |
US6570727B1 (en) | 1997-04-30 | 2003-05-27 | International Business Machines Corporation | Method and apparatus for erasing information from a disk within a magnetic disk drive using an externally generated magnetic field |
JPH11272562A (en) * | 1998-03-19 | 1999-10-08 | Toshiba Corp | Storage contents deletion method for computer system and storage medium |
US6142796A (en) * | 1999-06-08 | 2000-11-07 | Behl; Sunny | Collapsible hard disk drive docking adapter |
JP2001092719A (en) * | 1999-09-21 | 2001-04-06 | Eco-Logistics Inc | Device and method for discarding information of storage device, storage medium and transmission medium |
JP2001184662A (en) * | 1999-12-24 | 2001-07-06 | Kenwood Corp | Recording/reproducing device for recording medium |
US6651192B1 (en) | 2000-11-30 | 2003-11-18 | Western Digital Technologies, Inc. | Method and system for testing reliability attributes in disk drives |
US6668305B1 (en) * | 2001-01-16 | 2003-12-23 | Sun Microsystems, Inc. | Method and apparatus for the staggered startup of hard disk drives |
EP1358590A1 (en) * | 2001-02-11 | 2003-11-05 | Tüv Rheinland Holding Ag | Method for managing certification data |
US7216083B2 (en) * | 2001-03-07 | 2007-05-08 | Diebold, Incorporated | Automated transaction machine digital signature system and method |
JP3976227B2 (en) * | 2001-06-18 | 2007-09-12 | 日立ソフトウエアエンジニアリング株式会社 | Terminal data erasure management method and program. |
AU2002315365A1 (en) * | 2001-06-21 | 2003-01-08 | Dan Bress | Systems and methods for removing data stored on long-term memory devices |
JP3088608U (en) | 2002-03-14 | 2002-09-20 | オリエント測器コンピュータ株式会社 | Hard disk drive recording data erasing device |
JP2004110908A (en) | 2002-09-17 | 2004-04-08 | Fujitsu Ltd | Data erasing device and its carry case |
JP2004192682A (en) | 2002-12-09 | 2004-07-08 | Orient Sokki Computer Kk | Device and method for erasing recorded data in magnetic storage device |
JP4071096B2 (en) | 2002-12-09 | 2008-04-02 | オリエント測器コンピュータ株式会社 | Recorded data erasing device for magnetic storage device |
RU2005132172A (en) | 2003-03-18 | 2006-04-10 | Инсконс Дэйта Текнолоджи (Us) | TECHNOLOGY OF UNRESTORABLE FAILURE ON REQUEST FOR DISC |
US20040243734A1 (en) * | 2003-05-26 | 2004-12-02 | Canon Kabushiki Kaisha | Information processing apparatus, method of controlling the same, control program, and storage medium |
JP4064885B2 (en) | 2003-08-20 | 2008-03-19 | 富士通株式会社 | Data eraser |
US20050082182A1 (en) | 2003-10-15 | 2005-04-21 | Mcbrady Mark S. | Storage device for compact disk box |
JP2005149614A (en) * | 2003-11-14 | 2005-06-09 | Orient Sokki Computer Kk | Method for disposing of data recording medium |
US7509452B2 (en) * | 2004-01-19 | 2009-03-24 | Ricoh Company, Ltd. | Image forming apparatus, erasing method, and hard disk management method |
JP2005244656A (en) * | 2004-02-26 | 2005-09-08 | Matsushita Electric Ind Co Ltd | Composite machine |
JP4212503B2 (en) * | 2004-03-30 | 2009-01-21 | シャープ株式会社 | Control system, control device, storage device, and computer program |
JP4386787B2 (en) * | 2004-04-21 | 2009-12-16 | シャープ株式会社 | Data processing apparatus and image forming apparatus |
US7301886B2 (en) * | 2004-05-10 | 2007-11-27 | Hewlett-Packard Development Company, L.P. | Storage device having a read circuit to detect a storage state based on interaction between a probe and a storage medium |
-
2006
- 2006-10-19 RU RU2008120022/09A patent/RU2008120022A/en not_active Application Discontinuation
- 2006-10-19 JP JP2008536785A patent/JP2009512968A/en active Pending
- 2006-10-19 CN CNA2006800477207A patent/CN101331467A/en active Pending
- 2006-10-19 CA CA002666963A patent/CA2666963A1/en not_active Abandoned
- 2006-10-19 EP EP06826239A patent/EP1952248A4/en not_active Withdrawn
- 2006-10-19 US US11/583,150 patent/US7725674B2/en not_active Expired - Fee Related
- 2006-10-19 WO PCT/US2006/040805 patent/WO2007047802A2/en active Application Filing
-
2008
- 2008-04-17 IL IL190950A patent/IL190950A0/en unknown
-
2010
- 2010-05-11 US US12/777,321 patent/US20100220572A1/en not_active Abandoned
-
2012
- 2012-06-18 US US13/525,770 patent/US20120303920A1/en not_active Abandoned
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4494156A (en) * | 1982-05-14 | 1985-01-15 | Media Systems Technology | Selectable format computer disk copier machine |
US5375243A (en) * | 1991-10-07 | 1994-12-20 | Compaq Computer Corporation | Hard disk password security system |
JPH08129864A (en) * | 1994-10-28 | 1996-05-21 | Meisei Electric Co Ltd | Loading structure and device structure for equipment unit |
USD382861S (en) * | 1996-03-15 | 1997-08-26 | Micronet Technology, Inc. | Housing for removable computer storage modules |
US6076142A (en) * | 1996-03-15 | 2000-06-13 | Ampex Corporation | User configurable raid system with multiple data bus segments and removable electrical bridges |
US6351374B1 (en) * | 1996-08-19 | 2002-02-26 | Raymond C. Sherry | Removable hard disk drive module |
US6070228A (en) * | 1997-09-30 | 2000-05-30 | International Business Machines Corp. | Multimedia data storage system and method for operating a media server as a cache device and controlling a volume of data in the media server based on user-defined parameters |
US20010051963A1 (en) * | 2000-03-22 | 2001-12-13 | Shinichi Nishikawa | Network print system |
US20020042919A1 (en) * | 2000-05-25 | 2002-04-11 | Sturza Mark Alan | Method for utilizing excess communications capacity |
US20020078026A1 (en) * | 2000-12-14 | 2002-06-20 | Fergus Joseph E. | Method and apparatus for bulk data remover |
US20030074576A1 (en) * | 2001-10-17 | 2003-04-17 | Kelly Thomas W. | Positive disconnect device for networked computer |
US20030103288A1 (en) * | 2001-11-30 | 2003-06-05 | Kabushiki Kaisha Toshiba | Recording and regeneration apparatus and data erasure method for use in the recording and regeneration apparatus |
Non-Patent Citations (1)
Title |
---|
Gutmann, Peter, "Secure Deletion of Data from Magnetic and Solid-State Memory," July 1996, 6th USENIX Security Symposium Proceedings. * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793299A (en) * | 2014-02-18 | 2014-05-14 | 重庆爱思网安信息技术有限公司 | Evidence taking all-in-one machine |
US20150309754A1 (en) * | 2014-04-24 | 2015-10-29 | Michael Smithwick | System and Method for Erasing Data on an Electronic Device |
CN105824577A (en) * | 2016-03-10 | 2016-08-03 | 福州瑞芯微电子股份有限公司 | Method and system for optimizing secure erase |
GB2559398A (en) * | 2017-02-04 | 2018-08-08 | PQ Solutions Ltd | Controlled and verifiable information destruction |
US11113227B2 (en) * | 2019-04-10 | 2021-09-07 | Steven Bress | Erasing device for long-term memory devices |
Also Published As
Publication number | Publication date |
---|---|
CA2666963A1 (en) | 2007-04-26 |
CN101331467A (en) | 2008-12-24 |
RU2008120022A (en) | 2009-11-27 |
IL190950A0 (en) | 2009-09-22 |
US20070101055A1 (en) | 2007-05-03 |
EP1952248A2 (en) | 2008-08-06 |
JP2009512968A (en) | 2009-03-26 |
US7725674B2 (en) | 2010-05-25 |
EP1952248A4 (en) | 2012-03-07 |
WO2007047802A2 (en) | 2007-04-26 |
US20100220572A1 (en) | 2010-09-02 |
WO2007047802A3 (en) | 2008-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7725674B2 (en) | Hard drive eraser | |
US9244627B2 (en) | Secure data erasure system for erasing a plurality of data storage devices | |
Kissel et al. | Guidelines for media sanitization | |
US7124301B1 (en) | Data protection method for a removable storage medium and a storage device using the same | |
US20040243734A1 (en) | Information processing apparatus, method of controlling the same, control program, and storage medium | |
US9195858B2 (en) | Encrypted data storage device | |
CN100405249C (en) | Information processing apparatus, information processing method, and program storage medium | |
US20050109828A1 (en) | Method and apparatus for storing personalized computing device setting information and user session information to enable a user to transport such settings between computing devices | |
US7228379B2 (en) | Systems and methods for removing data stored on long-term memory devices | |
US20080235809A1 (en) | Restricted erase and unlock of data storage devices | |
JP4576336B2 (en) | Electronic data management apparatus, control program therefor, and electronic data management method | |
CN106716333B (en) | Method for completing secure erase operation | |
US8601123B2 (en) | Media management method for a media processing device | |
Steel | Windows forensics: The field guide for conducting corporate computer investigations | |
US20080082699A1 (en) | Devices and methods for device-mapping connectivity hub | |
Jansen et al. | Guidelines on PDA forensics | |
GB2323951A (en) | Password processing | |
CN1996476A (en) | Disk unit, magnetic disk unit and information storage unit | |
EP1850264A1 (en) | Data management method using external recording medium write device and data management system | |
JP2003006980A (en) | Recording/reproducing device and information processing system provided with the same | |
JPH08203257A (en) | Card-type hard disk apparatus and data-processing apparatus using the apparatus | |
Koreneff et al. | Information technology | |
Nikkel | Forensic acquisition and analysis of magnetic tapes | |
Davies et al. | Hard disk storage: firmware manipulation and forensic impact and current best practice | |
Orvis | CIAC-2325 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |