GB2456396A - Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. - Google Patents

Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. Download PDF

Info

Publication number
GB2456396A
GB2456396A GB0800932A GB0800932A GB2456396A GB 2456396 A GB2456396 A GB 2456396A GB 0800932 A GB0800932 A GB 0800932A GB 0800932 A GB0800932 A GB 0800932A GB 2456396 A GB2456396 A GB 2456396A
Authority
GB
United Kingdom
Prior art keywords
data
drive
security
destroy
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
GB0800932A
Other versions
GB0800932D0 (en
Inventor
Sava Zxivanovich
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LIFE DUST Ltd
Original Assignee
LIFE DUST Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LIFE DUST Ltd filed Critical LIFE DUST Ltd
Priority to GB0800932A priority Critical patent/GB2456396A/en
Publication of GB0800932D0 publication Critical patent/GB0800932D0/en
Publication of GB2456396A publication Critical patent/GB2456396A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Abstract

Disclosed is a disc drive for a data processing system. The drive has wireless receiver subsystem tat is set up to receive a signal from a paired transmitter. If the receiver does not receive the correct signal a data destruction system actives to destroy the data on the drive. The data may be encrypted on the drive. The system to destroy the data may destroy the physical media, eg using an acid capsule. The drive has a time-measuring system on it to record the time since the receiver received a signal ie synchronised with a security data stream. The drive may have its own battery as a power source. The drive may have antiintrusion sensors to activate the data destruction if the drive is tampered with. The timer system is set such that if the security stream is not received for more than a set period the data may be encrypted. If the security stream is not restored before another set time has expired the data and/or the media will be destroyed.

Description

Security Drive
Description Field of invention
(01) Secured Drive relates to a new type of a security enhanced disk drive for an electronic device. Security Drive could be a part of an electronic device or an add-on.
Background
(02) Data drives are used on many electronic devices, laptops, handheld devices, telephones and mobile communication devices. As the capacity size of data drives increases, the importance of data kept on them grows as well. That is the reason why it becomes increasingly important not to lose data kept on data disk.
(03) Using encryption to prevent lost of data is not entirely secure as it is possible to break it using fast computers.
Brief Description of the Drawing Figures
(04)
Figure 1 is an example of Security Drive.
Detailed Description
(05) Security Drive described in this document has an embedded wireless transmitter or only a wireless receiver.
(06) Security Drive can have an embedded encryption subsystem to encrypt data kept on Security Drive.
(07) Security Drive has an embedded subsystem to destroy data kept on Security Drive.
(08) Security Drive can have an embedded subsystem to destroy physical medium on which data are kept on Security Drive. Embedded subsystem can be acid capsule based.
(09) Security Drive has a precise time-measuring subsystem. Time-measuring subsystem can be synchronised with a Security stream.
(10) Security Drive has a battery subsystem that supplies power for correct operation of security subsystems.
(11) Security Drive can have an anti-intrusion sensor that can activate subsystems for data destruction and/or data medium destruction.
(12) Security Drive receives a Security stream from an external device over the wireless. Wireless can be RFID, Bluetooth, Wi-Fi or any other standard used for wireless transmission.
(13) In a case that a Security stream is not received any more or is delayed more than previously defined (Tsd) and that condition persists for a longer period of time than previously defined (Ts),
2456396
1
Security Drive will optionally encrypt data for a period of time that is predefined (Te). If the Security stream is restored for a predefined period of time, encryption period of time will be reset - it will start next time from 0.
(14) In a case that period of time for encryption expired (Te) or is not defined or is null Security Drive will destroy data or both data and a medium on which data is kept on Security Drive. That means that in case Te = 0 data and/or data medium will be destroyed after period of time Ts.
2

Claims (1)

  1. Claims
    (01)Security Drive has an embedded wireless subsystem.
    (02)Security Drive has an embedded subsystem to destroy data.
    (03) Security Drive can have an embedded subsystem to encrypt data.
    (04) Security Drive can have an embedded subsystem to destroy medium on which data is kept.
    (05) Security Drive can have a precise time-measuring subsystem.
    (06) Security Drive will destroy data if security stream is not received over the wireless transmission for a predefined period of time.
    (07) Security Drive can destroy medium on which data is stored if security stream is not received over the wireless transmission for a predefined period of time.
    (08)Security Drive will destroy data if security stream is delayed more than a predefined period of time.
    (09) Security Drive can destroy medium on which data is stored if security stream is delayed more than a predefined period of time.
    3
GB0800932A 2008-01-21 2008-01-21 Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. Pending GB2456396A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0800932A GB2456396A (en) 2008-01-21 2008-01-21 Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0800932A GB2456396A (en) 2008-01-21 2008-01-21 Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver.

Publications (2)

Publication Number Publication Date
GB0800932D0 GB0800932D0 (en) 2008-02-27
GB2456396A true GB2456396A (en) 2009-07-22

Family

ID=39165989

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0800932A Pending GB2456396A (en) 2008-01-21 2008-01-21 Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver.

Country Status (1)

Country Link
GB (1) GB2456396A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2497919A (en) * 2011-12-08 2013-07-03 Pangaea Media Ltd Electronic circuit apparatus performing a function in response to a trigger signal
US9081970B2 (en) 2011-12-08 2015-07-14 Pangaea Media Ltd. Data security device

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0362463A1 (en) * 1989-03-20 1990-04-11 Southern Integrity, Inc. Protection system
US20030065934A1 (en) * 2001-09-28 2003-04-03 Angelo Michael F. After the fact protection of data in remote personal and wireless devices
US20040103302A1 (en) * 2002-07-18 2004-05-27 Hiroyuki Yoshimura Security-protected hard disk apparatus and method thereof
US20040181673A1 (en) * 2003-03-13 2004-09-16 Paul Lin Method and apparatus for preventing unauthorized access to data and for destroying data upon receiving an unauthorized data access attempt
GB2400453A (en) * 2003-04-08 2004-10-13 Farnway Ltd A remote protection system for disabling electrical equipment.
US20040250103A1 (en) * 2003-03-25 2004-12-09 Teruhisa Yokosawa Magnetic disk apparatus
US20040252628A1 (en) * 2003-03-18 2004-12-16 Roger Detzler Dead on demand disk technology
WO2005089464A2 (en) * 2004-03-17 2005-09-29 Piracy Cop, L.L.C. A mass storage apparatus for securely delivering digital content to a host computer and method for using same
US20050257049A1 (en) * 2004-03-18 2005-11-17 University Of New Hampshire Chemical for data destruction
US20060021005A1 (en) * 2004-07-21 2006-01-26 Williams Cuong G System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval
US20060136752A1 (en) * 2004-12-21 2006-06-22 Seagate Technology Llc Security hardened disc drive
WO2006105552A2 (en) * 2005-03-29 2006-10-05 Milan Tomasovic Device for protecting data in laptop computers in case of their loss or theft
JP2007207100A (en) * 2006-02-03 2007-08-16 Chugoku Electric Power Co Inc:The Electronic equipment having function for preventing leakage of storage information
US7263190B1 (en) * 2004-04-06 2007-08-28 United States Of America As Represented By The Secretary Of The Navy System for securing the confidentiality of electronically stored data in the event of the physical theft thereof
WO2008004120A2 (en) * 2006-01-24 2008-01-10 Lai, Josephine Suk Ying System and method for data destruction
WO2009018125A1 (en) * 2007-08-02 2009-02-05 Applied Minds, Inc. Method and apparatus for protecting data in a portable electronic device
GB2452479A (en) * 2007-08-31 2009-03-11 Sony Corp Content protection through deletion of a decryption key in response to a predetermined event

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0362463A1 (en) * 1989-03-20 1990-04-11 Southern Integrity, Inc. Protection system
US20030065934A1 (en) * 2001-09-28 2003-04-03 Angelo Michael F. After the fact protection of data in remote personal and wireless devices
US20040103302A1 (en) * 2002-07-18 2004-05-27 Hiroyuki Yoshimura Security-protected hard disk apparatus and method thereof
US20040181673A1 (en) * 2003-03-13 2004-09-16 Paul Lin Method and apparatus for preventing unauthorized access to data and for destroying data upon receiving an unauthorized data access attempt
US20040252628A1 (en) * 2003-03-18 2004-12-16 Roger Detzler Dead on demand disk technology
US20040250103A1 (en) * 2003-03-25 2004-12-09 Teruhisa Yokosawa Magnetic disk apparatus
GB2400453A (en) * 2003-04-08 2004-10-13 Farnway Ltd A remote protection system for disabling electrical equipment.
WO2005089464A2 (en) * 2004-03-17 2005-09-29 Piracy Cop, L.L.C. A mass storage apparatus for securely delivering digital content to a host computer and method for using same
US20050257049A1 (en) * 2004-03-18 2005-11-17 University Of New Hampshire Chemical for data destruction
US7263190B1 (en) * 2004-04-06 2007-08-28 United States Of America As Represented By The Secretary Of The Navy System for securing the confidentiality of electronically stored data in the event of the physical theft thereof
US20060021005A1 (en) * 2004-07-21 2006-01-26 Williams Cuong G System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval
US20060136752A1 (en) * 2004-12-21 2006-06-22 Seagate Technology Llc Security hardened disc drive
WO2006105552A2 (en) * 2005-03-29 2006-10-05 Milan Tomasovic Device for protecting data in laptop computers in case of their loss or theft
WO2008004120A2 (en) * 2006-01-24 2008-01-10 Lai, Josephine Suk Ying System and method for data destruction
JP2007207100A (en) * 2006-02-03 2007-08-16 Chugoku Electric Power Co Inc:The Electronic equipment having function for preventing leakage of storage information
WO2009018125A1 (en) * 2007-08-02 2009-02-05 Applied Minds, Inc. Method and apparatus for protecting data in a portable electronic device
GB2452479A (en) * 2007-08-31 2009-03-11 Sony Corp Content protection through deletion of a decryption key in response to a predetermined event

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2497919A (en) * 2011-12-08 2013-07-03 Pangaea Media Ltd Electronic circuit apparatus performing a function in response to a trigger signal
US9081970B2 (en) 2011-12-08 2015-07-14 Pangaea Media Ltd. Data security device

Also Published As

Publication number Publication date
GB0800932D0 (en) 2008-02-27

Similar Documents

Publication Publication Date Title
US9465755B2 (en) Security parameter zeroization
US10102383B2 (en) Permanently erasing mechanism for encryption information
WO2008127408A3 (en) Method and system for encryption of information stored in an external nonvolatile memory
WO2007149977A3 (en) Location-based security, privacy, access control and monitoring system
TW200619961A (en) Method and system for providing information to remote clients
GB2439445B (en) Method and apparatus for data protection for mobile devices
US20140357318A1 (en) Mobile phone and communication method thereof
WO2004066275A3 (en) Systems and methods for mobile security and monitoring
WO2010144815A3 (en) System and method for providing security aboard a moving platform
WO2011081682A1 (en) Data protecting device
WO2009042820A3 (en) Data security system with encryption
WO2008026060A3 (en) Method, system and device for synchronizing between server and mobile device
WO2007089266A3 (en) Administration of data encryption in enterprise computer systems
EP2788915A1 (en) Data security device
US8732860B2 (en) System and method for securing data to be protected of a piece of equipment
WO2008135996A3 (en) Safe self-destruction of data
GB2456396A (en) Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver.
CN101281496A (en) Ciphering type mobile storage apparatus
CN101788957A (en) Encrypting device and method of storage equipment
WO2010067263A3 (en) A system for protection and backup of information in a mobile cell unit
CN202050425U (en) Illegal external connection monitoring system for internal network equipment
US9858446B2 (en) Tamper protection device for protecting a field device against tampering
WO2013083940A1 (en) Trigger device
EP2360627B1 (en) Rotation-activated electronic component with time-limited use
MY144566A (en) Remote destroy mechanism using trusted platform module