GB2456396A - Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. - Google Patents
Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. Download PDFInfo
- Publication number
- GB2456396A GB2456396A GB0800932A GB0800932A GB2456396A GB 2456396 A GB2456396 A GB 2456396A GB 0800932 A GB0800932 A GB 0800932A GB 0800932 A GB0800932 A GB 0800932A GB 2456396 A GB2456396 A GB 2456396A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data
- drive
- security
- destroy
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Abstract
Disclosed is a disc drive for a data processing system. The drive has wireless receiver subsystem tat is set up to receive a signal from a paired transmitter. If the receiver does not receive the correct signal a data destruction system actives to destroy the data on the drive. The data may be encrypted on the drive. The system to destroy the data may destroy the physical media, eg using an acid capsule. The drive has a time-measuring system on it to record the time since the receiver received a signal ie synchronised with a security data stream. The drive may have its own battery as a power source. The drive may have antiintrusion sensors to activate the data destruction if the drive is tampered with. The timer system is set such that if the security stream is not received for more than a set period the data may be encrypted. If the security stream is not restored before another set time has expired the data and/or the media will be destroyed.
Description
Security Drive
Description Field of invention
(01) Secured Drive relates to a new type of a security enhanced disk drive for an electronic device. Security Drive could be a part of an electronic device or an add-on.
Background
(02) Data drives are used on many electronic devices, laptops, handheld devices, telephones and mobile communication devices. As the capacity size of data drives increases, the importance of data kept on them grows as well. That is the reason why it becomes increasingly important not to lose data kept on data disk.
(03) Using encryption to prevent lost of data is not entirely secure as it is possible to break it using fast computers.
Brief Description of the Drawing Figures
(04)
Figure 1 is an example of Security Drive.
Detailed Description
(05) Security Drive described in this document has an embedded wireless transmitter or only a wireless receiver.
(06) Security Drive can have an embedded encryption subsystem to encrypt data kept on Security Drive.
(07) Security Drive has an embedded subsystem to destroy data kept on Security Drive.
(08) Security Drive can have an embedded subsystem to destroy physical medium on which data are kept on Security Drive. Embedded subsystem can be acid capsule based.
(09) Security Drive has a precise time-measuring subsystem. Time-measuring subsystem can be synchronised with a Security stream.
(10) Security Drive has a battery subsystem that supplies power for correct operation of security subsystems.
(11) Security Drive can have an anti-intrusion sensor that can activate subsystems for data destruction and/or data medium destruction.
(12) Security Drive receives a Security stream from an external device over the wireless. Wireless can be RFID, Bluetooth, Wi-Fi or any other standard used for wireless transmission.
(13) In a case that a Security stream is not received any more or is delayed more than previously defined (Tsd) and that condition persists for a longer period of time than previously defined (Ts),
2456396
1
Security Drive will optionally encrypt data for a period of time that is predefined (Te). If the Security stream is restored for a predefined period of time, encryption period of time will be reset - it will start next time from 0.
(14) In a case that period of time for encryption expired (Te) or is not defined or is null Security Drive will destroy data or both data and a medium on which data is kept on Security Drive. That means that in case Te = 0 data and/or data medium will be destroyed after period of time Ts.
2
Claims (1)
- Claims(01)Security Drive has an embedded wireless subsystem.(02)Security Drive has an embedded subsystem to destroy data.(03) Security Drive can have an embedded subsystem to encrypt data.(04) Security Drive can have an embedded subsystem to destroy medium on which data is kept.(05) Security Drive can have a precise time-measuring subsystem.(06) Security Drive will destroy data if security stream is not received over the wireless transmission for a predefined period of time.(07) Security Drive can destroy medium on which data is stored if security stream is not received over the wireless transmission for a predefined period of time.(08)Security Drive will destroy data if security stream is delayed more than a predefined period of time.(09) Security Drive can destroy medium on which data is stored if security stream is delayed more than a predefined period of time.3
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0800932A GB2456396A (en) | 2008-01-21 | 2008-01-21 | Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0800932A GB2456396A (en) | 2008-01-21 | 2008-01-21 | Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0800932D0 GB0800932D0 (en) | 2008-02-27 |
GB2456396A true GB2456396A (en) | 2009-07-22 |
Family
ID=39165989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0800932A Pending GB2456396A (en) | 2008-01-21 | 2008-01-21 | Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2456396A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2497919A (en) * | 2011-12-08 | 2013-07-03 | Pangaea Media Ltd | Electronic circuit apparatus performing a function in response to a trigger signal |
US9081970B2 (en) | 2011-12-08 | 2015-07-14 | Pangaea Media Ltd. | Data security device |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0362463A1 (en) * | 1989-03-20 | 1990-04-11 | Southern Integrity, Inc. | Protection system |
US20030065934A1 (en) * | 2001-09-28 | 2003-04-03 | Angelo Michael F. | After the fact protection of data in remote personal and wireless devices |
US20040103302A1 (en) * | 2002-07-18 | 2004-05-27 | Hiroyuki Yoshimura | Security-protected hard disk apparatus and method thereof |
US20040181673A1 (en) * | 2003-03-13 | 2004-09-16 | Paul Lin | Method and apparatus for preventing unauthorized access to data and for destroying data upon receiving an unauthorized data access attempt |
GB2400453A (en) * | 2003-04-08 | 2004-10-13 | Farnway Ltd | A remote protection system for disabling electrical equipment. |
US20040250103A1 (en) * | 2003-03-25 | 2004-12-09 | Teruhisa Yokosawa | Magnetic disk apparatus |
US20040252628A1 (en) * | 2003-03-18 | 2004-12-16 | Roger Detzler | Dead on demand disk technology |
WO2005089464A2 (en) * | 2004-03-17 | 2005-09-29 | Piracy Cop, L.L.C. | A mass storage apparatus for securely delivering digital content to a host computer and method for using same |
US20050257049A1 (en) * | 2004-03-18 | 2005-11-17 | University Of New Hampshire | Chemical for data destruction |
US20060021005A1 (en) * | 2004-07-21 | 2006-01-26 | Williams Cuong G | System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval |
US20060136752A1 (en) * | 2004-12-21 | 2006-06-22 | Seagate Technology Llc | Security hardened disc drive |
WO2006105552A2 (en) * | 2005-03-29 | 2006-10-05 | Milan Tomasovic | Device for protecting data in laptop computers in case of their loss or theft |
JP2007207100A (en) * | 2006-02-03 | 2007-08-16 | Chugoku Electric Power Co Inc:The | Electronic equipment having function for preventing leakage of storage information |
US7263190B1 (en) * | 2004-04-06 | 2007-08-28 | United States Of America As Represented By The Secretary Of The Navy | System for securing the confidentiality of electronically stored data in the event of the physical theft thereof |
WO2008004120A2 (en) * | 2006-01-24 | 2008-01-10 | Lai, Josephine Suk Ying | System and method for data destruction |
WO2009018125A1 (en) * | 2007-08-02 | 2009-02-05 | Applied Minds, Inc. | Method and apparatus for protecting data in a portable electronic device |
GB2452479A (en) * | 2007-08-31 | 2009-03-11 | Sony Corp | Content protection through deletion of a decryption key in response to a predetermined event |
-
2008
- 2008-01-21 GB GB0800932A patent/GB2456396A/en active Pending
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0362463A1 (en) * | 1989-03-20 | 1990-04-11 | Southern Integrity, Inc. | Protection system |
US20030065934A1 (en) * | 2001-09-28 | 2003-04-03 | Angelo Michael F. | After the fact protection of data in remote personal and wireless devices |
US20040103302A1 (en) * | 2002-07-18 | 2004-05-27 | Hiroyuki Yoshimura | Security-protected hard disk apparatus and method thereof |
US20040181673A1 (en) * | 2003-03-13 | 2004-09-16 | Paul Lin | Method and apparatus for preventing unauthorized access to data and for destroying data upon receiving an unauthorized data access attempt |
US20040252628A1 (en) * | 2003-03-18 | 2004-12-16 | Roger Detzler | Dead on demand disk technology |
US20040250103A1 (en) * | 2003-03-25 | 2004-12-09 | Teruhisa Yokosawa | Magnetic disk apparatus |
GB2400453A (en) * | 2003-04-08 | 2004-10-13 | Farnway Ltd | A remote protection system for disabling electrical equipment. |
WO2005089464A2 (en) * | 2004-03-17 | 2005-09-29 | Piracy Cop, L.L.C. | A mass storage apparatus for securely delivering digital content to a host computer and method for using same |
US20050257049A1 (en) * | 2004-03-18 | 2005-11-17 | University Of New Hampshire | Chemical for data destruction |
US7263190B1 (en) * | 2004-04-06 | 2007-08-28 | United States Of America As Represented By The Secretary Of The Navy | System for securing the confidentiality of electronically stored data in the event of the physical theft thereof |
US20060021005A1 (en) * | 2004-07-21 | 2006-01-26 | Williams Cuong G | System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval |
US20060136752A1 (en) * | 2004-12-21 | 2006-06-22 | Seagate Technology Llc | Security hardened disc drive |
WO2006105552A2 (en) * | 2005-03-29 | 2006-10-05 | Milan Tomasovic | Device for protecting data in laptop computers in case of their loss or theft |
WO2008004120A2 (en) * | 2006-01-24 | 2008-01-10 | Lai, Josephine Suk Ying | System and method for data destruction |
JP2007207100A (en) * | 2006-02-03 | 2007-08-16 | Chugoku Electric Power Co Inc:The | Electronic equipment having function for preventing leakage of storage information |
WO2009018125A1 (en) * | 2007-08-02 | 2009-02-05 | Applied Minds, Inc. | Method and apparatus for protecting data in a portable electronic device |
GB2452479A (en) * | 2007-08-31 | 2009-03-11 | Sony Corp | Content protection through deletion of a decryption key in response to a predetermined event |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2497919A (en) * | 2011-12-08 | 2013-07-03 | Pangaea Media Ltd | Electronic circuit apparatus performing a function in response to a trigger signal |
US9081970B2 (en) | 2011-12-08 | 2015-07-14 | Pangaea Media Ltd. | Data security device |
Also Published As
Publication number | Publication date |
---|---|
GB0800932D0 (en) | 2008-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9465755B2 (en) | Security parameter zeroization | |
US10102383B2 (en) | Permanently erasing mechanism for encryption information | |
WO2008127408A3 (en) | Method and system for encryption of information stored in an external nonvolatile memory | |
WO2007149977A3 (en) | Location-based security, privacy, access control and monitoring system | |
TW200619961A (en) | Method and system for providing information to remote clients | |
GB2439445B (en) | Method and apparatus for data protection for mobile devices | |
US20140357318A1 (en) | Mobile phone and communication method thereof | |
WO2004066275A3 (en) | Systems and methods for mobile security and monitoring | |
WO2010144815A3 (en) | System and method for providing security aboard a moving platform | |
WO2011081682A1 (en) | Data protecting device | |
WO2009042820A3 (en) | Data security system with encryption | |
WO2008026060A3 (en) | Method, system and device for synchronizing between server and mobile device | |
WO2007089266A3 (en) | Administration of data encryption in enterprise computer systems | |
EP2788915A1 (en) | Data security device | |
US8732860B2 (en) | System and method for securing data to be protected of a piece of equipment | |
WO2008135996A3 (en) | Safe self-destruction of data | |
GB2456396A (en) | Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. | |
CN101281496A (en) | Ciphering type mobile storage apparatus | |
CN101788957A (en) | Encrypting device and method of storage equipment | |
WO2010067263A3 (en) | A system for protection and backup of information in a mobile cell unit | |
CN202050425U (en) | Illegal external connection monitoring system for internal network equipment | |
US9858446B2 (en) | Tamper protection device for protecting a field device against tampering | |
WO2013083940A1 (en) | Trigger device | |
EP2360627B1 (en) | Rotation-activated electronic component with time-limited use | |
MY144566A (en) | Remote destroy mechanism using trusted platform module |