GB2479540A - Corrupting and erasing data on a storage device when computer casing is broken - Google Patents

Corrupting and erasing data on a storage device when computer casing is broken Download PDF

Info

Publication number
GB2479540A
GB2479540A GB201006078A GB201006078A GB2479540A GB 2479540 A GB2479540 A GB 2479540A GB 201006078 A GB201006078 A GB 201006078A GB 201006078 A GB201006078 A GB 201006078A GB 2479540 A GB2479540 A GB 2479540A
Authority
GB
United Kingdom
Prior art keywords
data
corrupting
broken
storage device
computer casing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB201006078A
Other versions
GB201006078D0 (en
Inventor
Adam Ford
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB201006078A priority Critical patent/GB2479540A/en
Publication of GB201006078D0 publication Critical patent/GB201006078D0/en
Publication of GB2479540A publication Critical patent/GB2479540A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Abstract

A method of protecting sensitive computer data by corrupting and erasing data on a storage. device which is triggered when the computer casing is broken rather than letting the storage device be removed from the system with data intact, thus avoiding vulnerability to brute force decryption programs. The data may be erased and corrupted by an electromagnetic pulse.

Description

I
Pulse Hardware Security
Background
This invention relates to computer data security.
Currently sensitive data is protected by encryption, but an encrypted volume could be connected to another system and thus be vulnerable to brute force decryption programs.
Statement of invention
In order to overcome this, the present invention proposes a system which uses hardware in order to corrupt and erase data when an attempt is made to gain unauthorized physical access to secure data.
Claims * Claim 1: A circuit embedded in the computer casing which when broken triggers a mechanism which shall corrupt and erase data.
* Claim 2: A mechanism according to Claim 1 by means of electromagnetic pulse.
Abstract Pulse Hardware Security A method of protecting sensitive computer data.by corrupting and erasing data on a storage device rather than lefting the storage device be removed from the system with data intact, thus avoiding vulnerability to brute force decryption programs.
GB201006078A 2010-04-13 2010-04-13 Corrupting and erasing data on a storage device when computer casing is broken Withdrawn GB2479540A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB201006078A GB2479540A (en) 2010-04-13 2010-04-13 Corrupting and erasing data on a storage device when computer casing is broken

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB201006078A GB2479540A (en) 2010-04-13 2010-04-13 Corrupting and erasing data on a storage device when computer casing is broken

Publications (2)

Publication Number Publication Date
GB201006078D0 GB201006078D0 (en) 2010-05-26
GB2479540A true GB2479540A (en) 2011-10-19

Family

ID=42236184

Family Applications (1)

Application Number Title Priority Date Filing Date
GB201006078A Withdrawn GB2479540A (en) 2010-04-13 2010-04-13 Corrupting and erasing data on a storage device when computer casing is broken

Country Status (1)

Country Link
GB (1) GB2479540A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE43758E1 (en) 1996-06-28 2012-10-23 Ngk Spark Plug Co., Ltd. Spark plug with alloy chip

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4325089A (en) * 1979-12-10 1982-04-13 Hsu Da L System for safeguarding magnetically recorded data
US4931770A (en) * 1987-10-02 1990-06-05 Southern Integrity, Inc. Protection system
WO1997030447A1 (en) * 1996-02-16 1997-08-21 Philippe Escal Device for protecting data on magnetic or magneto-optical media
US7263190B1 (en) * 2004-04-06 2007-08-28 United States Of America As Represented By The Secretary Of The Navy System for securing the confidentiality of electronically stored data in the event of the physical theft thereof
US20080112300A1 (en) * 2006-11-15 2008-05-15 David Bruce Kumhyr Method and system for protecting data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4325089A (en) * 1979-12-10 1982-04-13 Hsu Da L System for safeguarding magnetically recorded data
US4931770A (en) * 1987-10-02 1990-06-05 Southern Integrity, Inc. Protection system
WO1997030447A1 (en) * 1996-02-16 1997-08-21 Philippe Escal Device for protecting data on magnetic or magneto-optical media
US7263190B1 (en) * 2004-04-06 2007-08-28 United States Of America As Represented By The Secretary Of The Navy System for securing the confidentiality of electronically stored data in the event of the physical theft thereof
US20080112300A1 (en) * 2006-11-15 2008-05-15 David Bruce Kumhyr Method and system for protecting data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE43758E1 (en) 1996-06-28 2012-10-23 Ngk Spark Plug Co., Ltd. Spark plug with alloy chip

Also Published As

Publication number Publication date
GB201006078D0 (en) 2010-05-26

Similar Documents

Publication Publication Date Title
GB2443984B (en) Methods and apparatus for the secure handling of data in a microcontroller
US9495111B2 (en) System and method for reducing information leakage from memory
TW200731108A (en) Secure yet flexible system architecture for secure devices with flash mass storage memory
US20080016127A1 (en) Utilizing software for backing up and recovering data
WO2007033321A3 (en) Secure yet flexible system architecture for secure devices with flash mass storage memory
TW200708952A (en) Providing extended memory protection
US10061718B2 (en) Protecting secret state from memory attacks
CN107622390B (en) System and method for a secure payment terminal without battery
WO2011046731A3 (en) Secure storage of temporary secrets
WO2007092818A3 (en) Post-download patient data protection in a medical device
GB2500852A (en) Always-available embedded theft reaction subsystem
GB2442172A (en) Anti-hack protection to restrict installation of operating systems and other software
KR20080100674A (en) Method and apparatus for checking integrity of firmware
KR100894466B1 (en) Information processing device, anti-tamper method, and anti-tamper program
WO2009099648A3 (en) Method and apparatus for hardware reset protection
AU2011355202B2 (en) Device and method for protecting a security module from manipulation attempts in a field device
WO2006088838A3 (en) Methods of copy protecting software stored on portable memory
US20090328238A1 (en) Disabling encrypted data
US9805186B2 (en) Hardware protection for encrypted strings and protection of security parameters
WO2009129195A3 (en) Secure debug interface and memory of a media security circuit and method
US20130265163A1 (en) Magnetic Field Activated Intrusion Detection
GB2479540A (en) Corrupting and erasing data on a storage device when computer casing is broken
US20180239917A1 (en) File transmitting and receiving system
US20190081788A1 (en) System And Method Trusted Workspace In Commercial Mobile Devices
US20190044717A1 (en) Systems and methods for masking rsa operations

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)