MA40477A - Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants - Google Patents

Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants

Info

Publication number
MA40477A
MA40477A MA040477A MA40477A MA40477A MA 40477 A MA40477 A MA 40477A MA 040477 A MA040477 A MA 040477A MA 40477 A MA40477 A MA 40477A MA 40477 A MA40477 A MA 40477A
Authority
MA
Morocco
Prior art keywords
components
controlled
stored information
technology
sensitive
Prior art date
Application number
MA040477A
Other languages
English (en)
Inventor
Peter Hofleitner
Martin Tross
Original Assignee
Pahmet Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pahmet Llc filed Critical Pahmet Llc
Publication of MA40477A publication Critical patent/MA40477A/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42DBLASTING
    • F42D3/00Particular applications of blasting techniques
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42BEXPLOSIVE CHARGES, e.g. FOR BLASTING, FIREWORKS, AMMUNITION
    • F42B3/00Blasting cartridges, i.e. case and explosive
    • F42B3/087Flexible or deformable blasting cartridges, e.g. bags or hoses for slurries
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C11/00Electric fuzes
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C15/00Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges
    • F42C15/40Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically
    • F42C15/42Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically from a remote location, e.g. for controlled mines or mine fields
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C9/00Time fuzes; Combined time and percussion or pressure-actuated fuzes; Fuzes for timed self-destruction of ammunition
    • F42C9/14Double fuzes; Multiple fuzes
    • F42C9/16Double fuzes; Multiple fuzes for self-destruction of ammunition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Burglar Alarm Systems (AREA)
  • Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)

Abstract

L'invention concerne un système et un procédé pour la destruction d'informations stockées électroniquement et/ou de composants qui incorporent une technologie sensible ou qui contiennent des informations sensibles lors du déroulement d'un ou de plusieurs événements prédéterminés. Le système et le procédé de la présente invention sont particulièrement appropriés à la protection d'informations stockées électroniquement et/ou de technologie classifiée dans des systèmes déployés dans un environnement de fonctionnement. Le système et le procédé de la présente invention peuvent être incorporés dans des drones, des aéronefs de dimension normale, un type quelconque de véhicule, des mines, des missiles, des torpilles, des bombes, des téléphones, des caméras, des robots, des satellites ou d'autres engins spatiaux, des ordinateurs, des disques durs, des clés usb, des commutateurs, des routeurs, des dispositifs d'écoute, des porte-documents, des coffres-forts, et, d'une manière générale, tout dispositif qui utilise des composants sur lesquels des données sensibles sont stockées ou des composants qui utilisent une technologie à laquelle seul du personnel autorisé doit accéder.
MA040477A 2014-08-26 2015-08-26 Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants MA40477A (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US201462041738P 2014-08-26 2014-08-26

Publications (1)

Publication Number Publication Date
MA40477A true MA40477A (fr) 2016-03-03

Family

ID=55400468

Family Applications (1)

Application Number Title Priority Date Filing Date
MA040477A MA40477A (fr) 2014-08-26 2015-08-26 Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants

Country Status (5)

Country Link
US (2) US10521598B2 (fr)
EP (2) EP3186585B1 (fr)
IL (1) IL250739A0 (fr)
MA (1) MA40477A (fr)
WO (1) WO2016033123A1 (fr)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3186585B1 (fr) 2014-08-26 2020-04-22 Pahmet LLC Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants
US9431354B2 (en) 2014-11-06 2016-08-30 International Business Machines Corporation Activating reactions in integrated circuits through electrical discharge
US9859227B1 (en) 2016-06-30 2018-01-02 International Business Machines Corporation Damaging integrated circuit components
US10290594B2 (en) 2016-07-28 2019-05-14 International Business Machines Corporation Fragmenting computer chips
JP6773213B2 (ja) * 2017-03-31 2020-10-21 日本電気株式会社 情報処理装置、情報処理方法および情報処理プログラム
US11093611B2 (en) 2017-06-25 2021-08-17 ITsMine Ltd. Utilization of deceptive decoy elements to identify data leakage processes invoked by suspicious entities
CA3093434A1 (fr) * 2018-03-07 2019-09-12 Austin Star Detonator Company Securite et fiabilite ameliorees pour un systeme de mise a feu de detonateur en reseau
US11243710B1 (en) * 2018-04-02 2022-02-08 Dominic B. Picone System and method for remote drive destruction
US11096243B2 (en) 2018-04-13 2021-08-17 Kwesst Inc. Programmable multi-waveform RF generator for use as battlefield decoy
US10969467B1 (en) 2018-04-13 2021-04-06 Kwesst Inc. Programmable multi-waveform RF generator for use as battlefield decoy
EP3604049B1 (fr) * 2018-08-03 2022-10-05 Aptiv Technologies Limited Unité de commande de véhicule sécurisée
CN110210260B (zh) * 2019-06-13 2020-12-08 深圳市风云实业有限公司 数据自毁系统及方法
CO2022013208A1 (es) * 2022-09-15 2024-03-18 Fernandez Juan Carlos Cantillo Dispositivo destructor de hardware

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3827362A (en) * 1972-08-14 1974-08-06 Us Navy Electrical circuit destruct system
US4464989A (en) 1983-05-13 1984-08-14 The United States Of America As Represented By The United States Department Of Energy Integral low-energy thermite igniter
NL1005598C2 (nl) 1997-03-21 1998-09-22 Iq Sec N V S A Inrichting voor het beveiligen van waardevolle goederen en opslagrek alsmede basisstation ten gebruike daarmee.
WO2002095550A2 (fr) * 2001-04-25 2002-11-28 Marc Elisha Grey Dispositif de securite servant a securiser physiquement un support de stockage de donnees numerisees, et procede d'utilisation associe
FR2837304B1 (fr) * 2002-03-13 2004-05-28 Commissariat Energie Atomique Dispositif electronique securise
US7021217B2 (en) * 2002-04-11 2006-04-04 Tanner Research, Inc. Versatile cavity actuator and systems incorporating same
US7964045B1 (en) * 2003-06-11 2011-06-21 The United States Of America As Represented By The Secretary Of The Army Method for producing and using high explosive material
US7576653B2 (en) 2006-03-15 2009-08-18 Angel Secure Networks, Inc. Secure panel with remotely controlled embedded devices
US20090251283A1 (en) * 2006-05-02 2009-10-08 Orient Instrument Computer Co., Ltd. Property management system
US8275724B2 (en) * 2008-10-15 2012-09-25 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Method of improving system performance and survivability through changing function
US9015075B2 (en) * 2006-09-29 2015-04-21 Oracle America, Inc. Method and apparatus for secure information distribution
US9135473B2 (en) 2007-08-08 2015-09-15 Honeywell International Inc. Method and apparatus for erasure of data from a data storage device located on a vehicle
US8332661B2 (en) 2008-09-11 2012-12-11 Mostovych Andrew N Method and apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from microdevices
US20100132047A1 (en) * 2008-11-24 2010-05-27 Honeywell International Inc. Systems and methods for tamper resistant memory devices
GB2497920A (en) * 2011-12-08 2013-07-03 Pangaea Media Ltd Apparatus for storing data includes an SSD and means for causing physical damage to the SSD
US8925462B2 (en) * 2012-06-27 2015-01-06 Raytheon Company Intermediate voltage arming
CN104102882B (zh) * 2013-04-12 2017-05-03 腾讯科技(深圳)有限公司 一种应用程序隐私数据的保护方法及装置
EP3186585B1 (fr) 2014-08-26 2020-04-22 Pahmet LLC Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants

Also Published As

Publication number Publication date
EP3186585A4 (fr) 2018-04-11
IL250739A0 (en) 2017-04-30
US20170277901A1 (en) 2017-09-28
US20200097668A1 (en) 2020-03-26
EP3186585B1 (fr) 2020-04-22
WO2016033123A1 (fr) 2016-03-03
US10521598B2 (en) 2019-12-31
US10824743B2 (en) 2020-11-03
EP3186585A1 (fr) 2017-07-05
EP3726180A1 (fr) 2020-10-21

Similar Documents

Publication Publication Date Title
MA40477A (fr) Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants
Merrin Digital war: A critical introduction
KR102029883B1 (ko) 드론을 이용한 블랙박스 서비스 방법 및 이를 수행하기 위한 장치와 시스템
EP3461056B8 (fr) Systèmes et procédés pour faciliter la génération de clés itératives et le chiffrement et le déchiffrement de données
Atkinson et al. Drone forensics: The impact and challenges
Mohan Cybersecurity in drones
WO2017011051A3 (fr) Techniques de protection et de chiffrement de données sécurisées pour dispositifs informatiques et stockage d'informations
Pražák Space cyber threats and need for enhanced resilience of space assets
Higgins A new age of open source investigation: International examples
FR3072581B1 (fr) Drone de recherche et de marquege d'une cible
Rendleman et al. Cyber operations to defend space systems?
Pasupuleti et al. A novel ARDUINO based self-defense shoe for women safety and security
Caton Dancing on the razor’s edge: A foundational review of IoT exploitation and defense through the lens of TECHINT collection
Lemieux Intelligence and surveillance technologies
Burke et al. AP Exclusive: DHS weighed Nat Guard for immigration roundups
Hall I See You: Examining GPS Technology under Alabama's Criminal Code
TH1801007125A (th) การใช้บริเวณแยกโดดความปลอดภัยที่ใช้ฮาร์ดแวร์เป็นฐานเพื่อป้องกันการละเมิดลิขสิทธิ์และการฉ้อโกงบนอุปกรณ์อิเล็กทรอนิกส์
Barstow Land Grant Application-Barstow, Benjamin (Nobleborough)
Kanaoka et al. Ransomware: Threat Analysis and Countermeasures
Libby Land Grant Application-Libby, Jonathan (Scarborough)
SK8134Y1 (sk) Kryt na kameru notebooku
Bamford Battle in the Cloud
McIntosh Land Grant Application-McIntosh, John (Durham)
El-Said et al. Detect and Defend System On a Stick (D2S2) Against GPS Spoofing Attack
Sussman The Resusable Bomb: Exploring How the Law of Armed Conflict Applies in Cyberspace