WO2009136161A1 - Data encryption device - Google Patents

Data encryption device Download PDF

Info

Publication number
WO2009136161A1
WO2009136161A1 PCT/GB2009/001139 GB2009001139W WO2009136161A1 WO 2009136161 A1 WO2009136161 A1 WO 2009136161A1 GB 2009001139 W GB2009001139 W GB 2009001139W WO 2009136161 A1 WO2009136161 A1 WO 2009136161A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
encryption
storage device
external
data storage
Prior art date
Application number
PCT/GB2009/001139
Other languages
French (fr)
Inventor
John Michael
Original Assignee
John Michael
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by John Michael filed Critical John Michael
Priority to EP09742357A priority Critical patent/EP2283450A1/en
Priority to US12/991,451 priority patent/US20110060921A1/en
Publication of WO2009136161A1 publication Critical patent/WO2009136161A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1456Hardware arrangements for backup
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • This invention relates to a device for encryption of data, and in particular to a device for coupling between a computer and an external data storage device.
  • Many users utilise external storage devices to increase data storage capacity and/or as a back-up solution and/or to allow data interchange between two or more personal computers.
  • Developments in technology have made external storage devices ever more compact and convenient, and as a result their use is spreading.
  • external storage devices are supplied in 'plug and play' form, i.e. needing no additional software to access the stored data.
  • Devices can connect via a number of interfaces, such as USB, Fire WireTM SATA interface. The transport of data between the home and workplace has become widespread.
  • US 2007/0033320 discloses a USB connected dongle between a computer and a memory device.
  • the dongle encrypts and decrypts data passing between the computer and the memory device. Data on the memory device is accessible only with the use of the dongle in order to ensure that it remains secure.
  • the present invention provides a device for encryption of data comprising: a first coupling for connection to a computer, a second coupling for connection fo an external data storage device, and an encryption circuit for encryption and decryption of data stored on or being transferred to the external data storage device, wherein the encryption circuit is arranged such that during encryption a decryption key is stored on the external data storage device, and such that during decryption the decryption key is retrieved from the external data storage device.
  • the data stored on the device can be securely encrypted for security, whilst avoiding shortfalls arising from the prior art techniques.
  • devices- such as that in US 2007/0033320 it is necessary for the exact same dongle to be used to decrypt the data. Data cannot therefore be easily transported between users without also transporting the dongle. Moreover, if the dongle used for encryption is lost, then it becomes impossible to .access the data.
  • the device of the present invention allows another corresponding device of the same type to be used for decryption, thus avoiding these issues.
  • the device comprises a security device for checking that access to the encrypted data is authorised, wherein security data generated by the security device is stored on the external data storage device along with or as a part of the decryption key.
  • the security device may comprise means for receiving and checking a code such as a password or PIN.
  • the security device may comprise a biometric sensor such as a fingerprint reader.
  • any user with a corresponding encryption device is not permitted unless they are also able to provide the necessary code or biometrics.
  • the security data is stored on the external data storage device it is not necessary for the same encryption device to be used to encrypt and decrypt the data.
  • a first user can send a secure encrypted storage device to a second user, and convey a security code to that second user by telephone or personally, and the second user can access the data using their own encryption device.
  • a biometric system is used, the user does not need to transport his encryption device along with the external data storage device, but instead can use another encryption device at a remote location.
  • the encryption circuit encrypts data passing between the first and second couplings.
  • the encryption circuit may be arranged to encrypt data already stored on the external data storage device. Any suitable circuit may be used for the encryption circuit, but the most preferred circuit type is an application-specific integrated circuit (ASIC), as this enables the device to be small and compact.
  • a preferred embodiment includes an automated back-up function, wherein the device includes a controller arranged to cause data stored on the computer to be copied to the external data storage device and encrypted. A switch may be provided to initiate the back-up function. The controller may cause all data stored . on the computer to be copied to the external data storage device when the external data storage device does not contain any of the data.
  • the first and second couplings may be any suitable coupling device selected from those commonly used for the connection of external data storage devices; For example, couplings adapted for u ⁇ e with any standard serial bus interface can be used, such as USB 5 FireWire ⁇ ODEEE 1394 interface), or Serial Advanced Technology Attachment (SATA).
  • the encryption device may be provided -with a number of alternative coupling types to enable it to be compatible with different types of external storage device.
  • Figure 1 shows an encryption device connected between a personal computer and an external storage device.
  • FIG. 1 a preferred embodiment of an encryption device 1 is shown connected between a personal computer 2 and an external storage device 3.
  • the external storage device 3 is an external hard disk drive type device, and hence includes a hard disc drive 4,
  • the hard disc drive 4 is connected by a hard, disc drive interface 5 to a USB interface 6.
  • the USB interface 6 enables the external storage device 3 to be coupled to a USB socket on a computer.
  • the personal computer 2 includes a USB interface 7, which joins to a USB socket for connection with external devices, and has a connection 8 to other parts of the personal computer 2, including the computer's internal storage (not shown).
  • the external storage device 3 would connect directly to the personal computer 2, and data would be transferred directly between the two via the USB connection.
  • the encryption device 1 is fitted in between the two, so that data passes through the encryption device 1 when it is transferred from the computer 2 to the external storage 3.
  • the encryption device 1 includes USB interfaces 9, 10 for connection to the computer 2 and external storage 3 respectively.
  • the active component of the encryption device 1 is an encryption and control circuit 11 in the form of an ASIC.
  • This circuit 11 is arranged to encrypt data passing between the computer 2 and the external storage.3.
  • the circuit 11 is also arranged to optionally encrypt data already stored on the external data storage device 3, if required by the user.
  • the circuit 11 has access to the external storage 3 via the USB interface 10, arid is arranged to store a decryption- key on the external storage 3 as part of the encryption process.
  • the device 1 looks for a decryption key on the external data storage device 3 to which it is attached. In this way, any device of this type can be used to decrypt data that is encrypted by any other device of this type, provided that additional security controls are met, as set out below.
  • the device 1 comprises a security and data input device 12 for checking that access to the encrypted data is authorised and for input of data by the user via a data input interface 13.
  • the data input by the user may include a code word or number for checking if access to the encrypted data is authorised.
  • the security and data input device 12 includes means for receiving and checking a code such as a password or PIN.
  • the security and data input device 12 may comprise a biometric sensor such as a fingerprint reader.
  • the encryption device 1 also includes an automated data back-up function.
  • the circuit 11 is arranged to cause data stored on the computer 2 to be copied to the external data storage device 3 and encrypted in response to input from the user via the data input interface 13. Alternatively, a separate switch may be provided to initiate the back-up function. When the back-up function is first used, the circuit 11 causes all data stored on the computer 2 to be copied to the external data storage device 3 when the external data storage device 3 does not contain any of the data. During later use of the back-up function, when some data from the computer 2 is already backed-up on the external data storage device 3, the circuit 11 only backs-up new data.

Abstract

A device for encryption of data comprising: a first coupling (9) for connection to a computer (2), a second coupling (10) for connection to an external data storage device (3), and an encryption circuit (11) for encryption and decryption of data stored on or being., transferred to the external data storage device (3), wherein the encryption circuit (11) is arranged such that during encryption a decryption key is stored on the external data storage device (3), and such that during decryption the decryption key is retrieved from the external data storage device (3).

Description

DATA ENCRYPTION DEVICE
This invention relates to a device for encryption of data, and in particular to a device for coupling between a computer and an external data storage device. Many users utilise external storage devices to increase data storage capacity and/or as a back-up solution and/or to allow data interchange between two or more personal computers. Developments in technology have made external storage devices ever more compact and convenient, and as a result their use is spreading. Typically, external storage devices are supplied in 'plug and play' form, i.e. needing no additional software to access the stored data. Devices can connect via a number of interfaces, such as USB, Fire Wire™ SATA interface. The transport of data between the home and workplace has become widespread.
Clearly, the ease of movement of data and the ease of access to data stored on these types of devices results in a major security concern. With many types of device if the device is lost or stolen then the data can be accessed on any personal computer. In the prior art, attempts have been made to address this issue.
US 2007/0033320 discloses a USB connected dongle between a computer and a memory device. The dongle encrypts and decrypts data passing between the computer and the memory device. Data on the memory device is accessible only with the use of the dongle in order to ensure that it remains secure.
Viewed from one aspect, the present invention provides a device for encryption of data comprising: a first coupling for connection to a computer, a second coupling for connection fo an external data storage device, and an encryption circuit for encryption and decryption of data stored on or being transferred to the external data storage device, wherein the encryption circuit is arranged such that during encryption a decryption key is stored on the external data storage device, and such that during decryption the decryption key is retrieved from the external data storage device.
With this arrangement, the data stored on the device can be securely encrypted for security, whilst avoiding shortfalls arising from the prior art techniques. With devices- such as that in US 2007/0033320 it is necessary for the exact same dongle to be used to decrypt the data. Data cannot therefore be easily transported between users without also transporting the dongle. Moreover, if the dongle used for encryption is lost, then it becomes impossible to .access the data. The device of the present invention allows another corresponding device of the same type to be used for decryption, thus avoiding these issues.
In a preferred embodiment, the device comprises a security device for checking that access to the encrypted data is authorised, wherein security data generated by the security device is stored on the external data storage device along with or as a part of the decryption key. For example, the security device may comprise means for receiving and checking a code such as a password or PIN. Alternatively or in addition, the security device may comprise a biometric sensor such as a fingerprint reader.
Thus, with the use of the additional security device, access by any user with a corresponding encryption device is not permitted unless they are also able to provide the necessary code or biometrics. However, because the security data is stored on the external data storage device it is not necessary for the same encryption device to be used to encrypt and decrypt the data. A first user can send a secure encrypted storage device to a second user, and convey a security code to that second user by telephone or personally, and the second user can access the data using their own encryption device. Alternatively, where a biometric system is used, the user does not need to transport his encryption device along with the external data storage device, but instead can use another encryption device at a remote location.
In one preferred arrangement, the encryption circuit encrypts data passing between the first and second couplings. Alternatively or in addition, the encryption circuit may be arranged to encrypt data already stored on the external data storage device. Any suitable circuit may be used for the encryption circuit, but the most preferred circuit type is an application-specific integrated circuit (ASIC), as this enables the device to be small and compact. A preferred embodiment includes an automated back-up function, wherein the device includes a controller arranged to cause data stored on the computer to be copied to the external data storage device and encrypted. A switch may be provided to initiate the back-up function. The controller may cause all data stored. on the computer to be copied to the external data storage device when the external data storage device does not contain any of the data. Alternatively, when some data from the computer is backed-up on the external data storage device the controller may cause only new data to be backed-up. The first and second couplings may be any suitable coupling device selected from those commonly used for the connection of external data storage devices; For example, couplings adapted for uδe with any standard serial bus interface can be used, such as USB5 FireWire^ODEEE 1394 interface), or Serial Advanced Technology Attachment (SATA). The encryption device may be provided -with a number of alternative coupling types to enable it to be compatible with different types of external storage device.
Certain preferred embodiments of the invention will now be described by way of example only and with reference to the accompanying drawings in which:
Figure 1 shows an encryption device connected between a personal computer and an external storage device.
In Figure 1 a preferred embodiment of an encryption device 1 is shown connected between a personal computer 2 and an external storage device 3. In the example shown, the external storage device 3 is an external hard disk drive type device, and hence includes a hard disc drive 4, The hard disc drive 4 is connected by a hard, disc drive interface 5 to a USB interface 6. The USB interface 6 enables the external storage device 3 to be coupled to a USB socket on a computer.
The personal computer 2 includes a USB interface 7, which joins to a USB socket for connection with external devices, and has a connection 8 to other parts of the personal computer 2, including the computer's internal storage (not shown). In normal use, the external storage device 3 would connect directly to the personal computer 2, and data would be transferred directly between the two via the USB connection. The encryption device 1 is fitted in between the two, so that data passes through the encryption device 1 when it is transferred from the computer 2 to the external storage 3. The encryption device 1 includes USB interfaces 9, 10 for connection to the computer 2 and external storage 3 respectively.
The active component of the encryption device 1 is an encryption and control circuit 11 in the form of an ASIC. This circuit 11 is arranged to encrypt data passing between the computer 2 and the external storage.3. The circuit 11 is also arranged to optionally encrypt data already stored on the external data storage device 3, if required by the user. The circuit 11 has access to the external storage 3 via the USB interface 10, arid is arranged to store a decryption- key on the external storage 3 as part of the encryption process. During the decryption process, the device 1 looks for a decryption key on the external data storage device 3 to which it is attached. In this way, any device of this type can be used to decrypt data that is encrypted by any other device of this type, provided that additional security controls are met, as set out below.
For additional security, the device 1 comprises a security and data input device 12 for checking that access to the encrypted data is authorised and for input of data by the user via a data input interface 13. The data input by the user may include a code word or number for checking if access to the encrypted data is authorised. In this case, the security and data input device 12 includes means for receiving and checking a code such as a password or PIN. Alternatively or in addition, the security and data input device 12 may comprise a biometric sensor such as a fingerprint reader.
Security data generated by the security and data input device 12 is stored on the external data storage device 3 along with or as a part of the decryption key. This means that even with the additional security, it is still not necessary for the exact same device to be used for both the encryption and the decryption of data. The encryption device 1 also includes an automated data back-up function. The circuit 11 is arranged to cause data stored on the computer 2 to be copied to the external data storage device 3 and encrypted in response to input from the user via the data input interface 13. Alternatively, a separate switch may be provided to initiate the back-up function. When the back-up function is first used, the circuit 11 causes all data stored on the computer 2 to be copied to the external data storage device 3 when the external data storage device 3 does not contain any of the data. During later use of the back-up function, when some data from the computer 2 is already backed-up on the external data storage device 3, the circuit 11 only backs-up new data.

Claims

CLAMS:
1. A device for encryption of data comprising: a first coupling for connection to a computer, a second coupling for connection to an external data storage device, and an encryption circuit for encryption and decryption of data stored on or being transferred to the external data storage device, wherein the encryption circuit is arranged such that during encryption a decryption key is stored on the external data storage device, and such that during decryption the decryption key is retrieved from the external data storage device.
2. A device for encryption of data as claimed in claim 1 , comprising a security device for checking that access to the encrypted data is authorised, wherein security data generated by the security device is stored on the external. data storage device along with or as a part of the decryption key.
3. A device for encryption of data as claimed in claim 2, wherein the security device comprises means for receiving and checking a code.
4. A device for encryption of data as claimed in claim 2 or 3, wherein the security device comprises a biometric sensor.
,
5. A device for encryption of data as claimed in any preceding claim, wherein the encryption circuit is arranged to encrypt data passing between the first and second couplings.
6. A device for encryption of data as claimed in any preceding claim, wherein the encryption circuit, is arranged to encrypt data already stored on the external data storage device.
7. A device for encryption of data'as claimed in any preceding claim, wherein the encryption circuit is an application-specific integrated circuit (ASIC).
8. A device for encryption of data as claimed in any preceding claim, wherein the device includes a controller arranged to cause data stored on the computer to be copied to the external data storage device and encrypted in order to provide a back-up copy of the data.
9. A device for encryption of data as claimed in claim 8, wherein a switch is provided to initiate the back-up function.
10. A device for encryption of data as claimed in claim 8 or 9, wherein the controller is arranged to cause all data stored on the computer to be copied to the external data storage device when the external data storage device does not contain any of the data, and wherein when some data from the computer is already backed-up on the external data storage device the controller causes only new data to be copied to the external data storage device.
11. A device for encryption of data as claimed in any preceding claim, wherein the first and second couplings are adapted for use with a standard serial bus interface, such as USB, FireWire™(IEEE 1394 interface), or Serial Advanced Technology Attachment (SATA).
12. A device for encryption of data as claimed in any preceding claim, comprising a plurality of alternative coupling types to enable it to be compatible with different types of external storage device.
13. A device for encryption of data substantially as hereinbefore described with reference to the accompanying drawing.
PCT/GB2009/001139 2008-05-08 2009-05-08 Data encryption device WO2009136161A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP09742357A EP2283450A1 (en) 2008-05-08 2009-05-08 Data encryption device
US12/991,451 US20110060921A1 (en) 2008-05-08 2009-05-08 Data Encryption Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0808341.2A GB0808341D0 (en) 2008-05-08 2008-05-08 External storage security and encryption device
GB0808341.2 2008-05-08

Publications (1)

Publication Number Publication Date
WO2009136161A1 true WO2009136161A1 (en) 2009-11-12

Family

ID=39570976

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2009/001139 WO2009136161A1 (en) 2008-05-08 2009-05-08 Data encryption device

Country Status (4)

Country Link
US (1) US20110060921A1 (en)
EP (1) EP2283450A1 (en)
GB (1) GB0808341D0 (en)
WO (1) WO2009136161A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012030296A3 (en) * 2010-09-02 2012-04-26 Business Security Ol Ab Electronic encryption device and method
CN103258172A (en) * 2012-06-13 2013-08-21 福建睿矽微电子科技有限公司 Off-chip Nor Flash bus interface hardware encryption device
EP2642421A1 (en) * 2012-03-20 2013-09-25 TechSAT GmbH Data loading device
CN103902931A (en) * 2013-12-17 2014-07-02 哈尔滨安天科技股份有限公司 Mobile storage device automatic encryption method
WO2019234409A1 (en) 2018-06-06 2019-12-12 iStorage Limited Dongle for ciphering data
WO2020094585A1 (en) 2018-11-07 2020-05-14 iStorage Limited Methods and systems of securely transferring data
EP3916595A1 (en) 2017-09-05 2021-12-01 Istorage Limited Methods and systems of securely transferring data

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9075571B2 (en) 2005-07-21 2015-07-07 Clevx, Llc Memory lock system with manipulatable input device and method of operation thereof
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US10181055B2 (en) 2007-09-27 2019-01-15 Clevx, Llc Data security system with encryption
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
TWI537732B (en) * 2007-09-27 2016-06-11 克萊夫公司 Data security system with encryption
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US8572403B2 (en) * 2008-12-24 2013-10-29 The Commonwealth Of Australia Digital video guard
US20100174913A1 (en) * 2009-01-03 2010-07-08 Johnson Simon B Multi-factor authentication system for encryption key storage and method of operation therefor
US9286493B2 (en) * 2009-01-07 2016-03-15 Clevx, Llc Encryption bridge system and method of operation thereof
US9734356B2 (en) 2009-06-29 2017-08-15 Clevx, Llc Encrypting portable media system and method of operation thereof
JP5743475B2 (en) * 2010-09-28 2015-07-01 キヤノン株式会社 Information processing apparatus, information processing apparatus control method, and program
US10146293B2 (en) * 2014-09-22 2018-12-04 Western Digital Technologies, Inc. Performance-aware power capping control of data storage devices

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998055912A1 (en) * 1997-06-04 1998-12-10 Spyrus, Inc. Modular security device
EP0950941A2 (en) * 1998-03-18 1999-10-20 Fujitsu Limited Method of and apparatus for protecting data on storage medium and storage medium
US6199163B1 (en) * 1996-03-26 2001-03-06 Nec Corporation Hard disk password lock
US20070033320A1 (en) * 2005-08-05 2007-02-08 Wu Victor C Crypto pass-through dangle
US20070165864A1 (en) * 2003-07-08 2007-07-19 Fujitsu Limited Encryption device

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI246028B (en) * 2001-06-28 2005-12-21 Trek 2000 Int Ltd A portable device having biometrics-based authentication capabilities
US20030046568A1 (en) * 2001-09-06 2003-03-06 Riddick Christopher J. Media protection system and method and hardware decryption module used therein
US7478235B2 (en) * 2002-06-28 2009-01-13 Microsoft Corporation Methods and systems for protecting data in USB systems
US20040123113A1 (en) * 2002-12-18 2004-06-24 Svein Mathiassen Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks
GB0507495D0 (en) * 2005-04-14 2005-05-18 Radio Tactics Ltd A forensic toolkit and method for accessing data stored on electronic smart cards
US7945788B2 (en) * 2005-05-03 2011-05-17 Strong Bear L.L.C. Removable drive with data encryption
US8689102B2 (en) * 2006-03-31 2014-04-01 Ricoh Company, Ltd. User interface for creating and using media keys
JP2007288747A (en) * 2006-04-20 2007-11-01 Ricoh Co Ltd Image processing system, control method of same, image forming apparatus, and image reproducing device
US20080052531A1 (en) * 2006-08-11 2008-02-28 Id-Catch Ab Device and Method for Secure Biometric Applications
JP4301275B2 (en) * 2006-09-28 2009-07-22 ソニー株式会社 Electronic device and information processing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6199163B1 (en) * 1996-03-26 2001-03-06 Nec Corporation Hard disk password lock
WO1998055912A1 (en) * 1997-06-04 1998-12-10 Spyrus, Inc. Modular security device
EP0950941A2 (en) * 1998-03-18 1999-10-20 Fujitsu Limited Method of and apparatus for protecting data on storage medium and storage medium
US20070165864A1 (en) * 2003-07-08 2007-07-19 Fujitsu Limited Encryption device
US20070033320A1 (en) * 2005-08-05 2007-02-08 Wu Victor C Crypto pass-through dangle

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012030296A3 (en) * 2010-09-02 2012-04-26 Business Security Ol Ab Electronic encryption device and method
EP2642421A1 (en) * 2012-03-20 2013-09-25 TechSAT GmbH Data loading device
EP2650819A1 (en) * 2012-03-20 2013-10-16 TechSAT GmbH Data loading device
CN103258172A (en) * 2012-06-13 2013-08-21 福建睿矽微电子科技有限公司 Off-chip Nor Flash bus interface hardware encryption device
CN103902931A (en) * 2013-12-17 2014-07-02 哈尔滨安天科技股份有限公司 Mobile storage device automatic encryption method
EP3916595A1 (en) 2017-09-05 2021-12-01 Istorage Limited Methods and systems of securely transferring data
WO2019234409A1 (en) 2018-06-06 2019-12-12 iStorage Limited Dongle for ciphering data
WO2020094585A1 (en) 2018-11-07 2020-05-14 iStorage Limited Methods and systems of securely transferring data

Also Published As

Publication number Publication date
EP2283450A1 (en) 2011-02-16
US20110060921A1 (en) 2011-03-10
GB0808341D0 (en) 2008-06-18

Similar Documents

Publication Publication Date Title
US20110060921A1 (en) Data Encryption Device
US8761402B2 (en) System and methods for digital content distribution
US20160174068A1 (en) Integrated Circuit Device That Includes A Secure Element And A Wireless Component For Transmitting Protected Data Over A Local Point-To-Point Wireless Communication Connection
US20160239232A1 (en) Integrated Circuit Device That Includes A Secure Element And A Wireless Component For Transmitting Protected Data Over A Local Point-To-Point Wireless Communication Connection
US8127150B2 (en) Data security
US8761403B2 (en) Method and system of secured data storage and recovery
US8528096B2 (en) Secure universal serial bus (USB) storage device and method
TWI462558B (en) System and method for storing a password recovery secret
US20100058066A1 (en) Method and system for protecting data
CN100437618C (en) Portable information safety device
EP1775881A1 (en) Data management method, program thereof, and program recording medium
EP2695069B1 (en) Method and system for usb with an integrated crypto ignition key
US8731191B2 (en) Data encryption method and system and data decryption method
US8166561B2 (en) Security device, secure memory system and method using a security device
US20070113097A1 (en) [storage media]
US20090187770A1 (en) Data Security Including Real-Time Key Generation
US20100174902A1 (en) Portable storage media with high security function
US20140372653A1 (en) Storage Device with Multiple Interfaces and Multiple Levels of Data Protection and Related Method Thereof
US20100077229A1 (en) Method for employing usb record carriers and a related module
US20130117864A1 (en) Authentication system
WO2004081706A2 (en) Method and apparatus for controlling the provision of digital content
US20120047582A1 (en) Data deleting method for computer storage device
TWI502401B (en) Method of password management and identification adapted for trusted platform module
KR20080032786A (en) Portable memory media for recording and using contents applied drm
JP2011107801A (en) Security method for external storage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09742357

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 12991451

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2009742357

Country of ref document: EP