WO2013083940A1 - Trigger device - Google Patents
Trigger device Download PDFInfo
- Publication number
- WO2013083940A1 WO2013083940A1 PCT/GB2012/000852 GB2012000852W WO2013083940A1 WO 2013083940 A1 WO2013083940 A1 WO 2013083940A1 GB 2012000852 W GB2012000852 W GB 2012000852W WO 2013083940 A1 WO2013083940 A1 WO 2013083940A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- service
- gsm
- trigger signal
- further element
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Abstract
The invention provides an apparatus for producing a trigger signal for the initiation of a further function of a device, such as a self-destruct mechanism for protecting data on a device. Various embodiments of the trigger signal apparatus are disclose.
Description
TRIGGER DEVICE
Description
This invention relates primarily to an apparatus for enabling the security of an electronic or computing device by the provision of a trigger signal which is initiated by predetermined conditions. The trigger signal can be used to initiate one or more functions of the apparatus such as a self destruct device. It can however be readily appreciated that the trigger signal may be used to enable other functions.
As the storage and transmission of large quantities of data has become easier, data security has become of greater concern for those dealing with confidential information. In particular, the increasing use of portable computing components such as laptops, external hard drives, memory cards and memory sticks means that the possibility of . such items falling into the wrong hands through simple loss or human error as well as actual theft is ever more likely.
Passwords and other identification systems such as biometric devices can help to protect data, but ultimately these are vulnerable to attack if a determined individual has long enough. If necessary passwords can be guessed by simply entering
combinations until the correct one is found.
In light of this a device or apparatus which can protect the integrity of information stored on it, by making it more difficult to access the data without proper authorisation and ultimately destroying the data in the event of loss, theft, or unauthorised access, would be advantageous.
Further, any apparatus which may be useful for protecting the security of a computing device which reacts to various external conditions may be useful for initiating other processes within other types of electronic and/or computing device.
Accordingly there is provided (claim 1 )an apparatus comprising at least one electronic circuit, said apparatus able to perform at least one function, wherein at least one of the functions of the apparatus is configured to occur in response to a trigger signal from a further element of the apparatus.
According to one embodiment of the invention (Claim 2), the at least one function is a self-destruct mechanism which is configured so as to damage at least one element of the apparatus. By way of example, the apparatus may be a laptop or other portable computing component. The apparatus may contain within it any one of a number of possible means of 'self destruct' mechanism, configured to destroy such parts of the laptop as memory circuits. The possible means may include a mechanism for simply deleting the memory contents of chips, reversing the flow of current through chips, putting an AC current through a DC device, the application of an overcurrent or overvoltage, a mechanical crushing device, piezo-electric crushing or shaking, acid release or other corrosive material release, or a simple 'lock-down' device.
In a preferred embodiment, the apparatus includes a device for monitoring for the presence of a GSM signal or service, either any generally available signal or service or any specific signal or service. Upon a significant disruption to the GSM signal or service, such as might occur in the instance that the apparatus is deprived of the GSM signal in some manner, possibly by an illegitimate user, the trigger signal is sent and a function of the apparatus is thereby activated, such as a previously discussed self destruct mechanism. The advantage of this mechanism is that it does not require a particular action to be taken by the legitimate owner of the apparatus. There are examples in the prior art of self destruct mechanisms being activated by specific codes or messages or other signals sent to a device by means of a GSM signal or service by the legitimate owner upon discovering an apparatus has, for example, been compromised - the disadvantage of these is that they can be overcome by illegitimate users by relatively simple means such as depriving the device of any GSM signal by methods such as putting the apparatus in a lead-lined container, or taking it underground. In such a case the 'self-destruct' message cannot be received and so the security of the device is bypassed. In the current invention embodiment, such active use of the GSM signal or service is not necessary - the device will self-destruct without any further intervention by the legitimate user when a disturbance occurs to the GSM signal or service that the apparatus is monitoring. This further has the advantage that the self-destruct mechanism will activate even in the instance that the legitimate user is not aware of any possible compromise of the device, such as in the scenario where the apparatus is a laptop and it has been accidentally left in a public place such as a bus or train. The apparatus can be configured to so self-destruct in response to a variety of disturbances to the GSM signal or service, such as a change of GSM transmitter in the circumstance that it is not envisaged that the apparatus will ever legitimately move more than a certain distance, or at all; a weakening of the signal by some predetermined amount indicating that the apparatus has been enclosed in some way or moved a certain distance from a GSM transmitter;
immediately upon any cessation of the signal; after a certain period of time once a signal or service has terminated; or upon a failure to receive one or more anticipated messages via the GSM signal or service, where said message may, for example, nominally be received regularly such as daily or hourly. The invention as described here could be embodied as a variety of devices, such as a laptop, external hard drive, memory stick or memory card - the apparatus could comprise, for example, little more than an SD card, a SIM card, a battery and a small amount of highly energetic material (HEM)- upon cessation of a GSM signal or service to the SIM card, the battery is connected to the HEM, which then initiates an explosion or release of intense heat, and the device is thereby destroyed. Any data of interest that is contained upon the SD card is thus rendered unobtainable.
In another embodiment of the invention, the apparatus includes an accelerometer. This may be configured within the apparatus to send a trigger signal upon the occurrence of any one of a number of physical movements of the device. In one example, the apparatus may, in legitimate use, never be intended to move from a fixed location, such as a desk. If the device is moved off the desk, the accelerometer detects the motion and the trigger signal is sent. The apparatus then performs one or more of its functions such as the setting off of an alarm or a self-destruct device.
In a preferred embodiment, the apparatus further comprises a programmable element arranged so as to record a series of physical movements of the apparatus. A legitimate user could pick up the apparatus, which by way of example is an external hard disk drive, and perform a series of movements with the apparalus, such as swinging it around a couple of times and then tapping it on a desk in a particular rhythm. The accelerometer measures these movements, converting the motions into electrical signals, and the programmable element records the sequence of signals. Should there be a subsequent occasion where the legitimate user of the apparatus apprehends that the device is about to be compromised, he or she could again pick up the apparatus and repeat the series of movements. Upon receipt of the same set of electrical signals from the accelerometer, the programmable element sends the trigger signal, which initiates a function such as a self-destruct device. It will readily be understood that the programmable element could in fact be pre-programmed with said series of physical movements or could indeed be a specific hard-wired circuit configured with a specific series of signals.
It will further be readily understood by those skilled in the art that whereas the apparatus is herein variously described as having such components as an electronic circuit, a further element, a programmable element, a GSM receiver or monitor, an accelerometer and so on, it is entirely possible that any or all of these components may be contained within one integrated circuit, or that various of these functions may be performed by a single programmable element such as a FPGA or other similar device or part thereof. The skilled person will readily understand that the various functions described may be performed in various ways and/or by various means or combinations of components and that the specific embodiments described are not intended to be limiting. Likewise the 'trigger signal' described need not necessarily be a signal between discrete separate components but may be an internal process of such a device.
A specific embodiment of the invention will now be described further by way of reference to Figure 1. Figure 1 is a block diagram showing a data storage apparatus (10) designed for use inside a laptop computer or other computing device according to the invention. The data storage apparatus (10) comprises a PCB on which are - mounted an SSD (Solid State Drive) controller (4), a battery (5), and a series of SSD (Solid State Drive) IC (Integrated Circuit) chips (2) for storing data. Holes (3) are positioned through the PCB (Printed Circuit Board) (9) under the SSD (2) IC
(Integrated Circuit) chips to allow for a directional force to push up from under the SSD (2) IC chips resulting in the SSD (2) IC chips fracturing. The PCB is further provided with a SATA (Serial Advanced Technology Attachment) connector (6) for transmitting and receiving data when in use, as well as supplying power to, the SSD IC chips (2) where necessary. A second logic controller (7) manages the environmental and physical security triggers. A GSM (Global System for Mobile communication) module (8) provides external communications to the device and is controlled by the "second logic controller (7). The data storage apparatus (10) is designed to destroy the SSD IC chips (2) in the event that an alarm response is triggered in the logic controller (7). When there is a disturbance to a GSM service to which the GSM Module (8) is tuned, the alarm response is triggered, a current is supplied from the battery (5) to wires (not shown) with ends situated within the holes (3) in the PCB (9), and this power supply
ignites the explosive material located within the holes (3) within the PCB (9), thereby destroying the SSD IC chips (2) and safeguarding any data that might be thereon.
In a second embodiment, Figure 1 is again a block diagram showing a data storage apparatus (10) designed for use inside a laptop computer or other computing device according to the invention. The data storage apparatus (10) comprises a PCB (9) on which are mounted an SSD (Solid State Drive) controller (4), a battery (5), and a series of SSD (Solid State Drive) IC (Integrated Circuit) chips (2) for storing data. Holes (3) are positioned through the PCB (Printed Circuit Board) (9) under the SSD (2) IC (Integrated Circuit) chips to allow for a directional force to push up from under the SSD
(2) IC chips resulting in the SSD (2) IC chips fracturing. The apparatus is further provided with a SATA (Serial Advanced Technology Attachment) connector (6) for transmitting and receiving data when in use, as well as supplying power to the SSD IC chips (2) where necessary. A second logic controller (7) manages the environmental and physical security triggers. An accelerometer (8) provides a measure of physical movement of the apparatus and is connected to a second logic controller (7). The data storage apparatus (10) is designed to destroy the SSD IC chips (2) in the event that an alarm response is triggered in the logic controller (7). When the device is moved, the accelerometer (8) measures the motions of the apparatus and sends a series of signals to the logic controller (7). In the instance that the series of signals from the accelerometer accords with a predetermined or pre-programmed pattern programmed into the logic controller (7) that is in accordance with a specific series or sequence of movements by the user, the alarm response is triggered. A current from the battery (5) is then supplied to wires (not shown) with ends situated within the holes
(3) in the PCB (9). This power supply ignites the explosive material located within the holes (3) within the PCB (9), thereby destroying the SSD IC chips (2) and safeguarding any data that might be thereon.
Claims
1. An apparatus comprising at least one electronic circuit, said apparatus able to
perform at least one function, wherein at least one of the functions of the apparatus is configured to occur in response to a trigger signal from a further element of the apparatus. 1
2. An apparatus as claimed in Claim 1 wherein the alteration to the GSM signal or service consists of a signal strength change.
3. An apparatus as claimed in Claim 1 wherein the alteration to the GSM signal or service consists of an interruption to the signal or service.
4. An apparatus as claimed in Claim 1 wherein the alteration to the GSM signal or service consists of said signal or service unavailability for a certain predetermined period of time.
5. An apparatus as claimed in Claim 1 wherein the alteration to the GSM signal or
service consists of the absence of a predetermined code, message or other signal anticipated to be broadcast to the apparatus, further element or GSM monitoring device by means of the GSM signal or service.
6. An apparatus as claimed in Claim 1 or 2 or 3 wherein the apparatus further
comprises at least one accelerometer.
7. An apparatus as claimed in Claim 10 wherein the trigger signal is sent by the further element of the apparatus when the accelerometer detects a predetermined change in velocity of the apparatus.
8. An apparatuses claimed in Claim 10 wherein the trigger signal is sent by the further element of the apparatus when the accelerometer detects a predetermined physical disturbance to the apparatus.
9. An apparatus as claimed in Claim 10 wherein the trigger signal is sent by the further element of the apparatus when a series of changes in velocity or physical disturbances to the apparatus matches a predetermined sequence of such changes.
10. An apparatus as claimed in Claim 13 wherein the predetermined sequence of
changes takes the form of a specific series of knocks or shakes applied to the apparatus.
11. An apparatus as claimed in Claim 14 wherein the specific series of knocks or shakes may. be defined by such variables as timing, number, duration, speed, magnitude, amplitude, direction or velocity.
12. An apparatus as claimed in any preceding claim wherein the apparatus is portable.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB201121103A GB2497919A (en) | 2011-12-08 | 2011-12-08 | Electronic circuit apparatus performing a function in response to a trigger signal |
GB1121103.4 | 2011-12-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013083940A1 true WO2013083940A1 (en) | 2013-06-13 |
Family
ID=45541398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2012/000852 WO2013083940A1 (en) | 2011-12-08 | 2012-11-22 | Trigger device |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2497919A (en) |
WO (1) | WO2013083940A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2835759A1 (en) * | 2013-08-08 | 2015-02-11 | GbR Oliver Oechsle, Dr. Hans-Peter Dietz | Method and system for managing a defective electronic user terminal |
CN111046446A (en) * | 2019-10-24 | 2020-04-21 | 深圳市国科亿道科技有限公司 | Computer with hard disk data self-destruction function |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108121919A (en) * | 2018-01-12 | 2018-06-05 | 山东渔翁信息技术股份有限公司 | A kind of encryption apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020162011A1 (en) * | 2001-04-27 | 2002-10-31 | Atsushi Tanaka | Portable information processing device having data evacuation function and method thereof |
EP1521160A2 (en) * | 2003-10-01 | 2005-04-06 | Microsoft Corporation | Systems and methods for deterring theft of electronic devices |
US20060225142A1 (en) * | 2005-04-05 | 2006-10-05 | Cisco Technology, Inc. (A California Corporation) | Method and electronic device for triggering zeroization in a electronic device |
US20110055891A1 (en) * | 2009-08-26 | 2011-03-03 | Rice Christopher T | Device security |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006105552A2 (en) * | 2005-03-29 | 2006-10-05 | Milan Tomasovic | Device for protecting data in laptop computers in case of their loss or theft |
GB2456396A (en) * | 2008-01-21 | 2009-07-22 | Life Dust Ltd | Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. |
GB2460275B (en) * | 2008-05-23 | 2012-12-19 | Exacttrak Ltd | A Communications and Security Device |
CN101706853B (en) * | 2009-11-10 | 2011-05-18 | 徐欣 | Solid state disk (SSD)-based anti-leakage self-destruction system |
GB2481043A (en) * | 2010-06-09 | 2011-12-14 | Pangaea Media Ltd | Storage device adapted to physically destroy itself in response to an unauthorised access attempt |
-
2011
- 2011-12-08 GB GB201121103A patent/GB2497919A/en not_active Withdrawn
-
2012
- 2012-11-22 WO PCT/GB2012/000852 patent/WO2013083940A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020162011A1 (en) * | 2001-04-27 | 2002-10-31 | Atsushi Tanaka | Portable information processing device having data evacuation function and method thereof |
EP1521160A2 (en) * | 2003-10-01 | 2005-04-06 | Microsoft Corporation | Systems and methods for deterring theft of electronic devices |
US20060225142A1 (en) * | 2005-04-05 | 2006-10-05 | Cisco Technology, Inc. (A California Corporation) | Method and electronic device for triggering zeroization in a electronic device |
US20110055891A1 (en) * | 2009-08-26 | 2011-03-03 | Rice Christopher T | Device security |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2835759A1 (en) * | 2013-08-08 | 2015-02-11 | GbR Oliver Oechsle, Dr. Hans-Peter Dietz | Method and system for managing a defective electronic user terminal |
WO2015018866A1 (en) * | 2013-08-08 | 2015-02-12 | Gbr Oliver Oechsle, Dr. Hans-Peter Dietz | Method and system for handling a defective electronic user terminal |
CN105556537A (en) * | 2013-08-08 | 2016-05-04 | 奥利弗·厄克斯勒与汉斯-彼得·迪茨博士民法公司 | Method and system for handling a defective electronic user terminal |
US10042696B2 (en) | 2013-08-08 | 2018-08-07 | Gbr Oliver Oechsle, Dr. Hans-Peter Dietz | Method and system for handling a defective electronic user terminal |
CN111046446A (en) * | 2019-10-24 | 2020-04-21 | 深圳市国科亿道科技有限公司 | Computer with hard disk data self-destruction function |
Also Published As
Publication number | Publication date |
---|---|
GB2497919A (en) | 2013-07-03 |
GB201121103D0 (en) | 2012-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11704445B2 (en) | Tamper resistant module for industrial control system | |
EP2788915B1 (en) | Data security device | |
US9792446B2 (en) | System and method for protecting data stored on a removable data storage device | |
US9465755B2 (en) | Security parameter zeroization | |
US20090189765A1 (en) | Security apparatus for an electronic device | |
TWI464617B (en) | Always-available embedded theft reaction subsystem | |
US20100132047A1 (en) | Systems and methods for tamper resistant memory devices | |
WO2013083940A1 (en) | Trigger device | |
WO2008043653A1 (en) | Method and system for initiating proximity warning alarm for electronic devices and prohibiting operation thereof | |
CN107533607A (en) | Attack detecting is carried out by signal delay monitoring | |
CN101221614A (en) | Remote calibration method of real time clock in software protection device | |
CN203013274U (en) | Data self-destructive electronic hard disk | |
CN101324911B (en) | Access protection method and system of computer system internal information with first level verification | |
GB2481043A (en) | Storage device adapted to physically destroy itself in response to an unauthorised access attempt | |
EP2360627B1 (en) | Rotation-activated electronic component with time-limited use | |
CN112270021A (en) | Wireless self-destruction control circuit and method for security chip | |
EP1194828A1 (en) | Apparatus and method for safeguarding electronic equipment from theft | |
RU2210807C2 (en) | Information protection device | |
CN110874495A (en) | Solid state disk based on automatic locking write protection function and tamper-proof method | |
GB2456396A (en) | Hard drive that destroys the data stored on it when it does not receive the correct periodic signal via a wireless receiver. | |
WO2004090828A1 (en) | Remote protection system | |
US10380385B1 (en) | Visual security device | |
DK1965328T3 (en) | Method for protection and thus secured mobile device | |
EP1239358B1 (en) | Security system for preventing a personal computer from being stolen or used by unauthorized people |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12809297 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12809297 Country of ref document: EP Kind code of ref document: A1 |