[go: up one dir, main page]

GB2481043A - Storage device adapted to physically destroy itself in response to an unauthorised access attempt - Google Patents

Storage device adapted to physically destroy itself in response to an unauthorised access attempt Download PDF

Info

Publication number
GB2481043A
GB2481043A GB1009665.9A GB201009665A GB2481043A GB 2481043 A GB2481043 A GB 2481043A GB 201009665 A GB201009665 A GB 201009665A GB 2481043 A GB2481043 A GB 2481043A
Authority
GB
United Kingdom
Prior art keywords
data
battery
data storage
storage device
destroy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1009665.9A
Other versions
GB201009665D0 (en
Inventor
James Little
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PANGAEA MEDIA Ltd
Original Assignee
PANGAEA MEDIA Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PANGAEA MEDIA Ltd filed Critical PANGAEA MEDIA Ltd
Priority to GB1009665.9A priority Critical patent/GB2481043A/en
Publication of GB201009665D0 publication Critical patent/GB201009665D0/en
Publication of GB2481043A publication Critical patent/GB2481043A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A portable apparatus 10 for storing data using solid state technology comprising electronic data storage device(s) 2 and a battery 5. The apparatus is configured to provide current from the battery to support the physical destruction mechanism that destroys the data storage device in the event that predetermined conditions are met. The destruction mechanism is an explosive material located in holes 3 through the printed circuit board 9 (PCB) positioned under the chip components of the apparatus. The explosive material may be ignited by wires embedded in it. There are various trigger mechanisms, including a GSM module 8, that initiate the destruction process providing security for stored data from unauthorised access.

Description

Data Security Device
Field of the Invention
This nvention relates to an apparatus for storing data
Background to the Invention
As the storage and transmission of large quantities of data has become easier, data security has become more of a concern for everyone dealing with confidential information. When a single hard drive can hold terabytes of confidential, personal or commercially sensitive information, the loss of that hard drive is a serious concern. With the increasing use of portable computing components such as laptops and external hard drives, it is no longer necessary for these items to be stolen for them tD come to harm.
They may fall into the wrong hands simply through loss and human error.
Passwords and other identification systems such as biometric devices can help to protect data, but they are ultimately vulnerable to attack if a criminal has long enough. If necessary, passwords can be guessed by simply entering words until the correct one is found.
In light of this a device which can protect the integrity of information stored on it, by making it more difficult to access the data without proper identification and destroying the data in the event of loss, theft or unauthorised access, would be advantageous.
International Patent Number WO 02/095550 to Gray relates to a security device adapted to be connected to a digital data storage device and to physically destroy said data in case of unauthorised using of the same is disclosed. The patent WO 02/095550 in one embodiment describes the use of an explosive ring situated on top of a hard disk drive platter which would destroy the data if ignited. The invention disclosed in this patent fails to define in particular the detonation method and contact method the device has to the explosive ring from the battery. Given this ring is spinning with the disk platter at 5,200 revolutions per minute the invention mentions nothing about sustaining a connection to the explosive ring while it spins which would be necessary to initiate the explosive. Given this design, the production of said device would be impractical from the perspective of applying an explosive ring that would not upset the geometry and very tight tolerances of the spinning disk with spin speeds of 5,200 and higher with a maximum spin speed of an HDD drive being 15,000 rpm. Any loss of geometry would cause read I write problems for the hard drive. These constraints make the claim unpractical as a working solution.
The invention described within this filing uses an explosive material which has direct contact with the solid state storage integrated circuits (SSD) which make up the data storage device and not traditional hard disk drives and their spinning platters. This claim also clearly states the method if ignition of the explosive and its contact with the printed circuit board and subsequently the battery.
Physical destruction of magnetic data is the only 100% sure way of safe guarding against unauthorised access to data.
Summary of lnventon
Accordingly this invention provides an apparatus for storing electronic data. The apparatus comprises an electronic data storage device and a battery. The apparatus is configured to provide current from the battery to physically destroy the data storage device in the event that predetermined conditions are met.
In this way, the invention provides a device that can be used to store data securely. In the event that the stored data is compromised the apparatus will physically destroy the data storage device such that the information stored there cannot be retrieved. Merely deleting the information on a drive such as an SSD (Solid State Drive) or a conventional magnetic disc hard drive does not guarantee that the information cannot be retrieved. By taking advantage of traces left in the recording medium, for example due to the hysteresis effect in the case of magnetic mediums, the information can be recovered. Destroying the device will prevent this.
Typically, the electronic data storage device will comprise an SSD (Solid State Drive), such as a flash memory NAND based drive.
In the currently preferred embodiment, the data storage device is destroyed by very small amounts of explosive material housed specifically within a hole in the PCB (Printed Circuit Board) underneath the solid state NAND data storage IC chips. The ignition of the explosive material is provided via one of the two onboard batteries passing a current through kanthal wires which are embedded within the explosive material. The use of holes in the PCB positioned under the solid state IC chips that make up the data storage device enable a directional force from the explosive material to pass up through the memory chips causing them to fracture. All internal PCB tracks that make up the electrical device would pass around the perimeter of the holes. This is a practical use of the explosive which does not present complications within production and allows the addition of the explosive after the data storage IC chips have been placed on the PCB.
In a preferred embodiment, the apparatus must be provided with an activation signal before the battery/ batteries can be charged. This prevents an illegitimate user from keeping the battery charged and hence keeping the stored data intact while they attempt to circumvent any anti-tamper mechanisms. The signal will typically comprise of a code entered via a touch pad incorporated in the device. Where this is the case, the apparatus may be configured to destroy the electronic data storage device if an incorrect code is entered a predetermined number of times.
In a preferred embodiment, the apparatus is configured to destroy the data storage device on the press of an integral button or remote button connected to the device. This manual intervention by pressing of the button allows the electrical supply from the devices interface connector to be used to ignite the explosive material to destroy the data storage device.
In a preferred embodiment, the apparatus is configured to destroy the data storage device on the starvation of a GSM (Global System for Mobile communication) signal or service for a predefined period of time. The apparatus will interpret this signal or service starvation as an illegitimate attempt to gain access to the data stored on the device and to safe guard the data initiate the destruction process.
In a preferred embodiment, the apparatus is configured to destroy the data storage device on the removal or disruption to the devices external interface connector to the computer either via a cable or PCB connector type for example but not limited to a Peripheral Component Interconnect (PCI) bus interface. The device may comprise of a SATA (Serial Advanced Technology Attachment) connector, a USB (Universal Serial Bus) connector or any other data transfer interface. In the event the connector is removed or disturbed sufficiently the apparatus could interpret this as an illegitimate attempt to gain access to the data stored on the device and to safe guard the data initiate the destruction process.
In a preferred embodiment, the apparatus can automaticay copy data stored within the device to a secondary device of the same design without being given a user instruction to do so. If a secondary device is connected to the primary device and the correct authentication signal is provided to the primary device, the primary device will automatically allow for the copy all data stored on it to be made to the secondary device.
This data transfer process requires no intervention by the user of the device and provides an unattended backup of secure data from one secure device to another.
Brief Description of Drawings
An embodiment of the invention will now be described, by way of example only, and with reference to the accompanying drawings in which: Figures 1, 2 and 3 are block diagrams showing plan views a first and second embodiment of the invention respectively.
Detailed Description of Exemplary Embodiments
Figure 1 is a block diagram showing a first data storage apparatus (10) designed for use inside a laptop computer or other computing device according to a first embodiment of the invention. The first data storage apparatus (10) comprises of an SSD (Solid State Drive) controller (4), a battery (5), and a series of SSD (Solid State Drive) IC (Integrated Circuit) chips (2) for storing data. Holes (3) are positioned through the PCB (Printed Circuit Board) (9) under the SSD (2) IC (Integrated Circuit) chips to allow for a directional force to push up from under the SSD (2) IC chips resulting in the SSD (2) IC chips fracturing. The SSD IC chips (2) is provided with a SATA (Serial Advanced Technology Attachment) connector (6) for transmitting and receiving data when in use, as well as supplying power to the SSD IC chips (2) where necessary. A second logic controller (7) manages the environmental and physical security triggers. A GSM (Global System for Mobile communication) module (8) provides external communications to the device and is controlled by the second logic controller (7).
The data storage apparatus (10) is designed to destroy the SSD IC chips (2) in the event that an alarm response is triggered in the logic controller (7). When the alarm response is triggered, a current is applied to the kanthal wires situated within the holes (3) in the PCB (9) from the battery (5). This power supply is used to ignite the explosive material located within the holes (3) within the PCB (9).
The logic controller (7) constantly monitors for the presence of a connector (1) connected to the data interface (6). When the connector (1) that connects the apparatus to a computing device via the data interface (6) is removed or sufficiently disturbed the logic controller (7) interprets this as an illegitimate attempt to access the data stored on the SSD IC chips (2) and will initiate the destruction process commanding a supply of power to the kanthal wires situated within the hDles (3) in the PCB (9).
Figure 2 is a block diagram of a second data storage apparatus (20) according to the invention. The second data storage apparatus (20) is designed to function as an external hard drive, being transported between different computers. The second data storage apparatus (20) comprises an SSD set of storage IC chips (2), holes (3) within the PCB (9) under the SSD IC chips (2). It comprises an SSD controller (4) and an additional logic controller (7).
This embodiment can come with an optional GSM module (8) which provides external communications to the device and is controlled by the second logic controller (7). The apparatus has an external eSATA interface (6) and an external USB interface (11). The apparatus has an auxiliary external power supply (12). Within the case (14) is a touch screen (13) which provides the signal to the apparatus to allow different functions to take place. One such function is the charging of the internal battery (5).
Figure 4 is a block diagram of two external apparatus (30) and (40). Apparatus (30) represents the primary device while apparatus (40) represents the secondary device.
When the primary device is connected via the eSATA interface (6) using an eSATAp cable (15)to the secondary device the usual PIN (Personal ldentlficatbn Number) entry signal is required to be entered on the primary device via the touch screen (13). The secondary device will supply electrical power to the primary device via the eSATAp cable (15). the secondary device has to be connected to an external power supply via its external power socket (12). The primary device will automatically initiate a copy of all files from the primary device to the secondary device without nstruction or intervention from the user.

Claims (7)

  1. Claims 1. An apparatus for storing data, wherein the PCB (Printed Circuit Board) of the SSD (Solid State Drive) data storage device has holes within it positioned under the solid state data storage IC chips.
  2. 2. An apparatus as claimed in claim 1, wherein the holes within the PCB (Printed Circuit Board) are filled with an explosive material in which are embedded kanthal wires which are used to ignite the explosive material via an internal power supply either a battery or other independent power source or via an external power supply taken from the devices data interface connector.
  3. 3. An apparatus as claimed in claim 1, wherein the device must be provided with an authentication signal before the internal battery I batteries can accept an electrical charge used to recharge the battery / batteries.
  4. 4. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when the device is starved of a GSM (Global System for Mobile communication) signal and or service for a predefined variable period of time.
  5. 5. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when the data interface connector is removed or disturbed sufficiently from the apparatus's data connection interface.
  6. 6. An apparatus as claimed in claim 1, which when connected to another secondary apparatus of the same type will automatically initiate the unattended copy of all data from the device to the secondary connected device.
  7. 7. An apparatus as claimed n cam 1, which s configured to destroy the data storage device when an externa' facing button either integral to the device or remotely attached to the device is depressed allowing an electrical current from the devices' internal battery or where there is no battery from the devices' data interface connector to ignite the explosive material.Amendments have been made the to claims as follows Claims 1. An apparatus for stonng data, that is portable and either internal or external to a computing device or network attached, the apparatus comprising, an electronic data storage device using solid state technology; and a battery, wherein the apparatus is configured to provide current from the battery to destroy the data storage apparatus in the event that predetermined conditions are met, the said destruction is provided via explosive material located in holes through the PCB (Printed Circuit Board) positioned under the chip components of said apparatus.2. An apparatus as claimed in claim 1, wherein the holes within the PCB (Printed Circuit Board) are filled with an explosive material independent of any 0 housing or casing in which are embedded two wires which are used to ignite the explosive material via an internal power supply either a battery or other independent power source or via an external power supply taken from the devices data interface connector.3. An apparatus as claimed in claim 1, wherein the device must be provided with an authentication signal before the internal battery / batteries can accept an electrical charge used to recharge the battery I batteries.4. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when the device is starved of a GSM (Global System for Mobile communication) signal and or service for a predefined period of time.5. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when the data interface connector of said device is removed or disturbed sufficiently from the apparatus's data interface.6. An apparatus as claimed in claim 1, which when connected to another secondary apparatus and the correct authentication signal is provided to the primary device or the configured PIN (Personal Identification Number) numbers of the two devices match an unattended copy of all data from the apparatus to the secondary connected apparatus wi take place.7. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when an external facing button either integral to the device or remotely attached to the device is depressed allowing an electrical current from the devices' internal battery or where there is no battery from the devices' data interface connector to ignite the explosive material.
GB1009665.9A 2010-06-09 2010-06-09 Storage device adapted to physically destroy itself in response to an unauthorised access attempt Withdrawn GB2481043A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1009665.9A GB2481043A (en) 2010-06-09 2010-06-09 Storage device adapted to physically destroy itself in response to an unauthorised access attempt

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1009665.9A GB2481043A (en) 2010-06-09 2010-06-09 Storage device adapted to physically destroy itself in response to an unauthorised access attempt

Publications (2)

Publication Number Publication Date
GB201009665D0 GB201009665D0 (en) 2010-07-21
GB2481043A true GB2481043A (en) 2011-12-14

Family

ID=42471398

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1009665.9A Withdrawn GB2481043A (en) 2010-06-09 2010-06-09 Storage device adapted to physically destroy itself in response to an unauthorised access attempt

Country Status (1)

Country Link
GB (1) GB2481043A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013083941A1 (en) * 2011-12-08 2013-06-13 Pangaea Media Ltd Data security device
GB2497919A (en) * 2011-12-08 2013-07-03 Pangaea Media Ltd Electronic circuit apparatus performing a function in response to a trigger signal
EP2690577A1 (en) * 2012-07-23 2014-01-29 Getac Technology Corporation Electronic storage device and data protection method thereof

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391776B (en) * 2017-09-19 2023-04-18 北京航星中云科技有限公司 Data destruction device and method and blade server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030192997A1 (en) * 2002-04-11 2003-10-16 Amish Desai Versatile cavity actuator and systems incorporating same
US20080091605A1 (en) * 2006-09-29 2008-04-17 Sun Microsystems, Inc. Method and apparatus for secure information distribution
US20080276819A1 (en) * 2007-05-09 2008-11-13 Amish Desai Multilayered microcavities and actuators incorporating same
US20100132047A1 (en) * 2008-11-24 2010-05-27 Honeywell International Inc. Systems and methods for tamper resistant memory devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030192997A1 (en) * 2002-04-11 2003-10-16 Amish Desai Versatile cavity actuator and systems incorporating same
US20080091605A1 (en) * 2006-09-29 2008-04-17 Sun Microsystems, Inc. Method and apparatus for secure information distribution
US20080276819A1 (en) * 2007-05-09 2008-11-13 Amish Desai Multilayered microcavities and actuators incorporating same
US20100132047A1 (en) * 2008-11-24 2010-05-27 Honeywell International Inc. Systems and methods for tamper resistant memory devices

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013083941A1 (en) * 2011-12-08 2013-06-13 Pangaea Media Ltd Data security device
GB2497919A (en) * 2011-12-08 2013-07-03 Pangaea Media Ltd Electronic circuit apparatus performing a function in response to a trigger signal
GB2497920A (en) * 2011-12-08 2013-07-03 Pangaea Media Ltd Apparatus for storing data includes an SSD and means for causing physical damage to the SSD
US9081970B2 (en) 2011-12-08 2015-07-14 Pangaea Media Ltd. Data security device
EP2690577A1 (en) * 2012-07-23 2014-01-29 Getac Technology Corporation Electronic storage device and data protection method thereof

Also Published As

Publication number Publication date
GB201009665D0 (en) 2010-07-21

Similar Documents

Publication Publication Date Title
CA2893030C (en) Data security device
EP3798875B1 (en) Portable storage device with internal secure controller that performs self-verification and self-generates encryption key(s) without using host or memory controller and that securely sends encryption key(s) via side channel
CA2799932C (en) Computer motherboard having peripheral security functions
EP2367135B1 (en) Adapter for portable storage medium and method of disabling data access
US20120151121A1 (en) Solid State Non-Volatile Storage Drives Having Self-Erase and Self-Destruct Functionality and Related Methods
CN102855451A (en) Portable computer terminal with safe anti-secret-disclosing function
CN101714123B (en) Document mobile memory device capable of ensuring information security and implementing method thereof
US20110246790A1 (en) Secured removable storage device
EP2695069B1 (en) Method and system for usb with an integrated crypto ignition key
WO2009136161A1 (en) Data encryption device
TWI708257B (en) Data storage device having self-destruction function
US11113429B2 (en) Solid state storage data destruction
CN201397508Y (en) Stand-alone terminal secure login and monitoring device
CN202815852U (en) Portable computer terminal with safety and secrecy
GB2481043A (en) Storage device adapted to physically destroy itself in response to an unauthorised access attempt
US11947466B2 (en) Storage device, nonvolatile memory system including memory controller, and operating method of the storage device
WO2013083940A1 (en) Trigger device
CN215576603U (en) Hard disk medium encryption device
CN111736770A (en) Embedded Secure Memory
US10380385B1 (en) Visual security device
JP2014146256A (en) Method for protecting data stored in nonvolatile memory and computer
CN110874495A (en) Solid state disk based on automatic locking write protection function and tamper-proof method
UA141585U (en) PORTABLE COMPUTER

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)