GB2481043A - Storage device adapted to physically destroy itself in response to an unauthorised access attempt - Google Patents
Storage device adapted to physically destroy itself in response to an unauthorised access attempt Download PDFInfo
- Publication number
- GB2481043A GB2481043A GB1009665.9A GB201009665A GB2481043A GB 2481043 A GB2481043 A GB 2481043A GB 201009665 A GB201009665 A GB 201009665A GB 2481043 A GB2481043 A GB 2481043A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data
- battery
- data storage
- storage device
- destroy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A portable apparatus 10 for storing data using solid state technology comprising electronic data storage device(s) 2 and a battery 5. The apparatus is configured to provide current from the battery to support the physical destruction mechanism that destroys the data storage device in the event that predetermined conditions are met. The destruction mechanism is an explosive material located in holes 3 through the printed circuit board 9 (PCB) positioned under the chip components of the apparatus. The explosive material may be ignited by wires embedded in it. There are various trigger mechanisms, including a GSM module 8, that initiate the destruction process providing security for stored data from unauthorised access.
Description
Data Security Device
Field of the Invention
This nvention relates to an apparatus for storing data
Background to the Invention
As the storage and transmission of large quantities of data has become easier, data security has become more of a concern for everyone dealing with confidential information. When a single hard drive can hold terabytes of confidential, personal or commercially sensitive information, the loss of that hard drive is a serious concern. With the increasing use of portable computing components such as laptops and external hard drives, it is no longer necessary for these items to be stolen for them tD come to harm.
They may fall into the wrong hands simply through loss and human error.
Passwords and other identification systems such as biometric devices can help to protect data, but they are ultimately vulnerable to attack if a criminal has long enough. If necessary, passwords can be guessed by simply entering words until the correct one is found.
In light of this a device which can protect the integrity of information stored on it, by making it more difficult to access the data without proper identification and destroying the data in the event of loss, theft or unauthorised access, would be advantageous.
International Patent Number WO 02/095550 to Gray relates to a security device adapted to be connected to a digital data storage device and to physically destroy said data in case of unauthorised using of the same is disclosed. The patent WO 02/095550 in one embodiment describes the use of an explosive ring situated on top of a hard disk drive platter which would destroy the data if ignited. The invention disclosed in this patent fails to define in particular the detonation method and contact method the device has to the explosive ring from the battery. Given this ring is spinning with the disk platter at 5,200 revolutions per minute the invention mentions nothing about sustaining a connection to the explosive ring while it spins which would be necessary to initiate the explosive. Given this design, the production of said device would be impractical from the perspective of applying an explosive ring that would not upset the geometry and very tight tolerances of the spinning disk with spin speeds of 5,200 and higher with a maximum spin speed of an HDD drive being 15,000 rpm. Any loss of geometry would cause read I write problems for the hard drive. These constraints make the claim unpractical as a working solution.
The invention described within this filing uses an explosive material which has direct contact with the solid state storage integrated circuits (SSD) which make up the data storage device and not traditional hard disk drives and their spinning platters. This claim also clearly states the method if ignition of the explosive and its contact with the printed circuit board and subsequently the battery.
Physical destruction of magnetic data is the only 100% sure way of safe guarding against unauthorised access to data.
Summary of lnventon
Accordingly this invention provides an apparatus for storing electronic data. The apparatus comprises an electronic data storage device and a battery. The apparatus is configured to provide current from the battery to physically destroy the data storage device in the event that predetermined conditions are met.
In this way, the invention provides a device that can be used to store data securely. In the event that the stored data is compromised the apparatus will physically destroy the data storage device such that the information stored there cannot be retrieved. Merely deleting the information on a drive such as an SSD (Solid State Drive) or a conventional magnetic disc hard drive does not guarantee that the information cannot be retrieved. By taking advantage of traces left in the recording medium, for example due to the hysteresis effect in the case of magnetic mediums, the information can be recovered. Destroying the device will prevent this.
Typically, the electronic data storage device will comprise an SSD (Solid State Drive), such as a flash memory NAND based drive.
In the currently preferred embodiment, the data storage device is destroyed by very small amounts of explosive material housed specifically within a hole in the PCB (Printed Circuit Board) underneath the solid state NAND data storage IC chips. The ignition of the explosive material is provided via one of the two onboard batteries passing a current through kanthal wires which are embedded within the explosive material. The use of holes in the PCB positioned under the solid state IC chips that make up the data storage device enable a directional force from the explosive material to pass up through the memory chips causing them to fracture. All internal PCB tracks that make up the electrical device would pass around the perimeter of the holes. This is a practical use of the explosive which does not present complications within production and allows the addition of the explosive after the data storage IC chips have been placed on the PCB.
In a preferred embodiment, the apparatus must be provided with an activation signal before the battery/ batteries can be charged. This prevents an illegitimate user from keeping the battery charged and hence keeping the stored data intact while they attempt to circumvent any anti-tamper mechanisms. The signal will typically comprise of a code entered via a touch pad incorporated in the device. Where this is the case, the apparatus may be configured to destroy the electronic data storage device if an incorrect code is entered a predetermined number of times.
In a preferred embodiment, the apparatus is configured to destroy the data storage device on the press of an integral button or remote button connected to the device. This manual intervention by pressing of the button allows the electrical supply from the devices interface connector to be used to ignite the explosive material to destroy the data storage device.
In a preferred embodiment, the apparatus is configured to destroy the data storage device on the starvation of a GSM (Global System for Mobile communication) signal or service for a predefined period of time. The apparatus will interpret this signal or service starvation as an illegitimate attempt to gain access to the data stored on the device and to safe guard the data initiate the destruction process.
In a preferred embodiment, the apparatus is configured to destroy the data storage device on the removal or disruption to the devices external interface connector to the computer either via a cable or PCB connector type for example but not limited to a Peripheral Component Interconnect (PCI) bus interface. The device may comprise of a SATA (Serial Advanced Technology Attachment) connector, a USB (Universal Serial Bus) connector or any other data transfer interface. In the event the connector is removed or disturbed sufficiently the apparatus could interpret this as an illegitimate attempt to gain access to the data stored on the device and to safe guard the data initiate the destruction process.
In a preferred embodiment, the apparatus can automaticay copy data stored within the device to a secondary device of the same design without being given a user instruction to do so. If a secondary device is connected to the primary device and the correct authentication signal is provided to the primary device, the primary device will automatically allow for the copy all data stored on it to be made to the secondary device.
This data transfer process requires no intervention by the user of the device and provides an unattended backup of secure data from one secure device to another.
Brief Description of Drawings
An embodiment of the invention will now be described, by way of example only, and with reference to the accompanying drawings in which: Figures 1, 2 and 3 are block diagrams showing plan views a first and second embodiment of the invention respectively.
Detailed Description of Exemplary Embodiments
Figure 1 is a block diagram showing a first data storage apparatus (10) designed for use inside a laptop computer or other computing device according to a first embodiment of the invention. The first data storage apparatus (10) comprises of an SSD (Solid State Drive) controller (4), a battery (5), and a series of SSD (Solid State Drive) IC (Integrated Circuit) chips (2) for storing data. Holes (3) are positioned through the PCB (Printed Circuit Board) (9) under the SSD (2) IC (Integrated Circuit) chips to allow for a directional force to push up from under the SSD (2) IC chips resulting in the SSD (2) IC chips fracturing. The SSD IC chips (2) is provided with a SATA (Serial Advanced Technology Attachment) connector (6) for transmitting and receiving data when in use, as well as supplying power to the SSD IC chips (2) where necessary. A second logic controller (7) manages the environmental and physical security triggers. A GSM (Global System for Mobile communication) module (8) provides external communications to the device and is controlled by the second logic controller (7).
The data storage apparatus (10) is designed to destroy the SSD IC chips (2) in the event that an alarm response is triggered in the logic controller (7). When the alarm response is triggered, a current is applied to the kanthal wires situated within the holes (3) in the PCB (9) from the battery (5). This power supply is used to ignite the explosive material located within the holes (3) within the PCB (9).
The logic controller (7) constantly monitors for the presence of a connector (1) connected to the data interface (6). When the connector (1) that connects the apparatus to a computing device via the data interface (6) is removed or sufficiently disturbed the logic controller (7) interprets this as an illegitimate attempt to access the data stored on the SSD IC chips (2) and will initiate the destruction process commanding a supply of power to the kanthal wires situated within the hDles (3) in the PCB (9).
Figure 2 is a block diagram of a second data storage apparatus (20) according to the invention. The second data storage apparatus (20) is designed to function as an external hard drive, being transported between different computers. The second data storage apparatus (20) comprises an SSD set of storage IC chips (2), holes (3) within the PCB (9) under the SSD IC chips (2). It comprises an SSD controller (4) and an additional logic controller (7).
This embodiment can come with an optional GSM module (8) which provides external communications to the device and is controlled by the second logic controller (7). The apparatus has an external eSATA interface (6) and an external USB interface (11). The apparatus has an auxiliary external power supply (12). Within the case (14) is a touch screen (13) which provides the signal to the apparatus to allow different functions to take place. One such function is the charging of the internal battery (5).
Figure 4 is a block diagram of two external apparatus (30) and (40). Apparatus (30) represents the primary device while apparatus (40) represents the secondary device.
When the primary device is connected via the eSATA interface (6) using an eSATAp cable (15)to the secondary device the usual PIN (Personal ldentlficatbn Number) entry signal is required to be entered on the primary device via the touch screen (13). The secondary device will supply electrical power to the primary device via the eSATAp cable (15). the secondary device has to be connected to an external power supply via its external power socket (12). The primary device will automatically initiate a copy of all files from the primary device to the secondary device without nstruction or intervention from the user.
Claims (7)
- Claims 1. An apparatus for storing data, wherein the PCB (Printed Circuit Board) of the SSD (Solid State Drive) data storage device has holes within it positioned under the solid state data storage IC chips.
- 2. An apparatus as claimed in claim 1, wherein the holes within the PCB (Printed Circuit Board) are filled with an explosive material in which are embedded kanthal wires which are used to ignite the explosive material via an internal power supply either a battery or other independent power source or via an external power supply taken from the devices data interface connector.
- 3. An apparatus as claimed in claim 1, wherein the device must be provided with an authentication signal before the internal battery I batteries can accept an electrical charge used to recharge the battery / batteries.
- 4. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when the device is starved of a GSM (Global System for Mobile communication) signal and or service for a predefined variable period of time.
- 5. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when the data interface connector is removed or disturbed sufficiently from the apparatus's data connection interface.
- 6. An apparatus as claimed in claim 1, which when connected to another secondary apparatus of the same type will automatically initiate the unattended copy of all data from the device to the secondary connected device.
- 7. An apparatus as claimed n cam 1, which s configured to destroy the data storage device when an externa' facing button either integral to the device or remotely attached to the device is depressed allowing an electrical current from the devices' internal battery or where there is no battery from the devices' data interface connector to ignite the explosive material.Amendments have been made the to claims as follows Claims 1. An apparatus for stonng data, that is portable and either internal or external to a computing device or network attached, the apparatus comprising, an electronic data storage device using solid state technology; and a battery, wherein the apparatus is configured to provide current from the battery to destroy the data storage apparatus in the event that predetermined conditions are met, the said destruction is provided via explosive material located in holes through the PCB (Printed Circuit Board) positioned under the chip components of said apparatus.2. An apparatus as claimed in claim 1, wherein the holes within the PCB (Printed Circuit Board) are filled with an explosive material independent of any 0 housing or casing in which are embedded two wires which are used to ignite the explosive material via an internal power supply either a battery or other independent power source or via an external power supply taken from the devices data interface connector.3. An apparatus as claimed in claim 1, wherein the device must be provided with an authentication signal before the internal battery / batteries can accept an electrical charge used to recharge the battery I batteries.4. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when the device is starved of a GSM (Global System for Mobile communication) signal and or service for a predefined period of time.5. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when the data interface connector of said device is removed or disturbed sufficiently from the apparatus's data interface.6. An apparatus as claimed in claim 1, which when connected to another secondary apparatus and the correct authentication signal is provided to the primary device or the configured PIN (Personal Identification Number) numbers of the two devices match an unattended copy of all data from the apparatus to the secondary connected apparatus wi take place.7. An apparatus as claimed in claim 1, which is configured to destroy the data storage device when an external facing button either integral to the device or remotely attached to the device is depressed allowing an electrical current from the devices' internal battery or where there is no battery from the devices' data interface connector to ignite the explosive material.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1009665.9A GB2481043A (en) | 2010-06-09 | 2010-06-09 | Storage device adapted to physically destroy itself in response to an unauthorised access attempt |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1009665.9A GB2481043A (en) | 2010-06-09 | 2010-06-09 | Storage device adapted to physically destroy itself in response to an unauthorised access attempt |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB201009665D0 GB201009665D0 (en) | 2010-07-21 |
| GB2481043A true GB2481043A (en) | 2011-12-14 |
Family
ID=42471398
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB1009665.9A Withdrawn GB2481043A (en) | 2010-06-09 | 2010-06-09 | Storage device adapted to physically destroy itself in response to an unauthorised access attempt |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2481043A (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013083941A1 (en) * | 2011-12-08 | 2013-06-13 | Pangaea Media Ltd | Data security device |
| GB2497919A (en) * | 2011-12-08 | 2013-07-03 | Pangaea Media Ltd | Electronic circuit apparatus performing a function in response to a trigger signal |
| EP2690577A1 (en) * | 2012-07-23 | 2014-01-29 | Getac Technology Corporation | Electronic storage device and data protection method thereof |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107391776B (en) * | 2017-09-19 | 2023-04-18 | 北京航星中云科技有限公司 | Data destruction device and method and blade server |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030192997A1 (en) * | 2002-04-11 | 2003-10-16 | Amish Desai | Versatile cavity actuator and systems incorporating same |
| US20080091605A1 (en) * | 2006-09-29 | 2008-04-17 | Sun Microsystems, Inc. | Method and apparatus for secure information distribution |
| US20080276819A1 (en) * | 2007-05-09 | 2008-11-13 | Amish Desai | Multilayered microcavities and actuators incorporating same |
| US20100132047A1 (en) * | 2008-11-24 | 2010-05-27 | Honeywell International Inc. | Systems and methods for tamper resistant memory devices |
-
2010
- 2010-06-09 GB GB1009665.9A patent/GB2481043A/en not_active Withdrawn
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030192997A1 (en) * | 2002-04-11 | 2003-10-16 | Amish Desai | Versatile cavity actuator and systems incorporating same |
| US20080091605A1 (en) * | 2006-09-29 | 2008-04-17 | Sun Microsystems, Inc. | Method and apparatus for secure information distribution |
| US20080276819A1 (en) * | 2007-05-09 | 2008-11-13 | Amish Desai | Multilayered microcavities and actuators incorporating same |
| US20100132047A1 (en) * | 2008-11-24 | 2010-05-27 | Honeywell International Inc. | Systems and methods for tamper resistant memory devices |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2013083941A1 (en) * | 2011-12-08 | 2013-06-13 | Pangaea Media Ltd | Data security device |
| GB2497919A (en) * | 2011-12-08 | 2013-07-03 | Pangaea Media Ltd | Electronic circuit apparatus performing a function in response to a trigger signal |
| GB2497920A (en) * | 2011-12-08 | 2013-07-03 | Pangaea Media Ltd | Apparatus for storing data includes an SSD and means for causing physical damage to the SSD |
| US9081970B2 (en) | 2011-12-08 | 2015-07-14 | Pangaea Media Ltd. | Data security device |
| EP2690577A1 (en) * | 2012-07-23 | 2014-01-29 | Getac Technology Corporation | Electronic storage device and data protection method thereof |
Also Published As
| Publication number | Publication date |
|---|---|
| GB201009665D0 (en) | 2010-07-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CA2893030C (en) | Data security device | |
| EP3798875B1 (en) | Portable storage device with internal secure controller that performs self-verification and self-generates encryption key(s) without using host or memory controller and that securely sends encryption key(s) via side channel | |
| CA2799932C (en) | Computer motherboard having peripheral security functions | |
| EP2367135B1 (en) | Adapter for portable storage medium and method of disabling data access | |
| US20120151121A1 (en) | Solid State Non-Volatile Storage Drives Having Self-Erase and Self-Destruct Functionality and Related Methods | |
| CN102855451A (en) | Portable computer terminal with safe anti-secret-disclosing function | |
| CN101714123B (en) | Document mobile memory device capable of ensuring information security and implementing method thereof | |
| US20110246790A1 (en) | Secured removable storage device | |
| EP2695069B1 (en) | Method and system for usb with an integrated crypto ignition key | |
| WO2009136161A1 (en) | Data encryption device | |
| TWI708257B (en) | Data storage device having self-destruction function | |
| US11113429B2 (en) | Solid state storage data destruction | |
| CN201397508Y (en) | Stand-alone terminal secure login and monitoring device | |
| CN202815852U (en) | Portable computer terminal with safety and secrecy | |
| GB2481043A (en) | Storage device adapted to physically destroy itself in response to an unauthorised access attempt | |
| US11947466B2 (en) | Storage device, nonvolatile memory system including memory controller, and operating method of the storage device | |
| WO2013083940A1 (en) | Trigger device | |
| CN215576603U (en) | Hard disk medium encryption device | |
| CN111736770A (en) | Embedded Secure Memory | |
| US10380385B1 (en) | Visual security device | |
| JP2014146256A (en) | Method for protecting data stored in nonvolatile memory and computer | |
| CN110874495A (en) | Solid state disk based on automatic locking write protection function and tamper-proof method | |
| UA141585U (en) | PORTABLE COMPUTER |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |