[go: up one dir, main page]

WO2003012606A2 - Security apparatus - Google Patents

Security apparatus Download PDF

Info

Publication number
WO2003012606A2
WO2003012606A2 PCT/GB2002/003520 GB0203520W WO03012606A2 WO 2003012606 A2 WO2003012606 A2 WO 2003012606A2 GB 0203520 W GB0203520 W GB 0203520W WO 03012606 A2 WO03012606 A2 WO 03012606A2
Authority
WO
WIPO (PCT)
Prior art keywords
security apparatus
casing
encryption device
hdd
storage medium
Prior art date
Application number
PCT/GB2002/003520
Other languages
French (fr)
Other versions
WO2003012606A3 (en
Inventor
Peter Ferguson Western
Timothy David Stone
Original Assignee
Stonewood Electronics Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Stonewood Electronics Ltd filed Critical Stonewood Electronics Ltd
Publication of WO2003012606A2 publication Critical patent/WO2003012606A2/en
Publication of WO2003012606A3 publication Critical patent/WO2003012606A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors

Definitions

  • This invention relates to security apparatus, and in particular, but not exclusively, to apparatus for protecting computer data and other digital data against unauthorised access.
  • Cryptographic methods utilise software encryption solutions to prevent unauthorised access to data, however such methods are not infallible as keys (passwords) can often be deciphered by unauthorised users.
  • Ventilation openings must therefore be provided in the casing to enable heated air to escape by convection to the ambient air.
  • the necessity for ventilation openings is therefore a flaw in the design of such devices from a tamperproofing perspective.
  • a particular disadvantage of previously proposed devices is the increased space requirements of the additional hardware required to enable data encryption.
  • space within a PC is at a premium.
  • installation costs will rise accordingly.
  • security apparatus for protecting data held on storage media against unauthorised access, said apparatus comprising a storage medium and an encryption device located within a single casing.
  • the encryption device is encapsulated in resin.
  • the storage medium is a hard disk drive (HDD) .
  • HDD hard disk drive
  • the form factor of the casing is chosen so that it accommodates both the hard disk drive (HDD) and the encryption device.
  • the encryption device is mounted on a printed circuit board (PCB) .
  • PCB printed circuit board
  • the encryption device contains a VLSI device .
  • the VLSI device provides a program to a host to facilitate a keying process thereby allowing access to the storage medium.
  • the casing has one or more internally mounted heat conducting surfaces arranged to be in physical contact with heat producing components of the apparatus, thereby defining a heat path to the exterior surface of the casing.
  • the internally mounted heat conducting surfaces are made of a resilient and/or flexible material .
  • the casing is tamper evident to provide evidence of tampering.
  • the keying process is irrevocably disabled, thereby denying access to the storage medium.
  • the hard disk drive (HDD) is open to the ambient air.
  • the resin is made of a thermally conductive material which acts as an internally mounted heat conducting surface.
  • Fig. 1 shows a cross-sectional view of security apparatus made in accordance with a first embodiment of the present invention
  • Fig. 2 is an exploded perspective view of the security apparatus shown in Fig. 1;
  • Fig. 3 is an exploded perspective of security apparatus made in accordance with a second embodiment of the present invention.
  • security apparatus comprising a hard disk drive (HDD) 10 and a printed circuit board (PCB) 12 located within a casing 14 defined by an upper enclosure 16 located above the PCB 12 and a lower enclosure 18 located below the PCB 12.
  • HDD hard disk drive
  • PCB printed circuit board
  • a VLSI (Very Large Scale Integration) device 22 is mounted on the underside of PCB 12 and projects into the lower enclosure 18.
  • the lower enclosure 18 is filled with resin 24 thereby encapsulating the VLSI 22 and contacting the underside of the PCB 12.
  • the length, width and height of the upper and lower enclosures 16, 18 determine the overall dimensions of the assembled casing 14.
  • the dimensions of the casing 14 define its "form factor" .
  • the form factor of the casing 14 is chosen so that it accommodates both the HDD 10 and the VLSI 22.
  • a heat transfer pad 20 is in physical contact with both the HDD 10 and the inner surface of the upper enclosure 16 of the casing 14.
  • a channel 26 within the upper enclosure 16 is open to ambient air pressure.
  • the security apparatus In use, the security apparatus represents a straightforward replacement for existing HDD casings since it conforms to standard form factors already used in PCs .
  • the security apparatus facilitates a technique for BIOS cascading whereby several such security devices are placed in a single computer and the BIOS is configured to boot each security device in turn. Only the last security device is bootable, thus when the user powers up the system, each security device can be keyed in turn and once the last security device has been keyed the system will boot.
  • the security apparatus provides high level encryption using the widely recognised AES algorithm or other algorithm and is both tamper resistant and tamper evident .
  • the tamper respondent sensor when activated, can function to disable the keying process, thereby denying access to the storage medium.
  • the HDD 10 and VLSI 22 become heated in use. Normally, in the absence of conventional ventilation openings to aid heat dissipation, the temperature within the casing 14 would rise and ultimately result in premature failure of the security apparatus.
  • the present security apparatus obviates the need for ventilation openings by providing a heat conducting path from both the hard disk drive 10 and the VLSI 22 to the exterior surface of the casing 14.
  • a first heat path is provided by a heat transfer pad 20 which contacts the HDD 10 and the inner surface of the upper enclosure 16 of the casing 14.
  • a second heat path is provided between the VLSI 22 and the inner surface of the lower enclosure 18 of the casing 14.
  • the resin 24 is made of heat conducting material and acts in a similar fashion to the heat transfer pad 20.
  • the channel 26 in the casing is open to the ambient air in order that the HDD can compensate for pressure changes.
  • the casing may be hermetically sealed when the data storage media device, such as a HDD, is not affected by pressure changes .
  • Fig. 2 shows an exploded perspective view of the security apparatus of Fig. 1 and indicates how the casing is defined by the upper and lower enclosures 16 and 18 respectively. It further shows how the HDD 10 is of a smaller form factor than its casing in order that the additional VLSI 22 and other optional hardware extensions can be co-located therewith.
  • Fig. 3 shows a second embodiment of the present invention.
  • the arrangement is similar to that of Fig. 2, however, a ribbon cable is provided on the PCB 12 to ease assembly of the security apparatus by eliminating problems arising due to manufacturing tolerances.
  • the security apparatus is both tamper resistant and, by its very nature, tamper-evident. Additionally, the security apparatus may be arranged to be tamper respondent .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

There is described a security apparatus for protecting data held on storage media against unauthorised access. The apparatus is in the form of a storage medium, for example a hard disc drive which is located in a single casing together with a data encryption device. The data encryption device is encapsulated in resin within the casing.

Description

SECURITY APPARATUS
This invention relates to security apparatus, and in particular, but not exclusively, to apparatus for protecting computer data and other digital data against unauthorised access.
Known methods for protecting the confidentiality of data stored on desktop and laptop PCs employ cryptographic methods. Cryptographic methods utilise software encryption solutions to prevent unauthorised access to data, however such methods are not infallible as keys (passwords) can often be deciphered by unauthorised users.
More robust methods are available which allow non- recoverable emergency destruction of data held on storage media in the event that unauthorised access is attempted. Alternatively, the use of an inline hardware encryption device can render the data useless by the use of full disk encryption.
However, previously proposed devices remain vulnerable since the encryption hardware can nevertheless be physically accessed by an unauthorised user. Accordingly, a determined intruder may force access to the device and physically disable its data protection capabilities. Once physically disabled, conventional methods could be employed to obtain the keys and illicitly retrieve the confidential data from the storage medium.
Another disadvantage of previously proposed devices is that they rely on conventional techniques to dissipate heat generated by their electrical components. Ventilation openings must therefore be provided in the casing to enable heated air to escape by convection to the ambient air. The necessity for ventilation openings is therefore a flaw in the design of such devices from a tamperproofing perspective.
A particular disadvantage of previously proposed devices is the increased space requirements of the additional hardware required to enable data encryption. As the trend is for PCs to become smaller, space within a PC is at a premium. Moreover, it is inevitable that installation costs will rise accordingly. According to the present invention there is provided security apparatus for protecting data held on storage media against unauthorised access, said apparatus comprising a storage medium and an encryption device located within a single casing.
Preferably, the encryption device is encapsulated in resin.
Preferably, the storage medium is a hard disk drive (HDD) .
Preferably, the form factor of the casing is chosen so that it accommodates both the hard disk drive (HDD) and the encryption device.
Preferably, the encryption device is mounted on a printed circuit board (PCB) .
Preferably, the encryption device contains a VLSI device .
Preferably, the VLSI device provides a program to a host to facilitate a keying process thereby allowing access to the storage medium.
Preferably, the casing has one or more internally mounted heat conducting surfaces arranged to be in physical contact with heat producing components of the apparatus, thereby defining a heat path to the exterior surface of the casing. Preferably, the internally mounted heat conducting surfaces are made of a resilient and/or flexible material .
Preferably, the casing is tamper evident to provide evidence of tampering.
Also, in the event of the tampering the keying process is irrevocably disabled, thereby denying access to the storage medium.
Preferably, the hard disk drive (HDD) is open to the ambient air.
Preferably, the resin is made of a thermally conductive material which acts as an internally mounted heat conducting surface.
Embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which: -
Fig. 1 shows a cross-sectional view of security apparatus made in accordance with a first embodiment of the present invention;
Fig. 2 is an exploded perspective view of the security apparatus shown in Fig. 1; and
Fig. 3 is an exploded perspective of security apparatus made in accordance with a second embodiment of the present invention. As shown in Fig. 1, there is provided security apparatus comprising a hard disk drive (HDD) 10 and a printed circuit board (PCB) 12 located within a casing 14 defined by an upper enclosure 16 located above the PCB 12 and a lower enclosure 18 located below the PCB 12.
A VLSI (Very Large Scale Integration) device 22 is mounted on the underside of PCB 12 and projects into the lower enclosure 18. The lower enclosure 18 is filled with resin 24 thereby encapsulating the VLSI 22 and contacting the underside of the PCB 12.
The length, width and height of the upper and lower enclosures 16, 18 determine the overall dimensions of the assembled casing 14. In the art, the dimensions of the casing 14 define its "form factor" .
The form factor of the casing 14 is chosen so that it accommodates both the HDD 10 and the VLSI 22.
A heat transfer pad 20 is in physical contact with both the HDD 10 and the inner surface of the upper enclosure 16 of the casing 14.
A channel 26 within the upper enclosure 16 is open to ambient air pressure.
In use, the security apparatus represents a straightforward replacement for existing HDD casings since it conforms to standard form factors already used in PCs .
When booting the PC, all data read from the security apparatus prior to keying is supplied from the VLSI 22. When the host requests the Master Boot Record, the security apparatus supplies its own program from the VLSI 22. Once executed on the host, this facilitates the keying process.
Prior to keying, all data is read only from the VLSI 22 and any writes are ignored. The HDD 10 and the data it holds are therefore inaccessible before keying .
Following keying, all data is read from and written to the HDD 10. The Master Boot Record within a solid state drive (SSD) of the VLSI 22 is therefore inaccessible after keying.
The security apparatus facilitates a technique for BIOS cascading whereby several such security devices are placed in a single computer and the BIOS is configured to boot each security device in turn. Only the last security device is bootable, thus when the user powers up the system, each security device can be keyed in turn and once the last security device has been keyed the system will boot.
The security apparatus provides high level encryption using the widely recognised AES algorithm or other algorithm and is both tamper resistant and tamper evident . For added protection the tamper respondent sensor, when activated, can function to disable the keying process, thereby denying access to the storage medium.
The HDD 10 and VLSI 22 become heated in use. Normally, in the absence of conventional ventilation openings to aid heat dissipation, the temperature within the casing 14 would rise and ultimately result in premature failure of the security apparatus. The present security apparatus obviates the need for ventilation openings by providing a heat conducting path from both the hard disk drive 10 and the VLSI 22 to the exterior surface of the casing 14.
Referring once more to Fig. 1, a first heat path is provided by a heat transfer pad 20 which contacts the HDD 10 and the inner surface of the upper enclosure 16 of the casing 14.
A second heat path is provided between the VLSI 22 and the inner surface of the lower enclosure 18 of the casing 14. However, in this case, the resin 24 is made of heat conducting material and acts in a similar fashion to the heat transfer pad 20.
The channel 26 in the casing is open to the ambient air in order that the HDD can compensate for pressure changes. However, the casing may be hermetically sealed when the data storage media device, such as a HDD, is not affected by pressure changes .
Fig. 2 shows an exploded perspective view of the security apparatus of Fig. 1 and indicates how the casing is defined by the upper and lower enclosures 16 and 18 respectively. It further shows how the HDD 10 is of a smaller form factor than its casing in order that the additional VLSI 22 and other optional hardware extensions can be co-located therewith.
Fig. 3 shows a second embodiment of the present invention. The arrangement is similar to that of Fig. 2, however, a ribbon cable is provided on the PCB 12 to ease assembly of the security apparatus by eliminating problems arising due to manufacturing tolerances.
It will be appreciated that since the security apparatus fits within a casing of standard form factor means that it can act as a straightforward and cost effective "fit and forget" replacement for conventional HDD form factors.
Moreover, the security apparatus is both tamper resistant and, by its very nature, tamper-evident. Additionally, the security apparatus may be arranged to be tamper respondent .
Further advantages of the security apparatus are as follows. It requires no previous knowledge of encryption on the part of the user, it is platform and operating system independent and users are not required to save data onto designated areas on the PC or concern themselves with key management.
Modifications and improvements may be made to the above without departing from the scope of the present invention.

Claims

1. Security apparatus for protecting data held on storage media against unauthorised access, said apparatus comprising a storage medium and an encryption device located within a single casing.
2. Security apparatus according to claim 1, wherein the encryption device is encapsulated in resin.
3. Security apparatus according to claim 1 or 2 , wherein the storage medium is a hard disk drive
(HDD) .
4. Security apparatus according to claim 3, wherein the dimensions of the casing are chosen so that it accommodates both the hard disk drive (HDD) and the encryption device.
5. Security apparatus according to any of claims 1 to 4, wherein the encryption device is mounted on a printed circuit board (PCB) .
6. Security apparatus according to any of claims 1 to 5, wherein the encryption device contains a VLSI device.
7. Security apparatus according to claim 6, wherein the VLSI device provides a program to a host to facilitate a keying process thereby allowing access to the storage medium.
8. Security apparatus according to any of claims 1 to 7, wherein the casing has one or more internally mounted heat conducting surfaces arranged to be in physical contact with heat producing components of the apparatus, thereby defining a heat path to the exterior surface of the casing.
9. Security apparatus according to claim 8, wherein the internally mounted heat conducting surfaces are made of a resilient and/or flexible material.
10. Security apparatus according to any of claims 1 to 9, wherein the casing is tamper evident to provide evidence of tampering.
11. Security apparatus according to claim 10, wherein in the event of the tampering the keying process is irrevocably disabled, thereby denying access to the storage medium.
12. Security apparatus according to any of claims 3 to 11, wherein the hard disk drive (HDD) is open to the ambient air.
13. Security apparatus according to any of claims 2 to 12, wherein the resin is made of a thermally conductive material which acts as an internally mounted heat conducting surface.
PCT/GB2002/003520 2001-07-31 2002-07-31 Security apparatus WO2003012606A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0118573A GB0118573D0 (en) 2001-07-31 2001-07-31 Flag stone
GB0118573.5 2001-07-31

Publications (2)

Publication Number Publication Date
WO2003012606A2 true WO2003012606A2 (en) 2003-02-13
WO2003012606A3 WO2003012606A3 (en) 2004-02-05

Family

ID=9919478

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2002/003520 WO2003012606A2 (en) 2001-07-31 2002-07-31 Security apparatus

Country Status (2)

Country Link
GB (1) GB0118573D0 (en)
WO (1) WO2003012606A2 (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2866450A1 (en) * 2004-02-17 2005-08-19 Enertec "ANTI-COMPROMISE" TYPE DATA RECORDING CARTRIDGE AND CORRESPONDING ANTI-COMPROMISE METHOD
WO2005088461A1 (en) * 2004-03-17 2005-09-22 Digisafe Pte Ltd Method and device for protecting data stored in a computing device
US7359144B2 (en) * 2005-06-28 2008-04-15 Seagate Technology Llc Overmold component seal in an electronic device housing
EP1790114A4 (en) * 2004-04-29 2009-12-23 Walker Digital Llc Method and apparatus for outputting a result of a game via a container
JP2016522471A (en) * 2013-03-28 2016-07-28 ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Shield for electronic devices
US9661747B1 (en) 2015-12-18 2017-05-23 International Business Machines Corporation Tamper-respondent assemblies with enclosure-to-board protection
US9717154B2 (en) 2015-09-25 2017-07-25 International Business Machines Corporation Enclosure with inner tamper-respondent sensor(s)
US9858776B1 (en) 2016-06-28 2018-01-02 International Business Machines Corporation Tamper-respondent assembly with nonlinearity monitoring
US9881880B2 (en) 2016-05-13 2018-01-30 International Business Machines Corporation Tamper-proof electronic packages with stressed glass component substrate(s)
US9894749B2 (en) 2015-09-25 2018-02-13 International Business Machines Corporation Tamper-respondent assemblies with bond protection
US9904811B2 (en) 2016-04-27 2018-02-27 International Business Machines Corporation Tamper-proof electronic packages with two-phase dielectric fluid
US9913416B2 (en) 2015-09-25 2018-03-06 International Business Machines Corporation Enclosure with inner tamper-respondent sensor(s) and physical security element(s)
US9913389B2 (en) 2015-12-01 2018-03-06 International Business Corporation Corporation Tamper-respondent assembly with vent structure
US9911012B2 (en) 2015-09-25 2018-03-06 International Business Machines Corporation Overlapping, discrete tamper-respondent sensors
US9913370B2 (en) 2016-05-13 2018-03-06 International Business Machines Corporation Tamper-proof electronic packages formed with stressed glass
US9916744B2 (en) 2016-02-25 2018-03-13 International Business Machines Corporation Multi-layer stack with embedded tamper-detect protection
US9924591B2 (en) 2015-09-25 2018-03-20 International Business Machines Corporation Tamper-respondent assemblies
US9978231B2 (en) 2015-10-21 2018-05-22 International Business Machines Corporation Tamper-respondent assembly with protective wrap(s) over tamper-respondent sensor(s)
US9999124B2 (en) 2016-11-02 2018-06-12 International Business Machines Corporation Tamper-respondent assemblies with trace regions of increased susceptibility to breaking
WO2018103883A1 (en) * 2016-12-09 2018-06-14 Giesecke+Devrient Mobile Security Gmbh Secure storage device
WO2018154523A1 (en) * 2017-02-24 2018-08-30 Dark Matter L.L.C. Unique hardware fingerprint device and method
US10098235B2 (en) 2015-09-25 2018-10-09 International Business Machines Corporation Tamper-respondent assemblies with region(s) of increased susceptibility to damage
US10136519B2 (en) 2015-10-19 2018-11-20 International Business Machines Corporation Circuit layouts of tamper-respondent sensors
US10172239B2 (en) 2015-09-25 2019-01-01 International Business Machines Corporation Tamper-respondent sensors with formed flexible layer(s)
US10168185B2 (en) 2015-09-25 2019-01-01 International Business Machines Corporation Circuit boards and electronic packages with embedded tamper-respondent sensor
US10237964B2 (en) 2015-03-04 2019-03-19 International Business Machines Corporation Manufacturing electronic package with heat transfer element(s)
US10271424B2 (en) 2016-09-26 2019-04-23 International Business Machines Corporation Tamper-respondent assemblies with in situ vent structure(s)
US10299372B2 (en) 2016-09-26 2019-05-21 International Business Machines Corporation Vented tamper-respondent assemblies
US10321589B2 (en) 2016-09-19 2019-06-11 International Business Machines Corporation Tamper-respondent assembly with sensor connection adapter
US10327329B2 (en) 2017-02-13 2019-06-18 International Business Machines Corporation Tamper-respondent assembly with flexible tamper-detect sensor(s) overlying in-situ-formed tamper-detect sensor
US10327343B2 (en) 2015-12-09 2019-06-18 International Business Machines Corporation Applying pressure to adhesive using CTE mismatch between components
US10426037B2 (en) 2015-07-15 2019-09-24 International Business Machines Corporation Circuitized structure with 3-dimensional configuration
US10531561B2 (en) 2018-02-22 2020-01-07 International Business Machines Corporation Enclosure-to-board interface with tamper-detect circuit(s)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4751594A (en) * 1986-05-22 1988-06-14 Magnetic Peripherals Inc. Low diffusion disk drive breather vent
US4997032A (en) * 1987-09-25 1991-03-05 Minnesota Mining And Manufacturing Company Thermal transfer bag
CA2035697A1 (en) * 1991-02-05 1992-08-06 Brian James Smyth Encryption apparatus for computer device
US5998858A (en) * 1995-07-20 1999-12-07 Dallas Semiconductor Corporation Microcircuit with memory that is protected by both hardware and software
KR100319838B1 (en) * 1995-08-10 2002-04-22 윤종용 Personal computer with security device, security method thereof, and installation and removal method of the security device
GB2330682A (en) * 1997-10-22 1999-04-28 Calluna Tech Ltd Password access to an encrypted drive
US7178031B1 (en) * 1999-11-08 2007-02-13 International Business Machines Corporation Wireless security access management for a portable data storage cartridge

Cited By (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2866450A1 (en) * 2004-02-17 2005-08-19 Enertec "ANTI-COMPROMISE" TYPE DATA RECORDING CARTRIDGE AND CORRESPONDING ANTI-COMPROMISE METHOD
WO2005088461A1 (en) * 2004-03-17 2005-09-22 Digisafe Pte Ltd Method and device for protecting data stored in a computing device
EP1790114A4 (en) * 2004-04-29 2009-12-23 Walker Digital Llc Method and apparatus for outputting a result of a game via a container
US7359144B2 (en) * 2005-06-28 2008-04-15 Seagate Technology Llc Overmold component seal in an electronic device housing
JP2016522471A (en) * 2013-03-28 2016-07-28 ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Shield for electronic devices
US9846459B2 (en) 2013-03-28 2017-12-19 Entit Software Llc Shield for an electronic device
US10237964B2 (en) 2015-03-04 2019-03-19 International Business Machines Corporation Manufacturing electronic package with heat transfer element(s)
US10524362B2 (en) 2015-07-15 2019-12-31 International Business Machines Corporation Circuitized structure with 3-dimensional configuration
US10426037B2 (en) 2015-07-15 2019-09-24 International Business Machines Corporation Circuitized structure with 3-dimensional configuration
US10168185B2 (en) 2015-09-25 2019-01-01 International Business Machines Corporation Circuit boards and electronic packages with embedded tamper-respondent sensor
US10378924B2 (en) 2015-09-25 2019-08-13 International Business Machines Corporation Circuit boards and electronic packages with embedded tamper-respondent sensor
US9894749B2 (en) 2015-09-25 2018-02-13 International Business Machines Corporation Tamper-respondent assemblies with bond protection
US10685146B2 (en) 2015-09-25 2020-06-16 International Business Machines Corporation Overlapping, discrete tamper-respondent sensors
US9913416B2 (en) 2015-09-25 2018-03-06 International Business Machines Corporation Enclosure with inner tamper-respondent sensor(s) and physical security element(s)
US9913362B2 (en) 2015-09-25 2018-03-06 International Business Machines Corporation Tamper-respondent assemblies with bond protection
US10257939B2 (en) 2015-09-25 2019-04-09 International Business Machines Corporation Method of fabricating tamper-respondent sensor
US9911012B2 (en) 2015-09-25 2018-03-06 International Business Machines Corporation Overlapping, discrete tamper-respondent sensors
US10624202B2 (en) 2015-09-25 2020-04-14 International Business Machines Corporation Tamper-respondent assemblies with bond protection
US10271434B2 (en) 2015-09-25 2019-04-23 International Business Machines Corporation Method of fabricating a tamper-respondent assembly with region(s) of increased susceptibility to damage
US9924591B2 (en) 2015-09-25 2018-03-20 International Business Machines Corporation Tamper-respondent assemblies
US9936573B2 (en) 2015-09-25 2018-04-03 International Business Machines Corporation Tamper-respondent assemblies
US10178818B2 (en) 2015-09-25 2019-01-08 International Business Machines Corporation Enclosure with inner tamper-respondent sensor(s) and physical security element(s)
US9717154B2 (en) 2015-09-25 2017-07-25 International Business Machines Corporation Enclosure with inner tamper-respondent sensor(s)
US10395067B2 (en) 2015-09-25 2019-08-27 International Business Machines Corporation Method of fabricating a tamper-respondent sensor assembly
US10264665B2 (en) 2015-09-25 2019-04-16 International Business Machines Corporation Tamper-respondent assemblies with bond protection
US10098235B2 (en) 2015-09-25 2018-10-09 International Business Machines Corporation Tamper-respondent assemblies with region(s) of increased susceptibility to damage
US10378925B2 (en) 2015-09-25 2019-08-13 International Business Machines Corporation Circuit boards and electronic packages with embedded tamper-respondent sensor
US10175064B2 (en) 2015-09-25 2019-01-08 International Business Machines Corporation Circuit boards and electronic packages with embedded tamper-respondent sensor
US10334722B2 (en) 2015-09-25 2019-06-25 International Business Machines Corporation Tamper-respondent assemblies
US10172239B2 (en) 2015-09-25 2019-01-01 International Business Machines Corporation Tamper-respondent sensors with formed flexible layer(s)
US10331915B2 (en) 2015-09-25 2019-06-25 International Business Machines Corporation Overlapping, discrete tamper-respondent sensors
US10143090B2 (en) 2015-10-19 2018-11-27 International Business Machines Corporation Circuit layouts of tamper-respondent sensors
US10136519B2 (en) 2015-10-19 2018-11-20 International Business Machines Corporation Circuit layouts of tamper-respondent sensors
US9978231B2 (en) 2015-10-21 2018-05-22 International Business Machines Corporation Tamper-respondent assembly with protective wrap(s) over tamper-respondent sensor(s)
US9913389B2 (en) 2015-12-01 2018-03-06 International Business Corporation Corporation Tamper-respondent assembly with vent structure
US10327343B2 (en) 2015-12-09 2019-06-18 International Business Machines Corporation Applying pressure to adhesive using CTE mismatch between components
US9877383B2 (en) 2015-12-18 2018-01-23 International Business Machines Corporation Tamper-respondent assemblies with enclosure-to-board protection
US9661747B1 (en) 2015-12-18 2017-05-23 International Business Machines Corporation Tamper-respondent assemblies with enclosure-to-board protection
US10217336B2 (en) 2016-02-25 2019-02-26 International Business Machines Corporation Multi-layer stack with embedded tamper-detect protection
US10169967B1 (en) 2016-02-25 2019-01-01 International Business Machines Corporation Multi-layer stack with embedded tamper-detect protection
US9916744B2 (en) 2016-02-25 2018-03-13 International Business Machines Corporation Multi-layer stack with embedded tamper-detect protection
US10115275B2 (en) 2016-02-25 2018-10-30 International Business Machines Corporation Multi-layer stack with embedded tamper-detect protection
US10169968B1 (en) 2016-02-25 2019-01-01 International Business Machines Corporation Multi-layer stack with embedded tamper-detect protection
US9904811B2 (en) 2016-04-27 2018-02-27 International Business Machines Corporation Tamper-proof electronic packages with two-phase dielectric fluid
US10535619B2 (en) 2016-05-13 2020-01-14 International Business Machines Corporation Tamper-proof electronic packages with stressed glass component substrate(s)
US9881880B2 (en) 2016-05-13 2018-01-30 International Business Machines Corporation Tamper-proof electronic packages with stressed glass component substrate(s)
US9913370B2 (en) 2016-05-13 2018-03-06 International Business Machines Corporation Tamper-proof electronic packages formed with stressed glass
US10535618B2 (en) 2016-05-13 2020-01-14 International Business Machines Corporation Tamper-proof electronic packages with stressed glass component substrate(s)
US9858776B1 (en) 2016-06-28 2018-01-02 International Business Machines Corporation Tamper-respondent assembly with nonlinearity monitoring
US10321589B2 (en) 2016-09-19 2019-06-11 International Business Machines Corporation Tamper-respondent assembly with sensor connection adapter
US10271424B2 (en) 2016-09-26 2019-04-23 International Business Machines Corporation Tamper-respondent assemblies with in situ vent structure(s)
US10667389B2 (en) 2016-09-26 2020-05-26 International Business Machines Corporation Vented tamper-respondent assemblies
US10299372B2 (en) 2016-09-26 2019-05-21 International Business Machines Corporation Vented tamper-respondent assemblies
US9999124B2 (en) 2016-11-02 2018-06-12 International Business Machines Corporation Tamper-respondent assemblies with trace regions of increased susceptibility to breaking
WO2018103883A1 (en) * 2016-12-09 2018-06-14 Giesecke+Devrient Mobile Security Gmbh Secure storage device
EP3552142A1 (en) * 2016-12-09 2019-10-16 Secunet Security Networks Aktiengesellschaft Secure storage device
US11443075B2 (en) 2016-12-09 2022-09-13 Secunet Security Networks Ag Secure storage system
AU2017370818B2 (en) * 2016-12-09 2022-09-29 Secunet Security Networks Aktiengesellschaft Secure storage device
US10327329B2 (en) 2017-02-13 2019-06-18 International Business Machines Corporation Tamper-respondent assembly with flexible tamper-detect sensor(s) overlying in-situ-formed tamper-detect sensor
WO2018154523A1 (en) * 2017-02-24 2018-08-30 Dark Matter L.L.C. Unique hardware fingerprint device and method
US10531561B2 (en) 2018-02-22 2020-01-07 International Business Machines Corporation Enclosure-to-board interface with tamper-detect circuit(s)
US11083082B2 (en) 2018-02-22 2021-08-03 International Business Machines Corporation Enclosure-to-board interface with tamper-detect circuit(s)

Also Published As

Publication number Publication date
WO2003012606A3 (en) 2004-02-05
GB0118573D0 (en) 2001-09-19

Similar Documents

Publication Publication Date Title
WO2003012606A2 (en) Security apparatus
EP1834328B1 (en) Rendering disk data unrecoverable using encryption
US6512454B2 (en) Tamper resistant enclosure for an electronic device and electrical assembly utilizing same
EP1001329B1 (en) A user-computer interaction method for use by flexibly connectable computer systems
RU2067313C1 (en) Device for protection against unauthorized access to information that is stored in personal computer
KR970006392B1 (en) Personal computer system with security function
US8812875B1 (en) Virtual self-destruction of stored information
US9378156B2 (en) Information handling system secret protection across multiple memory devices
US20060053308A1 (en) Secured redundant memory subsystem
US20050262361A1 (en) System and method for magnetic storage disposal
US12361180B2 (en) Method and apparatus for a modular digital chassis lock assembly in an information handling system
KR101476222B1 (en) Storage system having security storage device and managing method thereof
US8275996B1 (en) Incremental encryption of stored information
US20080168545A1 (en) Method for Performing Domain Logons to a Secure Computer Network
JP2011503689A (en) Computer storage device having removable read-only area and read / write area, removable media component, system management interface, and network interface
JP2006268851A (en) Data transcription in data storage device
RU2494447C2 (en) Method to code memory stick and assembly for its realisation
US20090217055A1 (en) Apparatus and Method for Preventing Unauthorized Copying
US7441118B2 (en) Network appliance having trusted device for providing verifiable identity and/or integrity information
TWI689840B (en) Data storage device
US20180239912A1 (en) Data security method and local device with switch(es)
JP4550526B2 (en) Information processing system, information processing apparatus, registration server, control program, and control method
US20080195872A1 (en) Method and Device for Protecting Data Stored in a Computing Device
CN113761602B (en) Encryption key for removable storage media
CN110472443A (en) A kind of local device of data security methods and belt switch

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2002767595

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2002767595

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP