GB2479540A - Corrupting and erasing data on a storage device when computer casing is broken - Google Patents
Corrupting and erasing data on a storage device when computer casing is broken Download PDFInfo
- Publication number
- GB2479540A GB2479540A GB201006078A GB201006078A GB2479540A GB 2479540 A GB2479540 A GB 2479540A GB 201006078 A GB201006078 A GB 201006078A GB 201006078 A GB201006078 A GB 201006078A GB 2479540 A GB2479540 A GB 2479540A
- Authority
- GB
- United Kingdom
- Prior art keywords
- data
- corrupting
- broken
- storage device
- computer casing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
A method of protecting sensitive computer data by corrupting and erasing data on a storage. device which is triggered when the computer casing is broken rather than letting the storage device be removed from the system with data intact, thus avoiding vulnerability to brute force decryption programs. The data may be erased and corrupted by an electromagnetic pulse.
Description
I
Pulse Hardware Security
Background
This invention relates to computer data security.
Currently sensitive data is protected by encryption, but an encrypted volume could be connected to another system and thus be vulnerable to brute force decryption programs.
Statement of invention
In order to overcome this, the present invention proposes a system which uses hardware in order to corrupt and erase data when an attempt is made to gain unauthorized physical access to secure data.
Claims * Claim 1: A circuit embedded in the computer casing which when broken triggers a mechanism which shall corrupt and erase data.
* Claim 2: A mechanism according to Claim 1 by means of electromagnetic pulse.
Abstract Pulse Hardware Security A method of protecting sensitive computer data.by corrupting and erasing data on a storage device rather than lefting the storage device be removed from the system with data intact, thus avoiding vulnerability to brute force decryption programs.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB201006078A GB2479540A (en) | 2010-04-13 | 2010-04-13 | Corrupting and erasing data on a storage device when computer casing is broken |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB201006078A GB2479540A (en) | 2010-04-13 | 2010-04-13 | Corrupting and erasing data on a storage device when computer casing is broken |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201006078D0 GB201006078D0 (en) | 2010-05-26 |
GB2479540A true GB2479540A (en) | 2011-10-19 |
Family
ID=42236184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB201006078A Withdrawn GB2479540A (en) | 2010-04-13 | 2010-04-13 | Corrupting and erasing data on a storage device when computer casing is broken |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2479540A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE43758E1 (en) | 1996-06-28 | 2012-10-23 | Ngk Spark Plug Co., Ltd. | Spark plug with alloy chip |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4325089A (en) * | 1979-12-10 | 1982-04-13 | Hsu Da L | System for safeguarding magnetically recorded data |
US4931770A (en) * | 1987-10-02 | 1990-06-05 | Southern Integrity, Inc. | Protection system |
WO1997030447A1 (en) * | 1996-02-16 | 1997-08-21 | Philippe Escal | Device for protecting data on magnetic or magneto-optical media |
US7263190B1 (en) * | 2004-04-06 | 2007-08-28 | United States Of America As Represented By The Secretary Of The Navy | System for securing the confidentiality of electronically stored data in the event of the physical theft thereof |
US20080112300A1 (en) * | 2006-11-15 | 2008-05-15 | David Bruce Kumhyr | Method and system for protecting data |
-
2010
- 2010-04-13 GB GB201006078A patent/GB2479540A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4325089A (en) * | 1979-12-10 | 1982-04-13 | Hsu Da L | System for safeguarding magnetically recorded data |
US4931770A (en) * | 1987-10-02 | 1990-06-05 | Southern Integrity, Inc. | Protection system |
WO1997030447A1 (en) * | 1996-02-16 | 1997-08-21 | Philippe Escal | Device for protecting data on magnetic or magneto-optical media |
US7263190B1 (en) * | 2004-04-06 | 2007-08-28 | United States Of America As Represented By The Secretary Of The Navy | System for securing the confidentiality of electronically stored data in the event of the physical theft thereof |
US20080112300A1 (en) * | 2006-11-15 | 2008-05-15 | David Bruce Kumhyr | Method and system for protecting data |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE43758E1 (en) | 1996-06-28 | 2012-10-23 | Ngk Spark Plug Co., Ltd. | Spark plug with alloy chip |
Also Published As
Publication number | Publication date |
---|---|
GB201006078D0 (en) | 2010-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2443984B (en) | Methods and apparatus for the secure handling of data in a microcontroller | |
US9495111B2 (en) | System and method for reducing information leakage from memory | |
TW200731108A (en) | Secure yet flexible system architecture for secure devices with flash mass storage memory | |
US20080016127A1 (en) | Utilizing software for backing up and recovering data | |
WO2007033321A3 (en) | Secure yet flexible system architecture for secure devices with flash mass storage memory | |
TW200708952A (en) | Providing extended memory protection | |
CN107622390B (en) | System and method for a secure payment terminal without battery | |
WO2010127030A3 (en) | Selectively securing data and/or erasing secure data caches responsive to security compromising conditions | |
WO2011159918A3 (en) | Mass storage device memory encryption methods, systems, and apparatus | |
WO2011046731A3 (en) | Secure storage of temporary secrets | |
WO2007092818A3 (en) | Post-download patient data protection in a medical device | |
GB2500852A (en) | Always-available embedded theft reaction subsystem | |
GB2442172A (en) | Anti-hack protection to restrict installation of operating systems and other software | |
CN102799819A (en) | Embedded software safety protection system | |
KR100894466B1 (en) | Information processing device, anti-tamper method, and anti-tamper program | |
AU2011355202B2 (en) | Device and method for protecting a security module from manipulation attempts in a field device | |
KR20080100674A (en) | Method and device for checking the integrity of the firmware | |
WO2009099648A3 (en) | Method and apparatus for hardware reset protection | |
EP3376707A1 (en) | File transmitting and receiving system | |
WO2006088838A3 (en) | Methods of copy protecting software stored on portable memory | |
WO2009129195A3 (en) | Secure debug interface and memory of a media security circuit and method | |
US20140108818A1 (en) | Method of encrypting and decrypting session state information | |
US20170004300A1 (en) | Hardware protection for encrypted strings and protection of security parameters | |
US20130265163A1 (en) | Magnetic Field Activated Intrusion Detection | |
GB2479540A (en) | Corrupting and erasing data on a storage device when computer casing is broken |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |