Browse Prior Art Database

Method for a security system for small form-factor storage devices

IP.com Disclosure Number: IPCOM000125743D
Publication Date: 2005-Jun-15
Document File: 3 page(s) / 66K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a method for a security system for small form-factor storage devices. Benefits include improved functionality

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 54% of the total text.

Method for a security system for small form-factor storage devices

Disclosed is a method for a security system for small form-factor storage devices. Benefits include improved functionality.

Background

              Many small offices and businesses use external storage devices, ranging from single externally attached disks to network small disk systems. These devices are small, easily detachable and can contain confidential company business records and customer information. Theft of this information can create a business liability risk.

General description

              The disclosed method is a security system for small form-factor storage devices that

deploys multiple redundant authentication devices, including location-based security. When the storage device is removed from the office location the data is automatically locked.

Advantages

              The disclosed method provides advantages, including:
•             Improved functionality due to providing a security system for small form-factor storage devices that requires multiple authentication responses
•             Improved functionality due to being location dependent

•             Improved functionality due to remaining secure if the master key is available

Detailed description

              The disclosed method includes the performance of a series of verifications to ensure that the storage appliance is installed in the original location and has not been removed. This procedure prevents the device from being hacked by a thief.

              Encryption software resides in the storage appliance that can only be unlocked when multiple keys are present. These keys include a master key device that is securely placed within the office and multiple mobile keys.

              For example, the method can be used in a small dentist’s office where a central network-attached storage device is used by multiple staff members for billing and appointments. Trusted members of the staff, who traditionally have keys to the office, are given a portable device that can be attached to their keychain. The master device and each of the portable devices allow all users within the office access to the storage device. The access is automatic and does not require user identification or a password....