Selective storage device wiping system and method
First Claim
1. A method for converting personal information on a storage device installed in a target computer from an accessible state to a inaccessible state comprising:
- placing a set of executable instructions on the target computer, the target computer connectable to the network;
the set of executable instructions automatically executing whenever the target computer boots;
the set of executable instructions transmitting a unique ID of the target computer over the network to the control computer and requesting status of the target computer;
the set of executable instructions receiving the status of the target computer over the network and either turning control over to the operating system or firmware of the target computer if the status is safe leaving the personal data in the accessible state, or initiating a wipe operation on the target computer if the status is unsafe converting the personal data to an inaccessible state;
if the status is unsafe the set of executable instructions selectively wiping addresses belonging to specific files from the storage device by sending write commands to the storage device, the write commands referencing wipe data patterns the wipe operation proceeding on a file-by-file basis first wiping data files, then wiping free space, and finally wiping the entire storage device.
1 Assignment
0 Petitions
Accused Products
Abstract
A storage device wiping system and method that is activated from a remote server or other site when a computer is reported lost or stolen. The wipe technique selectively wipes all data files and free space before beginning to wipe the entire storage device. This causes any personal data files, photos, videos, and the like to be wiped first. Once the wiping process starts, it will continue until complete. The process starts or continues whenever the computer is booted. Only when all personal and sensitive data is wiped, will the system then change the encryption key (if there is one) and begin wiping the entire storage device.
28 Citations
10 Claims
-
1. A method for converting personal information on a storage device installed in a target computer from an accessible state to a inaccessible state comprising:
-
placing a set of executable instructions on the target computer, the target computer connectable to the network;
the set of executable instructions automatically executing whenever the target computer boots;the set of executable instructions transmitting a unique ID of the target computer over the network to the control computer and requesting status of the target computer; the set of executable instructions receiving the status of the target computer over the network and either turning control over to the operating system or firmware of the target computer if the status is safe leaving the personal data in the accessible state, or initiating a wipe operation on the target computer if the status is unsafe converting the personal data to an inaccessible state; if the status is unsafe the set of executable instructions selectively wiping addresses belonging to specific files from the storage device by sending write commands to the storage device, the write commands referencing wipe data patterns the wipe operation proceeding on a file-by-file basis first wiping data files, then wiping free space, and finally wiping the entire storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for converting personal information on a storage device installed in a target computer from an accessible state to a inaccessible state comprising:
-
placing a set of executable instructions on the target computer, the target computer connectable to the network;
the set of executable instructions automatically executing whenever the target computer boots;the set of executable instructions transmitting a unique ID of the target computer over the network to the control computer and requesting status of the target computer; the set of executable instructions receiving the status of the target computer over the network and either turning control over to the operating system or firmware of the target computer if the status is safe leaving the personal data in the accessible state, or initiating a wipe operation on the target computer if the status is unsafe converting the personal data to an inaccessible state; if the status is unsafe the set of executable instructions selectively wiping addresses belonging to specific files from the storage device by sending write commands to the storage device, the write commands referencing wipe data patterns the wipe operation proceeding on a file-by-file basis.
-
Specification