Method and system for protecting data
First Claim
1. A computer implemented method for protecting data within a portable storage device, the computer implemented method comprising:
- enabling a self destruct unit associated with the portable storage device to form an enabled self-destruct unit;
determining if the portable storage device is within a pre-specified route tolerance;
determining if the portable storage device is at a pre-selected identification checkpoint;
sending an alert message if the portable storage device is not within the pre-specified route tolerance or if the portable storage device is not at the pre-selected identification checkpoint; and
responsive to receiving a particular response, sending a self destruct signal to the enabled self destruct unit, wherein the enabled self destruct unit creates an electromagnetic pulse from a xenon flash tube to render confidential data within the portable storage device unusable.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for protecting data within a portable storage device. A self-destruct unit associated with the portable storage device is enabled. If the portable storage device is not within a pre-specified route tolerance or if the portable storage device is not at a pre-selected identification checkpoint, an alert message is sent. In response to receiving a particular response, a self-destruct signal is sent to the enabled self-destruct unit. Then the enabled self-destruct unit creates an electromagnetic pulse from a xenon flash tube to render confidential data within the portable storage device unusable.
38 Citations
15 Claims
-
1. A computer implemented method for protecting data within a portable storage device, the computer implemented method comprising:
-
enabling a self destruct unit associated with the portable storage device to form an enabled self-destruct unit; determining if the portable storage device is within a pre-specified route tolerance; determining if the portable storage device is at a pre-selected identification checkpoint; sending an alert message if the portable storage device is not within the pre-specified route tolerance or if the portable storage device is not at the pre-selected identification checkpoint; and responsive to receiving a particular response, sending a self destruct signal to the enabled self destruct unit, wherein the enabled self destruct unit creates an electromagnetic pulse from a xenon flash tube to render confidential data within the portable storage device unusable. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product for protecting data within a portable storage device, the computer program product comprising:
a computer usable medium having computer usable program code embodied therein, the computer usable medium comprising; first computer usable program code configured to enable a self-destruct unit associated with the portable storage device to form an enabled self-destruct unit; second computer usable program code configured to determine if the portable storage device is within a pre-specified route tolerance; third computer usable program code configured to determine if the portable storage device is at a pre-selected identification checkpoint; fourth computer usable program code configured to send an alert message if the portable storage device is not within the pre-specified route tolerance or if the portable storage device is not at the pre-selected identification checkpoint; and fifth computer usable program code configured to send a self-destruct signal to the enabled self-destruct unit in response to receiving a particular response, wherein the enabled self-destruct unit creates an electromagnetic pulse from a xenon flash tube to render confidential data within the portable storage device unusable. - View Dependent Claims (7, 8, 9, 10)
-
11. A system for protecting data, comprising:
-
a network for providing communication capabilities between components of the system; a portable storage device for storing confidential data, wherein an identification tag is associated with the portable storage device for identifying the portable storage device, and wherein a self-destruct unit is associated with the portable storage device for rendering the confidential data unusable, and wherein a ground positioning unit is associated with the portable storage device for locating the portable storage device; an identification reader coupled to the network for reading the identification tag at a pre-selected identification checkpoint; a bus system; a storage device connected to the bus system, wherein the storage device includes a set of instructions; and a processing unit connected to the bus system, wherein the processing unit executes the set of instructions to enable the self-destruct unit to form an enabled self-destruct unit, determine if the portable storage device is within the pre-specified route tolerance using the ground positioning unit, determine if the portable storage device is at the pre-selected identification checkpoint using the identification reader, send an alert message if the portable storage device is not within the pre-specified route tolerance or if the portable storage device is not at the pre-selected identification checkpoint, and send a self-destruct signal via the network to the enabled self-destruct unit in response to receiving a particular response, wherein the enabled self-destruct unit creates an electromagnetic pulse from a xenon flash tube to render the confidential data within the portable storage device unusable. - View Dependent Claims (12, 13, 14, 15)
-
Specification