Removable hard disk with embedded security card
First Claim
1. A security system for a removable data storage device (RDSD), comprising:
- one or more information handling systems each comprising a processor, at least one of the processors accessing a plurality of data files stored in said RDSD; and
a trusted information module (TIM) comprising a non-volatile storage medium, the non-volatile storage medium securely storing security credentials, wherein said security credentials are not associated with a user;
wherein said TIM initiates executable software authentication and authorization processes to;
authenticate said RDSD to said information handling systems, wherein said executable software authentication and authorization processes are performed using said securely stored security credentials without user input of additional authentication or authorization information;
authorize access and usage of said plurality of data files by said one or more information handling systems; and
,convey a message via the TIM to the one or more information handling systems asserting authenticity of the RDSD; and
whereinsaid TIM initiates comparison and cryptographic operations using said executable software authentication and authorization processes to authenticate said one or more information handling systems to said RDSD;
said TIM initiates comparison and cryptographic operations using said executable software authentication and authorization processes to authenticate a predetermined user to said RDSD;
said TIM initiates executable software comparison and cryptographic operations to determine if the integrity of said plurality of data files has been compromised prior to authorizing their access and usage by said information handling systems;
said TIM is coupled to said RDSD through a predetermined interface, wherein;
said predetermined interface is internally coupled to said RDSD,said predetermined interface is externally coupled to said RDSD, orsaid TIM is removable from said predetermined interface.
14 Assignments
0 Petitions
Accused Products
Abstract
A system and method is disclosed for authenticating a removable data storage device (RDSD) by implementing a removable trusted information module (TIM) comprising a non-volatile storage medium operable to securely store passwords, digital keys, digital certificates and other security credentials (“security credentials”). An RDSD enclosure comprising a disk storage drive, one or more interfaces, one or more connectors, and a TIM is implemented to be connected, disconnected and reconnected to a plurality of predetermined information handling systems. The RDSD is authenticated by the TIM initiating comparison and cryptographic operations between its contents and the contents of authentication files comprising the RDSD. Once the RDSD has been authenticated, the TIM performs similar operations to authorize access and usage of its contents by the information handling system. Other cryptographic operations are performed to determine whether the integrity of data files has been compromised. Removal of the TIM prevents an information handling system from accessing the contents of the RDSD.
55 Citations
6 Claims
-
1. A security system for a removable data storage device (RDSD), comprising:
-
one or more information handling systems each comprising a processor, at least one of the processors accessing a plurality of data files stored in said RDSD; and a trusted information module (TIM) comprising a non-volatile storage medium, the non-volatile storage medium securely storing security credentials, wherein said security credentials are not associated with a user; wherein said TIM initiates executable software authentication and authorization processes to; authenticate said RDSD to said information handling systems, wherein said executable software authentication and authorization processes are performed using said securely stored security credentials without user input of additional authentication or authorization information; authorize access and usage of said plurality of data files by said one or more information handling systems; and
,convey a message via the TIM to the one or more information handling systems asserting authenticity of the RDSD; and
whereinsaid TIM initiates comparison and cryptographic operations using said executable software authentication and authorization processes to authenticate said one or more information handling systems to said RDSD; said TIM initiates comparison and cryptographic operations using said executable software authentication and authorization processes to authenticate a predetermined user to said RDSD; said TIM initiates executable software comparison and cryptographic operations to determine if the integrity of said plurality of data files has been compromised prior to authorizing their access and usage by said information handling systems; said TIM is coupled to said RDSD through a predetermined interface, wherein; said predetermined interface is internally coupled to said RDSD, said predetermined interface is externally coupled to said RDSD, or said TIM is removable from said predetermined interface. - View Dependent Claims (2, 3)
-
-
4. A method for securing information stored in a plurality of data files on a removable data storage device (RDSD), comprising:
-
storing security credentials on a trusted information module (TIM) comprising a non-volatile storage medium, wherein said security credentials are not associated with a user; initiating executable software authentication and authorization processes via said TIM to; authenticate said RDSD to one or more information handling systems, wherein said executable software authentication and authorization processes are performed using said stored security credentials without user input of additional authentication or authorization information; authorize access and usage of said plurality of data files by said one or more information handling systems; and
,convey a message via the TIM to the one or more information handling systems asserting authenticity of the RDSD; initiating, using said TIM, cryptographic operations using said executable software authentication and authorization processes to authenticate said one or more information handling systems to said RDSD; initiating, using said TIM, cryptographic operations using said executable software authentication and authorization processes to authenticate a predetermined user to said RDSD; initiating, using said TIM, executable software cryptographic operations to determine if the integrity of said plurality of data files has been compromised prior to authorizing their access and usage by said information handling systems; and
whereinsaid TIM is coupled to said RDSD through a predetermined interface, wherein; said predetermined interface is internally coupled to said RDSD, said predetermined interface is externally coupled to said RDSD, or said TIM is removable from said predetermined interface. - View Dependent Claims (5, 6)
-
Specification