Virtual self-destruction of stored information
First Claim
1. An apparatus comprising:
- a storage device interface coupled to a storage device capable of storing information;
a host interface coupled to a host device, configured to accept a read command from said host device and configured to provide a response to said read command that includes data to said host device;
a decryption apparatus coupled to said host interface and said storage device interface used to decrypt data received by said storage device before being delivered to said host device;
a data pattern detection circuit responsive to data being transferred from said storage device, decrypted by said decryption apparatus and provided to said host device in response to said read command;
a storage circuit storing one or more decryption keys, wherein said one or more decryption keys can be used to decrypt information stored on said storage device;
a key elimination circuit configured to trigger said storage circuit thereby causing the elimination of one or more of said one or more decryption keys, wherein said key elimination circuit is responsive to said data pattern detection circuit.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus are utilized to conveniently and swiftly render stored information inaccessible. Sensitive information is stored in an encrypted form and by eliminating the key or keys which are needed for decryption, the stored information becomes virtually destroyed. A variety of mechanisms and policies can be used to manage, set and eliminate decryption keys. In some cases decryption keys can be stored in volatile storage elements so that by merely interrupting power to the storage element, the decryption keys are eliminated. In this way, a manually controlled mechanism can be used to allow a user to accomplish a “self-destruct” of the stored information instantly without the need for the operation of any processor and without the need to change any stored information.
-
Citations
5 Claims
-
1. An apparatus comprising:
-
a storage device interface coupled to a storage device capable of storing information; a host interface coupled to a host device, configured to accept a read command from said host device and configured to provide a response to said read command that includes data to said host device; a decryption apparatus coupled to said host interface and said storage device interface used to decrypt data received by said storage device before being delivered to said host device; a data pattern detection circuit responsive to data being transferred from said storage device, decrypted by said decryption apparatus and provided to said host device in response to said read command; a storage circuit storing one or more decryption keys, wherein said one or more decryption keys can be used to decrypt information stored on said storage device; a key elimination circuit configured to trigger said storage circuit thereby causing the elimination of one or more of said one or more decryption keys, wherein said key elimination circuit is responsive to said data pattern detection circuit. - View Dependent Claims (2, 3, 4, 5)
-
Specification