Data security system with encryption

ABSTRACT

A data security system, and a method of operation thereof, includes a data security transceiver or receiver; an authentication subsystem operatively connected to the data security transceiver or receiver; and a storage subsystem connected to the authentication subsystem.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This is a continuation-in-part of copending U.S. patent application Ser.No. 12/680,742 filed Mar. 29, 2010, which is the National Stage ofInternational Application number PCT/US2008/077766 filed Sep. 26, 2008,which claims the benefit of U.S. Provisional Patent Application Ser. No.60/975,814 filed Sep. 27, 2007, and the subject matter thereof isincorporated herein by reference thereto.

The present application contains subject matter related to aconcurrently filed U.S. patent application Ser. No. 14/987,678, filedJan. 4, 2016, by Lev M. Bolotin and Simon B. Johnson and entitled “DATASECURITY SYSTEM WITH ENCRYPTION”. The subject matter thereof isincorporated herein by reference thereto.

TECHNICAL FIELD

The present invention relates generally to electronic devices, and moreparticularly to memory devices.

BACKGROUND ART

Security is a critical issue with almost all aspects of computer use.Storage media, such as hard disk drives attached to computers, containvaluable information, which is vulnerable to data theft. A great deal ofmoney and effort is being applied to guarding personal, corporate, andgovernment security information.

As portable memory storage devices have become smaller, easier to lose,more ubiquitous, cheaper, and larger in memory capacity, they have cometo pose extraordinary security problems. It is now possible to downloadmassive amounts of information surreptitiously into portable memorystorage devices, such as universal serial bus flash and micro drives,cellphones, camcorders, digital cameras, iPODs, MP3/4 players, smartphones, palm and laptop computers, gaming equipment, authenticators,tokens (containing memory), etc.—in general, a mass storage device(MSD).

More specifically, there are millions of MSDs being used for backup,transfer, intermediate storage, and primary storage into whichinformation can be easily downloaded from a computer and carried away.The primary purpose of any MSD is to store and retrieve “portablecontent,” which is data and information tied to a particular owner not aparticular computer.

The most common means of providing storage security is to authenticatethe user with a computer-entered password. A password is validatedagainst a MSD stored value. If a match occurs, the drive will open. Or,the password itself is used as the encryption key to encrypt/decryptdata stored to the MSD.

For drives that support on-the-fly encryption, the encryption key isoften stored on the media in an encrypted form. Since the encryption keyis stored on the media, it becomes readily available to those willing tocircumvent the standard interface and read the media directly. Thus, apassword is used as the key to encrypt the encryption key.

For self-authenticating drives, their authentication sub-system isresponsible for maintaining security. There is no dependency on a hostcomputer to which it is connected. Thus, a password cannot (or need not)be sent from the host in order to unlock the MSD. In fact, theencryption key no longer needs to be stored on the media. Theauthentication subsystem becomes the means for managing encryption keys.

Thus, a need still remains for improved security. In view of theever-increasing commercial competitive pressures, along with growingconsumer expectations and the diminishing opportunities for meaningfulproduct differentiation in the marketplace, it is critical that answersbe found for these problems. Additionally, the need to reduce costs,improve efficiencies and performance, and meet competitive pressures,adds an even greater urgency to the critical necessity for findinganswers to these problems.

Solutions to these problems have been long sought but prior developmentshave not taught or suggested any solutions and, thus, solutions to theseproblems have long eluded those skilled in the art.

DISCLOSURE OF THE INVENTION

The present invention provides a method of operation of a data securitysystem including: providing a mobile device with a data security systemapplication for connectivity with the data security system; starting thedata security system application; and maintaining connectivity of thedata security system with the mobile device.

The present invention provides a data security system including: a datasecurity transceiver or receiver; an authentication subsystemoperatively connected to the data security transceiver or receiver; anda storage subsystem connected to the authentication subsystem.

Certain embodiments of the invention have other aspects in addition toor in place of those mentioned above. The aspects will become apparentto those skilled in the art from a reading of the following detaileddescription when taken with reference to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic of a data security system in accordance with anembodiment of the present invention;

FIG. 2 is an illustration of an authentication key delivery method usedwith the data security system;

FIG. 3 is an illustration of different systems for the user to interactwith the data security system;

FIG. 4 is an illustration of how the user can employ the host computersystem to interact with a data security system; and

FIG. 5 is a data security method employing user verification for thedata security system.

FIG. 6 is an exemplary data security communication system.

FIG. 7 is an administrator sequencing diagram showing the sequence ofoperations between a mobile device and the data security system.

FIG. 8 is a unlocking sequence diagram where the mobile device is anauthentication factor.

FIG. 9 is an unlock sequencing diagram showing unlocking using a PINentry from the mobile device.

FIG. 10 is an unlock sequencing diagram showing unlock using a PIN entryand User ID/location/time verification via the server/console.

FIG. 11 is a reset sequencing diagram showing resetting the datasecurity system using a server/console.

FIG. 12 is an unlock sequencing diagram showing unlocking the datasecurity system using the server/console.

FIG. 13 is a change user's password sequencing diagram using theserver/console.

BEST MODE FOR CARRYING OUT THE INVENTION

The following embodiments are described in sufficient detail to enablethose skilled in the art to make and use the invention. It is to beunderstood that other embodiments would be evident based on the presentdisclosure, and that system, process, or mechanical changes may be madewithout departing from the scope of the present invention.

In the following description, numerous specific details are given toprovide a thorough understanding of the invention. However, it will beapparent that the invention may be practiced without these specificdetails. In order to avoid obscuring the present invention, somewell-known circuits, system configurations, and process steps are notdisclosed in detail.

Likewise, the drawings showing embodiments of the system aresemi-diagrammatic and not to scale and, particularly, some of thedimensions are for the clarity of presentation and are shown exaggeratedin the drawing FIGs. Where multiple embodiments are disclosed anddescribed having some features in common, for clarity and ease ofillustration, description, and comprehension thereof, similar and likefeatures one to another will ordinarily be described with similar or thesame reference numerals. Similarly, although the views in the drawingsfor ease of description generally show similar orientations, thisdepiction in the FIGs. is arbitrary for the most part. Generally, theinvention can be operated in any orientation.

The term “system” as used herein refers to and is defined as the methodand as the apparatus of the present invention in accordance with thecontext in which the term is used. The term “method” as used hereinrefers to and is defined as the operational steps of an apparatus.

For reasons of convenience and not limitation, the term “data” isdefined as information that is capable of being produced by or stored ina computer. The term “data security system” is defined as meaning anyportable memory device incorporating a storage medium. The term “storagemedia” as used herein refers to and is defined as any solid state, NANDFlash, and/or magnetic data recording system. The term “locked” refersto the data security system when the storage media is not accessible andthe term “unlocked” refers to the data security system when the storagemedia is accessible.

There are generally two methods to make a storage device tamperresistant:

-   -   1. Apply epoxy to components—an epoxy resin applied to the        printed circuit board can make it difficult to disassemble the        storage device without destroying storage media.    -   2. Encrypt memory data—data gets encrypted as it is written to        the storage media and an encryption key is required to decipher        the data.

Referring now to FIG. 1, therein is shown a schematic of a data securitysystem 100 in accordance with an embodiment of the present invention.The data security system 100 consists of an external communicationchannel 102, an authentication subsystem 104, and a storage subsystem106.

The storage subsystem 106 is electronic circuitry that includes aninterface controller 108, an encryption engine 110, and a storage media112. The storage media 112 can be an internal or external hard diskdrive, USB flash drive, solid state drive, hybrid drive, memory card,tape cartridge, and optical media including optical disk (e.g., Blu-raydisk, digital versatile disk or DVD, and compact disk or CD). Thestorage media 112 can include a data protection appliance, archivalstorage system, and cloud-based data storage system. The cloud storagesystem may be accessed utilizing a plug-in (or “plugin”) application orextension software installed in a browser application, either on thehost computer or on another system coupled to the host computer via awired or wireless network, such as RF or optical, or over the world wideweb.

The interface controller 108 includes electronic components such as amicro-controller with the encryption engine 110 of software or hardware,although the encryption engine 110 can be in a separate controller inthe storage subsystem 106.

The authentication subsystem 104 is electronic circuitry that includesan authentication controller 114, such as a micro-controller, which mayhave its own non-volatile memory, such as an electrically erasableprogrammable read-only memory (EEPROM).

The external communication channel 102 provides a means of exchangingdata with a host computer system 120. Universal Serial Bus (USB) is oneof the most popular means to connect the data security system 100 to thehost computer system 120. Other examples of the external communicationchannel 102 include Firewire, wireless USB, Serial ATA (SATA), HighDefinition Multimedia Interface (HDMI), Recommended Standard 232(RS-232), and radio frequency wireless networks.

The interface controller 108 is capable of translating USB packet datato data that can be written to the storage media 112 in a USB FlashDrive.

The encryption engine 110 is implemented as part of the interfacecontroller 108 and takes clear text and/or data (information) from thehost computer system 120 and converts it to an encrypted form that iswritten to the MSD or the storage media 112. The encryption engine 110also converts encrypted information from the storage media 112 anddecrypts it to clear information for the host computer system 120. Theencryption engine 110 can also be a two controller subsystem with anencryption controller that has the encryption capability toencrypt/decrypt data on the fly along with managing the communicationprotocol, memory, and other operating conditions and acommunication/security controller for handling the communication,encryption key management, and communications with the encryptioncontroller.

An encryption key 116 is required by the encryption engine 110 toencrypt/decrypt the information. The encryption key 116 is used in analgorithm (e.g., a 256 bit Advanced Encryption Standard (AES)encryption) that respectively encrypts/decrypts the data by anencryption algorithm to render data unreadable or readable. Theencryption key 116 can be stored either internally or externally to theauthentication controller 114.

The encryption key 116 is transmitted to the encryption engine 110 bythe authentication subsystem 104 once a user 122, having anidentification number or key, has been verified against anauthentication key 118.

It has been discovered that, by the employment of the authentication key118 and the encryption key 116, portable memory storage devices of thevarious embodiments of the present invention can be provide an extremelyhigh level of security previously not available in such devices.

When the data security system 100 is locked, the authentication key 118remains inside the authentication subsystem 104 and cannot be read fromoutside. One method of hiding the authentication key 118 is to store itin the authentication controller 114 in the authentication subsystem104. Setting the security fuse of the authentication controller 114makes it impossible to access the authentication key 118 unless theauthentication controller 114 allows retrieval once the user 122 hasbeen verified. Many micro-controllers come equipped with a security fusethat prevents accessing any internal memory when blown. This is awell-known and widely used security feature. Such a micro-controllercould be used for the authentication controller 114. The authenticationcontroller 114 can be a micro-controller or microprocessor.

The authentication key 118 can be used as in several capacities:

-   -   1. As the encryption key 116 to encrypt/decrypt the information        directly.    -   2. As a key to recover the encryption key 116 stored in the data        security system 100 that can be accessed by the interface        controller 108.    -   3. Used for direct comparison by the interface controller 108 to        activate the external communication channel 102.

Referring now to FIG. 2, therein is shown an illustration of anauthentication key delivery method used with the data security system100. In this illustration, the authentication key 118 and the encryptionkey 116 are one and the same. The encryption engine 110 employs theauthentication key 118 as the encryption key 116.

The user 122 must interact with the authentication subsystem 104 byproviding user identification 202, a number or key, to theauthentication subsystem 104. The authentication subsystem 104 validatesthe user 122 against the authentication key 118. The authenticationsubsystem 104 then transmits the authentication key 118 as theencryption key 116 to the interface controller 108.

The encryption engine 110 in the interface controller 108 employs theauthentication key 118 to convert clear information to encryptedinformation and encrypted information to clear information along achannel 206. Any attempt to read encrypted information from the storagemedia 112 without the encryption key 116 will generally result ininformation that is unusable by any computer.

Referring now to FIG. 3, therein is shown an illustration of differentsystems for the user 122 to interact with a data security system 300.The interaction can be by a communication combination 301, which can beby a physical contact, wired connection, or wireless connection from acell phone, smartphone, smart watch, wearable appliance, or otherwireless device.

In one authentication system, a mobile transceiver 302 is employed totransmit user identification 304 to a data security transceiver 306 inan authentication subsystem 310. For exemplary purposes, transceiversare employed for bi-directional communication flexibility but atransmitter-receiver combination for uni-directional communication couldalso be used. The authentication subsystem 310 includes theauthentication controller 114, which is connected to the interfacecontroller 108 in the storage subsystem 106. The user identification 304is supplied to the data security transceiver 306 within theauthentication subsystem 310 by the mobile transceiver 302 from outsidethe storage subsystem 106 of the data security system 300. The wirelesscommunication may include Wireless Fidelity (WiFi), Bluetooth (BT),Bluetooth Smart, Near Field Communication (NFC), Global PositioningSystem (GPS), optical, cellular communication (for example, Long-TermEvolution (LTE), Long-Term Evolution Advanced (LTE-A)), Code DivisionMultiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA),Universal Mobile Telecommunications System (UMTS), Wireless Broadband(WiBro), or Global System for Mobile Communications (GSM), and thelike).

The authentication subsystem 310 validates the user 122 against theauthentication key 118 by a code sent from the mobile transceiver 302being validated against the authentication key 118. The authenticationsubsystem 310 then transmits the encryption key 116 to the interfacecontroller 108 across the communication combination 301.

The encryption engine 110 then employs the encryption key 116 to convertclear information to encrypted information and encrypted information toclear information along the channel 206. Any attempt to read encryptedinformation from the storage media 112 without the encryption key 116will result in information that is unusable by the host computer system120.

In an optional second authentication mechanism, the authenticationsubsystem 310 validates the user 122 against the authentication key 118by having the user 122 employ a biometric sensor 320 to supply abiometric input 322 to verify his/her identity as an authorized user.Types of biometric identification include a fingerprint, an iris scan, avoice imprint, etc.

In an optional third authentication mechanism, The authenticationsubsystem 310 validates the user 122 against the authentication key 118by having the user 122 employ an electro-mechanical input mechanism 330to supply a unique code 332 to verify his/her identity as an authorizeduser. The unique code 332 can include a numerical, alphanumeric, oralphabetic code, such as a PIN. The electro-mechanical input mechanism330 is within the authentication subsystem 310. The electro-mechanicalinput mechanism 330 receives the unique code 332 from the user 122 fromoutside of the data security system 300. The unique code 332 is suppliedto the electro-mechanical input mechanism 330 within the authenticationsubsystem 310 from outside the storage subsystem 106 of the datasecurity system 300.

No matter which method is used to validate the user 122, theauthentication key 118 and the encryption key 116 remain hidden untilthe user 122 is authenticated.

Referring now to FIG. 4, therein shows an illustration of how the user122 can employ the host computer system 120 to interact with a datasecurity system 400.

The host computer system 120 is provided with a host application 402.The host application 402 is software or firmware, which communicatesover the external communication channel 102 of the data security system400.

The host application 402 delivers host identifiers 406, such as internalcomponent serial numbers (e.g. hard drive), media access control (MAC)address of a network card, login name of the user, network InternetProtocol (IP) address, an ID created by the data security system andsaved to the host, an ID created by the data security system and savedto the network, etc., associated with its environment. The hostidentifiers 406 are employed by an authentication subsystem 408 in thedata security system 400.

When the authentication subsystem 408 validates the user 122 against theauthentication key 118 by verifying the host identifiers 406, the datasecurity system 400 will unlock.

For example, the user 122 connects the data security system 400 that islocked to the host computer system 120. The host application 402 sendsthe MAC address of its network card to the data security system 400. Thedata security system 400 recognizes this MAC address as legitimate andunlocks without the user 122 of FIG. 1 having to enter useridentification. This is implementation does not require any interactionwith the user 122. In this case, it is the host computer system 120 andits associated environment that are being validated.

The data security system 400 includes: providing the authentication key118 stored in the authentication subsystem 104; providing verificationof the host computer system 120 by the authentication subsystem 104;presenting the encryption key 116 to the storage subsystem 106 by theauthentication subsystem 104; and providing access to the storage media112 by the storage subsystem 106 by way of decrypting the storage mediacontent.

The data security system further includes the authentication subsystem104 for interpretation of biometric input and verification of the user122.

The data security system further includes using the authentication key118 as the encryption key 116 directly.

The data security system further includes using the authentication key118 to decrypt and retrieve the encryption key 116 used to decipherinternal content.

The data security system further includes the authentication subsystem104 for interpretation of signal inputs and verification of sendingunit.

The data security system further includes the authentication subsystem104 for interpretation of manually entered input and verification of theuser 122.

The data security system further includes the authentication subsystem104 for interpretation of input sent by a host resident softwareapplication for verification of the host computer system 120.

The data security system as further includes the encryption engine 110outside the interface controller 108 but connected to the externalcommunication channel 102 for the purpose of converting clear data toencrypted data for unlocking the data security system 100.

Referring now to FIG. 5, therein is shown a data security method 500employing user verification for the data security system 100. The datasecurity method 500 includes; verifying the user against anauthentication key in a block 502; employing the authentication key forretrieving an encryption key in a block 504; and employing theencryption key for allowing unencrypted communication through a storagesubsystem between a host computer system and a storage media in a block506.

Referring now to FIG. 6, therein is shown an exemplary data securitycommunication system 600. The exemplary data security communicationsystem 600 includes a mobile device 610, a data security system 620, ahost computer 630, and a server/console 640. The mobile device 610 andthe server/console 640 are connected by wired or wireless connectionsthrough a cloud 650, which can be an Internet cloud. The mobile device610 and the data security system 620 are connected by the communicationcombination 301.

The communication combination 301 in the exemplary data securitycommunication system 600 includes a mobile transceiver 612 in the mobiledevice 610 with an antenna 614 wirelessly communicating with an antenna622 of a data security transceiver 624 in the data security system 620.

The mobile device 610 in one embodiment can be a smartphone. In themobile device 610, the mobile transceiver 612 can be connected toconventional mobile device components and to a data security systemapplication 618, which provides information to be used with the datasecurity system 620.

The data security transceiver 624 is connected to a security controller626, which can contain identification, passwords, profiles, orinformation including that of different mobile devices that can accessthe data security system 620. The security controller 626 is connectedto subsystems similar to the authentication subsystem 310, the storagesubsystem 106 (which in some embodiments can have encryption to encryptdata), and the external communication channel 102.

The external communication channel 102 is connectable to the hostcomputer 630 to allow, under specified circumstances, access to data inthe storage subsystem 106.

One implementation of the data security system 620 can eliminate thebiometric sensor 320 and the electro-mechanical input mechanism 330 ofFIG. 3 with only a wireless link to the mobile device 610, such as asmartphone. It has been found that this implementation makes the datasecurity system 620 more secure and useful.

The data security system application 618 allows the mobile device 610 todiscover all data security systems in the vicinity of the mobile device610 and show their status (locked/unlocked/blank, paired/unpaired etc.).

The data security system application 618 allows the mobile device 610 toconnect/pair, lock, unlock, change the name and password, and reset alldata on the data security system 620.

The data security system application 618 allows the mobile device 610 toset an inactivity auto-lock so the data security system 620 willautomatically lock after a predetermined period of inactivity or to seta proximity auto-lock so the data security system 620 will be lockedwhen the mobile device 610 is not within a predetermined proximity for apredetermined time period (to improve reliability and avoid signalde-bouncing).

The data security system application 618 allows the mobile device 610 toremember a password, use TouchID, and Apple Watch (both TouchID andApple Watch mentioned here as examples only, there are many other mobiledevices with biometric sensors and wearables that can be used in asimilar mode) so data security system 620 could be unlocked withoutentering re-entering a password on the mobile device

The data security system application 618 allows the mobile device 610 tobe set to operate only with a specific mobile device, such as the mobiledevice 610, so the data security system 620 cannot be unlocked withother mobile devices (1Phone).

The data security system application 618 allows the mobile device 610 toset the data security system 620 to Read-Only

The data security system application 618 allows the mobile device 610 tooperated in User Mode or Administrator Mode (administrator's modeoverrides user's settings) and use the server/console 640. Theserver/console 640 is a combination of a computer with a console forentering information into the computer.

The server/console 640 contains a user management database 642, whichcontains additional information that can be transmitted over the cloud650 to the mobile device 610 to provide additional functionality to themobile device 610.

The user management database 642 allows the server/console 640 to createand identify users using UserID (username and password) and block/allowunlocking the data security system 620 and provide remote help.

The user management database 642 allows the server/console 640 toremotely reset or unlock the data security system 620.

The user management database 642 allows the server/console 640 toremotely change the data security system user's PIN.

The user management database 642 allows the server/console 640 torestrict/allow unlocking data security system 620 from specificlocations (by using geo-fencing)

The user management database 642 allows the server/console 640 torestrict/allow unlocking data security system 620 in specified timeperiods and different time zones

The user management database 642 allows the server/console 640 torestrict unlocking data security system 620 outside of specifiedteam/organization/network etc.

Referring now to FIG. 7, therein is shown an administrator sequencingdiagram showing the sequence of operations between the mobile device 610and the data security system 620.

Connectivity 700, between the data security system 620 and the mobiledevice 610, is first established with mutual discovery of the otherdevice or system, pairing the device and system, and connection of thedevice and system. The connectivity 700 is secured using a sharedsecret, which is then used to secure (encrypt) communications betweenthe data security system 620 and the mobile device 610 for all futurecommunication sessions. A standard encryption algorithm is selected tobe both efficient to run on the data security system 620 and to beapproved by world-wide security standards.

The connectivity 700 is maintained by the data security systemapplication 618 or the security controller 628 or both operatingtogether as long as the data security system 620 and the mobile device610 are within a predetermined distance of each other. Further, if thepredetermined distance is exceeded, the connectivity 700 is maintainedfor a predetermined period of time after which the data security system620 is locked.

After connection of the mobile device 610 and the data security system620, a data security system administrator application start operation702 occurs in the mobile device 610. Then an administrator sets apassword in an administrator password operation 704. Also afterconnection of the mobile device 610 and the data security system 620,the data security system 620 is connected to the host computer 630 ofFIG. 6 to be powered up and discoverable by the host computer 630 in adata security system connected, powered and discoverable operation 706.

After the administrator password operation 704, the mobile device 610sends a set administrator password and unlock signal 708 to the datasecurity system 620. The set administrator password and unlock signal708 causes an administrator password set and data security systemunlocked operation 716 to occur in the data security system 620.

When the administrator password set and data security system unlockedoperation 716 is completed, a confirmation: data security systemunlocked signal 712 is sent to the mobile device 610 where aconfirmation: data security system unlocked as administrator operation714 operates. The confirmation: data security system unlocked asadministrator operation 714 permits a set other restrictions operation716 to be performed using the mobile device 610. The set otherrestrictions operation 716 causes a set administrator restrictionssignal 718 to be sent to the data security system 620 where theadministrator restrictions are set and a confirmation: restrictions setsignal 720 is returned to the mobile device 610. Thereafter, the mobiledevice 610 and the data security system 620 are in full operativecommunication.

Because it is possible to communicate with the data security system 620without having physical contact with the data security system 620, it isrequired that significant interactions with the data security system 620be accompanied by a data security system unique identifier that iseither printed on the data security system 620 itself, or that comeswith the data security system 620 packaging and is readily available tothe data security system 620 owner.

On making requests that could affect user data, such as unlocking orresetting the data security system 620, this unique identifier (uniqueID) is required. Attempts to perform these operations without thecorrect identifier are ignored and made harmless. The unique identifieris used to identify the data security system 620 to the mobile device610 in a way that requires the user to have physical control over thedata security system 620 and to verify the connectivity 700 isestablished between the authorized, previously paired device and system,such as the mobile device 610 and the data security system 620. Once thedevices are paired, the shared secret is used to make the communicationconfidential.

Pairing connotes that a mobile device and a data security system have aunique and defined relationship established at some time in the past andenduring.

The unique identifier makes for giving the user some control over thedata security system when the user has physical control of the datasecurity system.

To increase the security of the communication with the data securitysystem 620 where the mobile device 610 is a smartphone, a user maychoose to enable a feature, such as a feature called 1Phone here. Thisfeature restricts significant user interactions with the data securitysystem 620 to one and only one mobile device 610. This is done byreplacing the data security system unique identifier described abovewith a random identifier shared securely between the data securitysystem 620 and the mobile device 610. So, instead of presenting the datasecurity system unique identifier when, for example, the user unlocksthe data security system 620, the 1Phone identifier must be giveninstead. In effect, this makes the user's mobile device 610 a secondauthentication factor for using the data security system 620 in additionto a PIN or password. As an example, the paired user phone selected as“1Phone” can be used without a PIN, and as the user-authenticationsingle factor and/or in a combination with any other user-authenticationfactors. If such feature (1Phone) is selected, the data security system620 cannot be open with any other phones, except if an administrator'sunlock was enabled before.

It will be understood that other embodiments can be made to require anadministrat'r's password on the data security system 620 in order to usethe 1Phone feature. Another embodiment may require that theserver/console 640 is capable of recovering the data security system 620in case the 1Phone data is lost on the mobile device 610.

The user may enable a proximity auto-lock feature for the data securitysystem 620. During a communication session, the data securitytransceiver 624 of FIG. 6 reports to the data security system 620 asignal strength measurement for the mobile device 610. The data securitysystem application 618 on the mobile device 610 sends the data securitysystem 620 both the originating signal power level and the threshold forproximity.

Because the signal strength varies due to environmental conditionsaround the transceivers, the data security system 620 mathematicallysmoothes the signal strength measurements to reduce the likelihood of afalse positive. When the data security system 620 detects that thesignal power received has dropped below a defined threshold for apredetermined period of time, it will immediately lock the data securitysystem 620 and prevent access to the storage subsystem 106 of FIG. 6.

The data security system 620 could be used in three different modes: aUser Mode where the functionalities of the data security system 620 aredetermined by the user; an Administrator Mode where an administrator canset an Administrator password and enforce some restrictions on the datasecurity system 620 (e.g., automatic lock after a predetermined periodof inactivity, Read-Only, 1Phone) and where restrictions cannot beremoved by a User; and a Server Mode where an administrator role is setwhere the server/console 640 can remotely reset the data security system620, change user passwords, or just unlock the data security system 620.

Referring now to FIG. 8, therein is shown a unlocking sequence diagramwhere the mobile device 610 is an authentication factor. This diagramshows auto-unlock process of the data security system 620 initiated bythe data security system application 618 from specific mobile device,the mobile device 610. A user can use only one mobile device that wasinitially paired with the data security system 620. If the paired mobiledevice 610 is lost then the data security system 620 could not beunlocked (unless administrator password was set before as shown in FIG.7).

While similar to FIG. 7, a data security system application startedoperation 800 occurs after the connectivity 700 is established. Anunlock required with mobile device ID signal 802 is sent from the mobiledevice 610 to the data security system 620 after a data security systemconnected, powered and discoverable operation 706. A data securitysystem unlocked operation 804 occurs and a confirmation: data securitysystem unlocked signal 712 is sent from the data security system 620.After a confirmation: data security system unlocked operation 806, themobile device 610 and the data security system 620 are in full operativecommunication.

If a PIN (Personal Identification Number) was not setup then the pairedmobile device is used as 1-authentication factor.

Referring now to FIG. 9, therein is shown an unlock sequencing diagramshowing unlocking using a PIN entry from the mobile device 610. Thisdiagram shows process of unlocking the data security system 620 byentering a PIN in the data security system application 618 in the mobiledevice 610. The data security system 620 cannot be unlocked withoutentering the correct PIN.

While similar to FIGS. 7 and 8, an enter username/password operation 900occurs after the data security system application started operation 800.After the enter username/password operation 900, the mobile device 610sends a verify user ID signal 902 to the server/console 640. Theserver/console 640 then makes a username/password valid determination904.

When the username/password valid determination 904 verifies the user, avalid user signal 906 is sent to the mobile device 610 for the user toenter the correct PIN in an enter PIN operation 908 in the mobile device610. The mobile device 610 then sends a verify unlock signal 910 todetermine if the correct PIN has been entered to the server/console 640.

The server/console 640 makes a user authorized determination 912 anddetermines if the user is authorized to use the specific data securitysystem, such as the data security system 620, that the PIN is authorizedfor. If authorized, an unlock allowed signal 914 is sent to the mobiledevice 610, which passes on an unlock request signal 916 to the datasecurity system 620.

The data security system unlocked operation 804 is performed and theconfirmation: data security system unlocked signal 712 is sent to themobile device 610 where the confirmation: data security system unlockedoperation 806 is performed.

Referring now to FIG. 10, therein is shown an unlock sequencing diagramshowing unlock using a PIN entry and User ID/location/time verificationvia the server/console 640. This diagram shows the most secure processof unlocking the data security system 620 by entering a PIN in the datasecurity system application 618 from the mobile device 610,authentication in the server/console 640 server using a UserID(username/password) and by verifying geo-fencing permissions to unlockthe data security system 620 at a specific location and at a certaintime range. The data security system 620 could not be unlocked withoutentering the PIN, username and password, and having the mobile device610 be present in specific (predefined) location and certain(predefined) time.

While similar to FIGS. 7-9, at the server/console 640, an unlockspecified data security system operation 1000 is performed to allowsetting of the desired conditions under which the specified datasecurity system, such as the data security system 620, will operate. Forexample, the conditions could be within a specific geographical areaand/or specific time frame.

At the mobile device 610, a current condition determination is made,such as in an acquire location and/or current time operation 1002. Thisoperation is performed to determine where the mobile device 610 islocated and or what the current time is where the mobile device 610 islocated. Other current conditions around the mobile device 610 may alsobe determined and sent by a verify unlock signal 1004 to theserver/console 640 where a conditions met determination 1006 is made.

When the desired conditions are met, an unlock allowed signal 1008 issent to the mobile device 610 for the enter PIN operation 908 to beperformed. After the PIN is entered, a verify unlock signal 1010 is sentwith the PIN and an identification of the data security system 620 thatis in operational proximity to the mobile device 610. The verify unlocksignal 1010 is received by the server/console 640 and a data securitysystem allowed determination 1012 is made to determine that thespecified data security system is allowed to unlock by the authorizeduser. The server/console 640 verifies that this “specific” user isauthorized to use the specified data security system.

After determining the correct information has been provided, theserver/console 640 will provide an unlock allowed signal 914 to themobile device 610, which will provide a unlock request signal 916. Theunlock request signal 916 causes the data security system 620 tooperate.

Referring now to FIG. 11, therein is shown a reset sequencing diagramshowing resetting the data security system 620 using the server/console640. This diagram shows the ability to reset the data security system620 remotely via the server/console 640. The data security system 620can receive commands only from the mobile device 610 over the wirelessconnection. However, by setting a “Reset” flag on the server/console 640for a specific data security system (using it's S/N), the data securitysystem application 618 running on the mobile device 610 will query theserver/console 640 for any flags/pending requests in the user managementdatabase 642. When the user connects the data security system 620, thedata security system application 618 on the mobile device 610 willexecute a waiting “reset” command. After a successful reset (all userdata and credentials are gone), the server/console 640 will remove theReset flag so it will be not be executed the next time when the mobiledevice 610 is connected to the specific data security system.

While similar to FIGS. 7-10, the mobile device 610 responds to the validuser signal 906 to send an any command waiting signal 1100 to theserver/console 640 to make a reset command determination 1102. When thereset command is present, a perform reset signal 1104 will be sent tothe mobile device 610.

The mobile device 610 will send a reset security system signal 1106 tothe data security system 620 to start a data security system resetoperation 1108. Upon completion of the data security system resetoperation 1108, the data security system 620 will send a confirmation:data security system reset signal 1110 to the mobile device 610 to set aconfirmation: data security system reset operation 1112 into operation.Thereafter, the mobile device 610 and the data security system 620 arein full operative communication with the data security system 620 reset.

Referring now to FIG. 12, therein is shown an unlock sequencing diagramshowing unlocking the data security system 620 using the server/console640. This diagram shows ability to unlock the data security system 620remotely via the server/console 640. The data security system 620 canreceive commands only from the mobile device 610 over the wirelessconnection. However by setting an “Administrator Unlock” flag on theserver/console 640 console for a specific data security system (usingit's S/N), the data security system application 618 running on themobile device 610 will query the server/console 640 for anyflags/pending requests. When the user connects the data security system620, the data security system application 618 on the mobile device 610will execute a waiting “Administrator Unlock” command. After successfulAdministrator unlock, the user's data is untouched, but the user'spassword is removed (the data security system 620 cannot be unlocked bythe user). The server/console 640 will remove Reset flag for the datasecurity system 620 so it will be not executed next time when the mobiledevice 610 is connected to the data security system 620.

While similar to FIGS. 7-11, after receiving the any command waitingsignal 1100, the server/console 640 performs an unlock 1200 when thereis a command to unlock with an administrator's password. An unlock withan administrator's password signal 1202 is sent to the mobile device610, which provides an unlock with administrator's password signal 1204to the data security system 620 to start the data security systemunlocked operation 804. Thereafter, the mobile device 610 and the datasecurity system 620 are in full operative communication.

Referring now to FIG. 13, therein is shown a change user's passwordsequencing diagram using the server/console 640. This diagram showsability to change User's password for data security system 620 remotelyvia the server/console 640. Even data security system 620 can receivecommands only from the mobile device 610 over the wireless connection,by setting a “Change User's Password” flag on the server/console 640console for a specific data security system (using it's S/N), the datasecurity system application 618 running on the mobile device 610 willquery the server/console 640 for any flags/pending requests. When userwill connect his data security system 620, the data security systemapplication 618 on the mobile device 610 will execute waiting “ChangeUser's Password” command. After successful unlock and changed password,the user's data is untouched and the data security system 620 can beunlocked with new user's password. The server/console 640 will remove“Change User's Password” flag for this data security system 620 so itwill be not executed next time when the mobile device 610 is connectedto the specific data security system.

While similar to FIGS. 7-12, the server/console 640 responds to the anycommand waiting signal 1100 by making a change password determination1300. When there has been a password change at the server/console 640 achange user password signal 1302 is sent to the mobile device 610, whichsends a change user password signal 1304 to the data security system620. Thereafter, the mobile device 610 and the data security system 620are in full operative communication with the new password.

A method of operation of a data security system comprising: providing amobile device with a data security system application for connectivitywith the data security system; starting the data security systemapplication; and maintaining connectivity of the data security systemwith the mobile device.

The method as described above wherein maintaining the connectivitymaintains the connectivity when the data security system is within apredetermined proximity to the mobile device.

The method as described above wherein maintaining the connectivitymaintains the connectivity when the data security system is within apredetermined proximity to the mobile device for a predetermined periodof time.

The method as described above wherein establishing the connectivityincludes using bi-directional communication between the data securitysystem and the mobile device.

The method as described above wherein establishing the connectivityincludes using uni-directional communication between the data securitysystem and the mobile device.

The method as described above further comprising communication betweenthe mobile device with the data security system application and a servercontaining a user management database.

The method as described above further comprising providing securityinformation in a security controller in the data security system.

The method as described above further comprising: providing a serverwith identification of a specified data security system; providing thedata security system with a specific identification; and unlocking thedata security system when the identification of the specified datasecurity system is the same as the specific identification of the datasecurity system.

The method as described above wherein providing a mobile device with thedata security system application provides a data security systemadministrator's application and further includes: setting anadministrator's password in the mobile device; transmitting theadministrator's password from the mobile device to the data securitysystem; and setting the administrator's password in the data securitysystem and unlocking the data security system.

The method as described above further comprising: providing an unlockrequest along with a mobile device identification from the mobile deviceto the data security system; and receiving the unlock request in thedata security system and unlocking the data security system.

The method as described above further comprising: entering a user nameor password in the mobile device; determining when the user name orpassword is valid in a server after receiving the user name or passwordfrom the mobile device; communicating from the server to the mobiledevice when the user name or password is valid; and communicating fromthe mobile device to the data security system when the user name orpassword is valid to unlock the data security system.

The method as described above further comprising: entering a user nameor password in the mobile device; determining when the user name orpassword is valid in a server after receiving the user name or passwordfrom the mobile device; communicating from the server to the mobiledevice when the user name or password is valid; determining when theidentification number is valid in the server after receivingidentification number from the mobile device; and unlocking the datasecurity system through the mobile device when the server determines theidentification number is valid.

The method as described above further comprising: providing a validlocation of the mobile device to a server; determining in the serverwhen the mobile device is in the valid location; and unlocking the datasecurity system through the mobile device when the server determines themobile device is in the valid location.

The method as described above further comprising: providing a currenttime of operation for the data security system at the mobile device to aserver; determining in the server when the mobile device is within thecurrent time; and unlocking the data security system through the mobiledevice when the server determines the mobile device has the currenttime.

The method as described above further comprising: providing a command ina server; providing the command to the mobile device from the server inresponse to a command waiting signal from the mobile device; andperforming the command in the data security system through the mobiledevice when the command is provided from the server.

The method as described above further comprising: providing a changepassword command in a server; providing the change password command tothe mobile device from the server in response to a change passwordsignal from the mobile device; and unlocking the data security systemwith the changed password in the data security system.

The method as described above further comprising connecting the datasecurity system to a host computer for power and to be discoverable bythe host computer.

A data security system comprising: a data security transceiver orreceiver; an authentication subsystem operatively connected to the datasecurity transceiver or receiver; and a storage subsystem connected tothe authentication subsystem.

The system as described above further comprising a security controllerconnected to the data security transceiver or the receiver and to theauthentication subsystem.

The system as described above further comprising a mobile device havinga data security system application operating with the securitycontroller for maintaining connectivity when the data security system iswithin a predetermined proximity to the mobile device.

The system as described above further comprising a mobile device havinga data security system application operating with the securitycontroller for maintaining connectivity when the data security system iswithin a predetermined proximity to the mobile device for apredetermined period of time.

The system as described above further comprising a mobile device havinga mobile transceiver or receiver for maintaining connectivity includesusing bi-directional communication between the data security system andthe mobile device.

The system as described above further comprising a mobile device havinga mobile transceiver or receiver for maintaining connectivity includesusing uni-directional communication between the data security system andthe mobile device.

The system as described above further comprising a wired or wirelessconnection communication between a mobile device with a data securitysystem application and a server containing a user management database.

The system as described above wherein the data security system includesan external communication channel for connection to a host computer.

While the invention has been described in conjunction with a specificbest mode, it is to be understood that many alternatives, modifications,and variations will be apparent to those skilled in the art in light ofthe foregoing description. Accordingly, it is intended to embrace allsuch alternatives, modifications, and variations that fall within thescope of the included claims. All matters set forth herein or shown inthe accompanying drawings are to be interpreted in an illustrative andnon-limiting sense.

What is claimed is:
 1. A method of operation of a data security systemcomprising: providing a wireless device with a data security systemapplication, for execution on the wireless device, for managingconnectivity with the data security system, the data security systemhaving a storage subsystem and a data security transceiver for wirelesscommunication, the wireless device having a device transceiver forwireless communication; receiving, by the data security systemapplication, authentication information from a user to be authenticatedby a server; requesting, by the data security system application andfrom the server, authentication of the user based on the authenticationinformation; in response to the server successfully authenticating theuser, requesting, by the data security system application and from theserver, unlocking of the data security system based on a personalidentification number provided by the user to the data security systemapplication, wherein the unlocking is communicated, from the wirelessdevice to the data security system, via a wireless connection betweenthe data security transceiver and the device transceiver; and when theserver provides an unlock signal to the data security systemapplication, unlocking connectivity to the data security system from thewireless device and enabling access from the wireless device to thestorage subsystem in the data security system.
 2. The method as claimedin claim 1, further comprising: maintaining the connectivity when thedata security system is within a proximity to the wireless device basedon a signal strength measurement of the wireless connection for thewireless device.
 3. The method as claimed in claim 1, furthercomprising: maintaining the connectivity when the data security systemis within a proximity to the wireless device based on a signal strengthmeasurement of the wireless connection for the wireless device for apredetermined period of time.
 4. The method as claimed in claim 1,wherein the wireless connection includes bi-directional communicationbetween the data security system and the wireless device.
 5. The methodas claimed in claim 1, wherein the wireless connection includesuni-directional communication between the data security system and thewireless device.
 6. The method as claimed in claim 1, wherein the servercontains a user management database with user authenticationinformation.
 7. The method as claimed in claim 1, further comprising:providing a security controller in the data security system forcontrolling access to the data security system.
 8. The method as claimedin claim 1, wherein requesting unlocking of the data security systemfurther comprises: providing the server with an identification of thedata security system; and unlocking the data security system when theidentification of the data security system is enabled at the server. 9.The method as claimed in claim 1, wherein providing the wireless devicewith the data security system application further comprises: providing adata security system administrator's application; setting anadministrator's password in the wireless device; transmitting theadministrator's password from the wireless device to the data securitysystem; and setting the administrator's password in the data securitysystem and unlocking the data security system.
 10. The method as claimedin claim 1, wherein requesting unlocking of the data security systemfurther comprises: providing an unlock request along with a deviceidentification from the wireless device to the data security system; andreceiving the unlock request in the data security system and unlockingthe data security system.
 11. The method as claimed in claim 1, whereinthe authentication information includes a user name, or a password, or acombination thereof.
 12. The method as claimed in claim 1, whereinrequesting unlocking of the data security system further comprises:transmitting the personal identification number from the wireless deviceto the server; determining, by the server, when the personalidentification number is valid after receiving the personalidentification number from the wireless device; and unlocking the datasecurity system through the wireless device when the server determinesthe personal identification number is valid.
 13. The method as claimedin claim 1, further comprising: providing a valid location of thewireless device to the server; determining, by the server, when thewireless device is in the valid location; and unlocking the datasecurity system through the wireless device when the server determinesthe wireless device is in the valid location.
 14. The method as claimedin claim 1, further comprising: determining a current time at thewireless device; sending the current time to the server; checking, bythe server, a condition to determine if the current time is within apredefined time range; and unlocking the data security system throughthe wireless device when the server determines the wireless device iswithin the predefined time range.
 15. The method as claimed in claim 1,further comprising: providing a command in the server; providing thecommand to the wireless device, from the server, in response to acommand waiting signal from the wireless device; and performing thecommand in the data security system, through the wireless device, whenthe command is provided from the server.
 16. The method as claimed inclaim 1, further comprising: providing a change password command in theserver; providing the change password command to the wireless device,from the server, in response to a change password signal from thewireless device; and unlocking the data security system with the changedpassword command.
 17. The method as claimed in claim 1, furthercomprising: connecting the data security system to a host computer forpowering the data security system, wherein the data security systembecomes discoverable by the host computer.
 18. The method as claimed inclaim 1, wherein access from the wireless device to the storagesubsystem in the data security system is performed on an externalcommunication channel separate from the wireless connection.
 19. A datasecurity system comprising: a wireless data security transceiver orreceiver; an authentication subsystem operatively connected to thewireless data security transceiver or receiver; and a storage subsystemconnected to the authentication subsystem, wherein the authenticationsubsystem is configured to communicate, via the wireless data securitytransceiver or receiver, with a data security system application on awireless device; wherein the data security system application isconfigured to request, from a server, authentication of a user based onauthentication information provided by the user; wherein, in response tothe server authenticating the user, the data security system applicationis configured to request, from the server, unlocking of the datasecurity system based on a personal identification number provided bythe user and transmitted via the wireless data security transceiver orreceiver from the wireless device to the data security system; wherein,when the server provides an unlock signal to the wireless device, thewireless device sends the unlock signal to the data security system tounlock connectivity to the data security system from the wireless deviceand enable access from the wireless device to the storage subsystem inthe data security system.
 20. The data security system as claimed inclaim 19, further comprising: a security controller connected to thewireless data security transceiver or the receiver and to theauthentication subsystem.
 21. The data security system as claimed inclaim 19, wherein the data security system application is formaintaining connectivity when the data security system is within aproximity to the wireless device based on a signal strength measurementof a wireless connection for the wireless device.
 22. The data securitysystem as claimed in claim 19, wherein the data security systemapplication communicates with a security controller in the data securitysystem for maintaining connectivity when the data security system iswithin a proximity to the wireless device and for locking the datasecurity system when there is no data read/write activity for apredetermined period of time.
 23. The data security system as claimed inclaim 19, wherein a wireless connection includes bi-directionalcommunication between the data security system and the wireless device.24. The data security system as claimed in claim 19, wherein a wirelessconnection includes uni-directional communication between the datasecurity system and the wireless device.
 25. The data security system asclaimed in claim 19, further comprising: an external communicationchannel for connection to a host computer.