Apparatus, system, and method for deliberately preventing unauthorized access to data stored in a non-volatile memory device

ABSTRACT

An apparatus, system, and method for deliberately preventing unauthorized access to data stored in a non-volatile memory device are disclosed. In one embodiment, an apparatus is configured to destroy the data stored on the memory device. The apparatus may comprise a printed circuit board (PCB), a non-volatile memory circuit electrically connected to the PCB, and a housing of the PCB. The non-volatile memory circuit may be scored to facilitate deliberately breaking the non-volatile memory circuit in response to an external force. In a further embodiment, the apparatus may comprise an electrical erase circuit powered by a power source connected to a switch. The electrical erase circuit may be configured to non-destructively erase the non-volatile memory circuit in response to activation of the switch. The system may further include a leverage tool configured to provide leverage to a non-volatile memory device affected by an external force.

PRIORITY APPLICATIONS

This application is a divisional application that claims prioritybenefit of U.S. patent application Ser. No. 10/969,834, filed Oct. 21,2004 now U.S. Pat. No. 7,519,763, by James Gordon McLean, titled“Apparatus, System, and Method for Deliberately Preventing UnauthorizedAccess to Data Stored in a Non-volatile Memory Device,” which isincorporated herein by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates to portable external memory devices.Specifically, the invention relates to apparatus, systems, and methodsfor deliberately preventing access to data stored in a non-volatilememory device.

2. Description of the Related Art

Computer users frequently use portable storage devices such as universalserial bus (USB) keys and Smart Cards for storage and transfer ofcomputer data. Portable storage devices interoperate with host computersto store and retrieve data. Data is typically stored on the portablestorage device in non-volatile memory. A portable storage device may bedisconnected from a power source such as a host computer without losingdata stored in the non-volatile memory. Portable storage devices assistin many activities, including data transport, data backup, and datasecurity.

Data security is perhaps one of the most important uses of portablestorage devices. Large amounts of confidential data may be downloadedfrom a host computer to a portable storage device for transport. Duringtransfer, the data does not travel over the Internet and is notaccessible by networking technology. Once transport is complete, theportable storage device is connected to a host computer and the user canaccess the stored data. The portable storage device may be disconnectedfrom the host computer and kept in a vault or other secure location,completely isolated from a computer network.

Sensitive files such as a company's private key, confidential designs,encryption algorithms, and strategic plans may be securely stored onportable storage devices. By storing data only onto a portable storagedevice, security issues related to storing sensitive data on a harddrive can be avoided. Even when a computer system deletes files from ahard drive, the data may be recovered from the drive with sophisticateddata recovery programs and techniques.

Portable storage devices may be used to facilitate secure transport ofdata from one computer to another. It is often convenient to save datafrom a host computer onto a portable storage device for transport.Although network transport across the Internet or across a companyintranet may also be used, many people prefer to use a portable storagedevice for transporting important files in certain situations. As anexample, an employee taking a trip to a new city may not know where theemployee will be working in the new city. It would be impossible to sendthe data to a destination computer that is unknown at the beginning ofthe trip. By carrying the important data on a portable storage device,the data travels with the employee and is available at whatever computerthe employee finally uses.

Portable storage devices also serve data backup purposes. A home usermay store a backup copy of financial data onto a portable storage deviceas part of a data protection plan. Portable storage devices usenon-volatile memory technologies that do not lose data due to powersurges or power outages. In addition, archival copies of data files maybe stored on portable storage devices. Modern portable storage devicesare small and may hold many hundreds of megabytes worth of data.Multiple versions of a single archive may be stored on a single portablestorage device.

As portable storage devices become more common, administrators worrythat data stored on the portable storage devices may be stolen ormisused. Certain conventional devices provide means for destroying dataon portable storage devices in response to tampering with the device.Efforts to disassemble devices cause certain devices to becomenon-functional. However, these conventional devices do not address theneed to deliberately quickly, and actively destroy data on a portablememory device.

Other conventional devices facilitate the destruction of circuitry usedfor memory access. Such devices may destroy the circuitry normally usedto access data on the device or may even partially destroy a chip usedfor storing data on the device. However, such devices do not ensure thatmemory stored in the memory chip itself will be completely destroyed.Individuals intent on gaining unauthorized access to data on such amemory device may remove the memory chip and recover portions of thedata using sophisticated probing equipment. These portions of data maybe sufficient to disclose confidential information the portable storagedevice owner believed was destroyed. These devices also do not allow forthe manual, deliberate, and logical erasing of data on the portablestorage device such that the device may be reused in the future.

As an example, an embassy data officer may be charged with thesafekeeping of embassy data files. The data officer may safeguardportable storage devices containing encryption algorithms, top secrettreaties, and strategic operations plans. The data officer would becharged with destroying the portable data devices if the embassy'ssecurity is threatened. The data officer would need to quickly andeffectively either erase the devices or destroy them in such a way thatno data would be retrievable from the devices. The data officer may needto be able to do this quickly without use of a host computer.

As another example, a retail movie rental company may store movies,games, or other digital content on portable storage devices for use bycustomers. When the portable storage device is returned, or when a titleis taken out of circulation (i.e., Due to an expired licensingagreement), it would be important to prevent the device from being usedagain if the device is discarded to protect the copyrighted movie on thedevice. This could be done either by erasing the device or by destroyingthe memory chips on the device. The clerk who receives the returnedrental unit may need to disable the portable storage device quickly andwithout the use of a host computer.

Under ordinary circumstances, a portable memory device is returned tothe host computer for data erasure. Any host computer capable of writingdata to a portable memory device can also erase the data on a portablememory device. This process can be time consuming. The host computerneeds to be powered on. The computer needs to individually erase eachdevice. Complete erasure requires the host computer to access allstorage bytes on the device. However, some situations require that aportable memory device be erased quickly and securely without the use ofa host computer. The embassy data officer may need to erase or disableseveral devices before an impending coup. The video rental clerk mayneed to quickly erase or disable a rentable portable storage device.Following the grading of a test stored on several hundred USB memorykeys, a professor may want to erase the memory keys quickly anddeliberately to guard test answers from inadvertent disclosure.

In each of these scenarios, the ability to deliberately and quicklydestroy the data in a portable memory device without the use of a hostcomputer is highly desirable. Consequently, a need exists for a process,apparatus, and system that allow for the quick, deliberate, andefficient prevention of access to data stored on portable memory deviceswithout the assistance of a host computer. Such a system must eithercompletely erase the memory on a portable storage device or completelydestroy the memory circuitry that holds the data on such a device insuch a way that no data may be retrieved from the device. Beneficially,such a process, apparatus, and system would reduce the time needed toclear such devices and ensure that data on such devices not be usedimproperly.

SUMMARY OF THE INVENTION

The present invention has been developed in response to the presentstate of the art, and in particular, in response to the problems andneeds in the art that have not yet been fully solved by currentlyavailable portable non-volatile memory devices. Accordingly, the presentinvention has been developed to provide an apparatus, system, and methodfor deliberately preventing unauthorized access to data stored in anon-volatile memory device that overcome many or all of theabove-discussed shortcomings in the art.

An apparatus for deliberately preventing unauthorized access to datastored in a non-volatile memory device, in one embodiment, is configuredto destroy the data stored on the memory device. The apparatus maycomprise a printed circuit board (PCB), a non-volatile memory circuitelectrically connected to the PCB, and a housing of the PCB. Thenon-volatile memory circuit may be scored to facilitate deliberatelybreaking the non-volatile memory circuit in response to an externalforce. In addition, the PCB and the housing may also be scored.

The apparatus, in a further embodiment, may be configured tonon-destructively erase the non-volatile memory circuit. The apparatusmay include a power source, a switch, and an electrical erase circuitdisposed on the PCB. The electrical erase circuit may be electricallyconnected to the non-volatile memory circuit. In response to activationof the switch, the electrical erase circuit may supply a signal to thenon-volatile memory circuit that non-destructively erases thenon-volatile memory circuit. In one embodiment, the electrical erasecircuit overwrites the non-volatile memory circuit by writing a firstand second data pattern to the non-volatile memory circuit. Theapparatus is further configured, in one embodiment, to include acomputer interface disposed on the PCB that enables a host computer tostore and retrieve data on the non-volatile memory circuit.

A system of the present invention is also presented for preventingunauthorized access to data stored in a non-volatile memory device. Thesystem may include a host computer, a computer interface, and anon-volatile memory device. The non-volatile memory device may beconfigured to store and retrieve data from the host computer through thecomputer interface.

In addition, the non-volatile memory device may include a PCB, ahousing, and a non-volatile memory circuit electrically connected to thePCB. The non-volatile memory circuit may include a first scoringconfigured to allow the memory circuit to readily break along the firstscoring in response to an external force. A second scoring on the PCBand a third scoring on the housing may be aligned with the first scoringsuch that the PCB and the housing break along the second and thirdscorings respectively in response to the external force. In certainembodiments, the system may further include a switch, a power source,and an electrical erase circuit configured to supply a signal to thenon-volatile memory circuit that non-destructively erases thenon-volatile memory circuit in response to activation of the switch.

The system may further include a leverage tool to securely retain thenon-volatile memory device while an external force is applied to thedevice. The leverage tool may include a top surface and an opening toreceive the non-volatile memory device. In one embodiment, the topsurface comprises a fulcrum, and the opening aligns the first, second,and third scorings with the fulcrum such that the application of theexternal force to the non-volatile memory device creates a leveragedforce that separates the scorings at the fulcrum.

In one embodiment, an apparatus for deliberately preventing unauthorizedaccess to data stored on a non-volatile memory device is provided. Theapparatus includes a non-volatile memory such as a magnetic strip, barcode, Radio Frequency Identification (RFID) tag or the like. Thenon-volatile memory includes a first scoring configured such that thenon-volatile memory readily breaks along the first scoring in responseto an external force. The apparatus further includes a planar housingconfigured to support the non-volatile memory. The housing includes asecond scoring aligned with the first scoring, the first scoring andsecond scoring running transverse to the edges of the housing.

Reference throughout this specification to features, advantages, orsimilar language does not imply that all of the features and advantagesthat may be realized with the present invention should be or are in anysingle embodiment of the invention. Rather, language referring to thefeatures and advantages is understood to mean that a specific feature,advantage, or characteristic described in connection with an embodimentis included in at least one embodiment of the present invention. Thus,discussion of the features and advantages, and similar language,throughout this specification may, but do not necessarily, refer to thesame embodiment.

Furthermore, the described features, advantages, and characteristics ofthe invention may be combined in any suitable manner in one or moreembodiments. One skilled in the relevant art will recognize that theinvention can be practiced without one or more of the specific featuresor advantages of a particular embodiment. In other instances, additionalfeatures and advantages may be recognized in certain embodiments thatmay not be present in all embodiments of the invention.

These features and advantages of the present invention will become morefully apparent from the following description and appended claims, ormay be learned by the practice of the invention as set forthhereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

In order that the advantages of the invention will be readilyunderstood, a more particular description of the invention brieflydescribed above will be rendered by reference to specific embodimentsthat are illustrated in the appended drawings. Understanding that thesedrawings depict only typical embodiments of the invention and are nottherefore to be considered to be limiting of its scope, the inventionwill be described and explained with additional specificity and detailthrough the use of the accompanying drawings, in which:

FIG. 1 is a side cross-section view of one embodiment of a conventionalnon-volatile memory device;

FIG. 2 is a schematic block diagram illustrating one embodiment of asystem for deliberately preventing unauthorized access to data stored ina non-volatile memory device in accordance with the present invention;

FIG. 3 is an electrical diagram of one embodiment of an electrical erasecircuit in accordance with the present invention;

FIG. 4 is a top plan view of one embodiment of an apparatus fornon-destructively erasing data within a non-volatile memory device inaccordance with the present invention;

FIG. 5 is a side cross-section view of an alternative embodiment of anapparatus for deliberately preventing unauthorized access to data storedin a non-volatile memory device in accordance with the presentinvention;

FIG. 6 is a perspective view of one embodiment of an apparatus fordeliberately preventing unauthorized access to data stored in anon-volatile memory device inserted into a leverage tool in accordancewith the present invention;

FIG. 7 is a perspective view of one embodiment of an apparatus fordeliberately preventing unauthorized access to data stored on anon-volatile memory device configured as a smart card; and

FIG. 8 is a perspective view of one embodiment of a non-volatile memorydevice configured as a smart card inserted into a leverage tool inaccordance with the present invention.

DETAILED DESCRIPTION OF THE INVENTION

Reference throughout this specification to “one embodiment,” “anembodiment,” or similar language means that a particular feature,structure, or characteristic described in connection with the embodimentis included in at least one embodiment of the present invention. Thus,appearances of the phrases “in one embodiment,” “in an embodiment,” andsimilar language throughout this specification may, but do notnecessarily, all refer to the same embodiment.

Furthermore, the described features, structures, or characteristics ofthe invention may be combined in any suitable manner in one or moreembodiments. In the following description, numerous specific details areprovided, such as examples of programming, software modules, userselections, network transactions, database queries, database structures,hardware modules, hardware circuits, hardware chips, etc., to provide athorough understanding of embodiments of the invention. One skilled inthe relevant art will recognize, however, that the invention can bepracticed without one or more of the specific details, or with othermethods, components, materials, and so forth. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring aspects of the invention.

FIG. 1 depicts a non-volatile memory device 110 suitable for use withthe present invention. The memory device 110 may comprise a solid-statedevice configured to store data in persistent memory. Many differenttypes of non-volatile memory devices exist today including Smart Cardsand Universal Serial Bus (USB) memory devices. Although the presentinvention is described in relation to a USB memory device 110, those ofskill in the art will recognize various other types of non-volatilememory devices 110 compatible with the present invention.

The non-volatile memory device 110 may include a printed circuit board(PCB) 112, a non-volatile memory circuit 114 disposed on the PCB 112, ahousing 118, and a computer interface 120. The PCB 112 may be agenerally planar, rectangular piece of plastic with attached electricallines that interconnect to form an electrical circuit. Typically, thePCB 112 includes pre-formed holes that receive pins of electricalcomponents that may be soldered to the PCB 112 to form an electricalcircuit. The PCB 112 may comprise a thin plastic substrate encasingelectrical leads.

Various electrical components may be connected to the electrical circuitvia the PCB 112. In conventional non-volatile memory devices 110, anon-volatile memory circuit 114 is typically connected to the PCB 112and stores computer data. The non-volatile memory circuit 114 storesdata without relying on external or internal power sources to maintainthe integrity of the data. In one embodiment, the non-volatile memorycircuit 114 comprises a Static Random-Access Memory (SRAM), flash memorychip or other type of electrically-erasable programmable read onlymemory (EEPROM) device. Flash memory enables rapid storage and retrievalof data. The non-volatile memory circuit 114 may be a single chipdisposed on the PCB 112, or a combination of chips and circuitrydisposed on the PCB 112. Generally, a host computer with a power source(not shown) is required to write data to and retrieve data from thenon-volatile memory circuit 114. The host computer typically connects tothe electrical circuit of the PCB 112 through the computer interface120.

The computer interface 120, in the depicted embodiment, comprises a USBinterface that can be inserted into a USB port of a host computer.Alternatively, the computer interface 120 may comprise a Smart Cardreader interface or other type of computer interface suitable forinteracting with a non-volatile memory device 110. Consequently, datafiles may be effectively transmitted between the host computer and thenon-volatile memory device 110. Data stored on the host computer can betransferred to the non-volatile memory device 110 and vice versa.Typically, the non-volatile memory device 110 may be disconnectedphysically and electrically from the host computer without loss of datastored on the non-volatile memory circuit 114.

The non-volatile memory circuit 114 and PCB 112 are generally encased ina housing 118. The housing 118 protects the delicate circuit wires andmemory chips attached to the PCB 112. In certain embodiments, thehousing 118 comprises a hard plastic shell similar to a small enclosedcontainer. Alternatively, as in the case of a Smart Card interface 120,the housing 118 may comprise a flat plastic card. In one embodiment, thePCB 112 is connected to the housing 118 by housing mounts 122, which maybe extensions of the housing 118. The housing mounts 122 maintain thePCB 112 in a fixed position conducive to interaction with a hostcomputer. Various elements discussed in relation to FIG. 1 may beincluded in the description of FIGS. 2-6.

FIG. 2 illustrates one embodiment of a system 200 for deliberatelypreventing unauthorized access to data stored in a non-volatile memorydevice 110. The system 200 may include a host computer 202, a computerinterface 120, and a non-volatile memory device 110. The non-volatilememory device 110 may include a PCB 112, a non-volatile memory circuit114, a power source 206, a switch 208, and an electrical erase circuit210. As discussed previously, the host computer 202 accesses thenon-volatile memory circuit 114 via the computer interface 120. When ahost computer 202 interfaces a non-volatile memory device 110, the hostcomputer 202 generally provides the electrical signals required to eraseor store data on the non-volatile memory circuit 114.

In order to permit the user to alter the non-volatile memory circuit 114without the use of a host computer 202, the system 200 may providealternative ways of affecting the non-volatile memory circuit 114. Inthe depicted embodiment, an electrical current provided by a powersource 206 located within the non-volatile memory device 110 powers anelectrical erase circuit 210 that alters the data stored on thenon-volatile memory circuit 114. The electrical erase circuit 210preferably operates when connected to the power source 206 through theswitch 208. Alternatively, the power source 206 may be directlyconnected to the electrical erase circuit 210; in this configuration aninstantaneous change in state of switch 208 may create a signal whichactivates the function of the electrical erase circuit 210.

The power source 206 may be a battery known in the art. The negativeterminal of the battery may be connected to ground while the positiveterminal of the battery may be connected to the switch 208. Preferably,the battery provides sufficient energy to power the electrical erasecircuit 210, but not enough power to overload the circuitry in thenon-volatile memory device 110.

The activation of the switch 208 preferably requires a deliberate actionof the user to intentionally erase data on the non-volatile memorydevice 110. When the switch 208 is not activated, the non-volatilememory device 110 remains unaffected by the internal power source 206.However, when the switch 208 is intentionally activated, or closed, theelectrical erase circuit 210 preferably applies an electrical signal tothe non-volatile memory circuit 114 to non-destructively erase the datain the non-volatile memory circuit 114.

“Non-destructively erase” as used herein means that the data stored onthe non-volatile memory device 110 is overwritten in such a way that theoriginal data is no longer accessible and also that the underlyingmemory circuitry remains usable. Some erasing techniques apply voltagesthat destroy the underlying circuitry and make that circuitry unusablefor future memory storage. “Non-destructively erase” indicates that theoriginal stored data is no longer retrievable, but that the non-volatilememory device 110 itself may be reused for storing data. The electricalsignals used to non-destructively erase the non-volatile memory circuit114 will be discussed in greater detail in relation to FIGS. 3-5.

In one embodiment, the electrical erase circuit 210 alters thenon-volatile memory circuit 114 by transmitting a signal configured toreset the non-volatile memory circuit 114. In an alternative embodiment,the signal is configured to logically overwrite the data in thenon-volatile memory circuit 114. Preferably, the signal is configured tocause the reset or overwrite of the non-volatile memory circuit 114without damaging any electrical circuitry.

FIG. 3 illustrates one embodiment of an electrical erase circuit 210configured to logically overwrite the data stored in the non-volatilememory circuit 114. The electrical erase circuit 210 comprises asequence controller 340; logical patterns 342, 344, 346; data lines 352;and a multiplexer 348. In certain embodiments, the electrical erasecircuit 210 logically overwrites memory in the non-volatile memorydevice 110 by writing one or more data patterns to the non-volatilememory circuit 114. The data patterns may include, by way of example, apredefined pattern 342, a simple zeros pattern 344, and a simple onespattern 346, and/or a combination of these. The data patterns 342, 344,346, may be communicated to the non-volatile memory circuit 114 acrossthe data lines 352. In certain embodiments, the data patterns areregulated by the sequence control 340 and a clock line 354. Themultiplexer 348 may combine the various patterns into a single signalthat is sent to the non-volatile memory circuit 114. Alternatively, arandomly-generated pattern may be created in real time such that anunpredictable and unrepeatable set of data replaces the original data onthe device. The precise design of such logic circuitry implemented mayvary and is well known to those skilled in the art.

In one embodiment, the switch 208 sends a signal to the sequence control340. The sequence control 340 may be programmed to send a series ofdifferent data sequences to each memory location within the non-volatilememory circuit 114. Consequently, the sequence control 340 may initiatethe logical pattern component 342 which sends a pre-programmedcombination of ones and zeros to the multiplexer 348 which in turncommunicates the pattern to each memory location in the non-volatilememory circuit 114. Additionally, the sequence control 340 may similarlysignal the zeros component 344 and one component 346 to respectivelysend a series of all zeros and ones to the memory locations.

Preferably, the sequence control 340 ensures that each memory locationof the non-volatile memory circuit 114 is overwritten at least once suchthat all data on the non-volatile memory circuit 114 is completelydestroyed. The multiplexer 348 ensures that each memory location isoverwritten. In this manner, complete logical destruction of each datavalue previously stored is accomplished.

FIG. 4 illustrates in further detail one embodiment of a non-volatilememory device 410 comprising an electrical erase circuit 210 fornon-destructively erasing a non-volatile memory circuit 114. Thenon-volatile memory device 410 comprises a PCB 112, a non-volatilememory circuit 114, a computer interface 120, and a housing 118. Thenon-volatile memory device 410 further includes a power source 206, aswitch 208, an electrical erase circuit 210, and a variety of electricalsignals 422, 424, 426. In certain embodiments, the electrical erasecircuit 210 applies an electrical signal to the non-volatile memorycircuit 114 over a plurality of data lines including a reset line 422,and a data line 426. The clock line 424 ensures synchronized operation.In one embodiment of the invention, the electrical erase circuit 210erases the data in the non-volatile memory circuit 114 by applying anappropriate voltage to the reset line 322 of the non-volatile memorycircuit 114 to cause the memory to be cleared. The voltage strength isconfigured to perform the reset without damaging the non-volatile memorycircuit 114.

The operation and interaction of these elements are similar to theinteractions of the corresponding elements described above with respectto FIG. 3. Namely, if necessary, a user deliberately activates theswitch 208. Power is then supplied by the power source 206 to theelectrical erase circuit 210. In one embodiment, the electrical erasecircuit 210 may simply raise the reset line 422 high. Within thenon-volatile memory circuit 114, raising the reset line 422 high maycause a one value to be written to each memory location to erase thememory. Alternatively, as discussed above, more complicated erase datapatterns may be written to the non-volatile memory circuit 114.

FIG. 5 illustrates one embodiment of a non-volatile memory device 510with a scored PCB 112, non-volatile memory circuit 114, and housing 118.The scoring facilitates destroying the non-volatile memory device 510.The non-volatile memory device 510 also enables the user to deliberatelyprevent unauthorized access to data stored in the non-volatile memorydevice 510 by non-destructively erasing the non-volatile memory circuit114 as desired.

In one embodiment, an electrical erase circuit 210 is disposed on thePCB 112 and is electrically connected to the non-volatile memory circuit114. A battery 206 that provides power to the electrical erase circuit210 through electrical switch 208 may also be disposed on the PCB 112.The electrical switch 208 may be formed as a button extending throughthe housing 118 as shown.

In a further embodiment of the switch 208, a cover 532 may extend overthe exposed portion of the switch 208 to prevent unintentionalactivation of the switch 208. The cover 532 must be removed before theswitch 208 may be activated. The cover 532 may include a hinge 534 tofacilitate exposing the switch 208. In an alternative embodiment (notshown), the electrical switch 208 may rest just under the housing 118 insuch a way that squeezing the housing 118 will activate the switch 208.In a further alternative embodiment (not shown) the cover 532 maycomprise a removable shield or tab that may be permanently broken off orremoved to attain access to the switch 208. The operation of the switch208, the electrical erase circuit 210, and the battery 206 to erase thedata in the non-volatile memory circuit 114 is similar to that describedabove with respect to FIGS. 2, 3, and 4.

FIG. 5 further illustrates a non-volatile memory circuit 114 shown as asingle computer chip disposed on the PCB 112 and logically connected tothe computer interface 120. In one embodiment, the non-volatile memorycircuit 114 is manufactured with a first scoring 552. The first scoring552 is configured such that the non-volatile memory circuit 114 willbreak along the scoring 552 in response to the application of anexternal force. Physically breaking the memory circuit 114 severelyinhibits retrieval of data from the memory circuit 114, ensuringprotection of any data stored in the memory circuit 114.

The non-volatile memory device 510 may also be manufactured with asecond scoring 554 aligned with the first scoring 552. The secondscoring 554 may be on either or both sides of the PCB 112 to allow thePCB 112 to break in response to an external force. Similarly, thehousing 118 may include a third scoring 556 aligned with the first andsecond scorings 552, 554, which allows the housing 118 to break inresponse to an external force. The alignment of the three scorings 552,554, 556 allows all three scorings 552, 554, 556 to readily break by theapplication of a single external force, ensuring that data on the memorydevice 510 is protected from access by unauthorized persons.

The housing 118 may further be configured with housing tabs 530 alignedand positioned just above or below the various scorings 552, 554, 556already mentioned. The tabs 530 facilitate alignment of the scorings552, 554, 556 with structures for breaking the device 510 and aredescribed in greater detail in relation to FIG. 6.

FIG. 5 as illustrated depicts two methods for preventing unauthorizedaccess to data stored in the non-volatile memory circuit 114. Asdescribed above, one method configures the memory circuit 114 to readilybreak along a scoring 552 in response to an external force. The secondmethod non-destructively purges memory through the application of asignal to the non-volatile memory circuit 114. An embodiment of theinvention may implement one or both of these methods to preventunauthorized access to data stored in the non-volatile memory device.

Those of skill in the art will readily recognize that a non-volatilememory device 510 may take various shapes forms and configurationsincluding, but not limited to, pen drives, USB drives, smart cards, andthe like. The present invention is intended to extend to all suchdevices and is defined by the claims that follow.

FIG. 6 illustrates one embodiment of a non-volatile memory device 610for insertion into a leverage tool 620. The non-volatile memory device610 may be similar to the non-volatile memory device 510 of FIG. 5.

The leverage tool 620 is formed with a top surface 606. The top surface606 has an opening 604 sized to allow the non-volatile memory device 610to be inserted into the opening 604. The non-volatile memory device 610has optional depth tabs 530 attached to the outer surface of the housing118 and aligned with the first, second, and third scorings 552, 554,556. As the non-volatile memory device 114 is inserted into the opening604, the depth of the insertion is controlled by the depth tabs 530 toensure that the scorings 552, 554, 556 are aligned with the top surface606 of the leverage tool 620.

The edge formed by the opening 604 and the top surface 606 comprises afulcrum 608. By applying a lateral force to the exposed portion of thenon-volatile memory device 610, a load is created across the scorings552, 554, 556 against the fulcrum 608. By a applying an appropriateforce, the housing 118, the PCB 112, and the non-volatile memory circuit114 readily break along the scorings 552, 554, 556. In certainembodiments, the scorings 552, 554, 556 are positioned within thenon-volatile memory device 610 such that they form an oblique anglerelative to the geometry of the device 610. In other words, the scorings552, 554, 556, extend transverse to the sides of the device 610. In thismanner, the probability that the device 610 will be accidentally damagedin normal use is reduced.

In an alternative embodiment, the lateral force may be applied by alateral arm (not shown) pivotally connected to the top surface 606. Thelateral arm may be used as a lever itself. An operator moves the lateralarm toward the exposed section of the non-volatile memory device 610.When the lateral arm contacts the non-volatile memory device 610, thedevice 610 receives the force of the lateral arm and readily breaksalong the scorings 552, 554, 556.

In another embodiment, an insertion stop 632 is positioned in theopening 604 to further control the insertion depth of the non-volatilememory device 610. The insertion stop 632 may be the bottom of theopening 604 or a separate stop attached to the side of the opening 604to ensure that the memory device 610, when inserted, is positioned withthe scorings 552, 554,556 aligned with the top surface 606 of theleverage tool 620.

FIG. 7 illustrates one embodiment of a non-volatile memory device 710 inaccordance with the present invention embodied as a smart card 710. Thesmart card 710 includes a PCB 712, a non-volatile memory circuit 714,and a housing 718. The PCB 712, non-volatile memory circuit 714, andhousing 718 function in substantially the same manner as similarcomponents described in relation to FIGS. 2-5. However, the PCB 712,non-volatile memory circuit 714, and housing 718 are particularlyadapted for use in a smart card form factor. For example, the housing718 may comprise two thin plastic substrates welded or glued together.The non-volatile memory circuit 714 may include user identificationand/or authorization data.

Optionally, the smart card 710 may include other identification featuressuch as a photograph 720, an optical encoding feature 730, amagnetically encoded strip 740, an RFID tag 750, and the like.Preferably, one or more of these features 720, 730, 740, 750 areconfigured with a scoring or pre-stress line that is in alignment with ageneral scoring line 760. As discussed above, application of minimalpressure (bending the card 710) along the scoring line 760 breaks ordisables the features that include the scoring or pre-stress line.

In one embodiment, the card 710 includes an electrical erase circuit722, power supply 706, switch 708. These components function insubstantially the same manner as similar components described above inrelation to FIG. 2. In this manner, sensitive data stored in thenon-volatile memory circuit 714 can be completely erased when necessary.

FIG. 8 illustrates an alternative embodiment of a leverage tool 820configured for use with a smart card 710 in accordance with the presentinvention. The leverage tool 820 is configured to operate in a similarto that to the leverage tool 620 illustrated in FIG. 6.

The leverage tool 820 includes a top surface 830 having an opening 840sized and configured to allow the non-volatile memory device 710 to beinserted. Preferably, the opening is angled and of a depth such thatinsertion of a smart card 710 aligns the score line 760 with the topsurface 830 of the tool 820. A lateral force may be applied as describedabove to break the card 710 along the score line 760.

Additionally, the leverage tool 820 may incorporate an electrical erasecircuit 822. The electrical erase circuit 822 may include a power supply824, a switch 826, and an erase device 828 (coiled wire, or magneticpole). In one embodiment, the electrical erase circuit 822 comprises anelectromagnet 832. The electromagnet 832 may be of sufficient strengthto erase data on a magnetic strip 740 at about the same time as the card710 is physically destroyed. The switch 826 may sense the insertion of acard 710 and energize the electromagnet 832. Alternatively, a permanentmagnet may be used in place of the electromagnet 832. Preferably, theopening 840 is deep enough to position all of the magnetic strip 740 inclose proximity to the erase device 828.

The present invention may be embodied in other specific forms withoutdeparting from its spirit or essential characteristics. The describedembodiments are to be considered in all respects only as illustrativeand not restrictive. The scope of the invention is, therefore, indicatedby the appended claims rather than by the foregoing description. Allchanges which come within the meaning and range of equivalency of theclaims are to be embraced within their scope.

What is claimed is:
 1. A system for deliberately preventing unauthorizedaccess to data stored in a non-volatile memory, the system comprising: ahost computer; a computer interface connected to the host computer foraccessing data; a non-volatile memory device configured to store andretrieve data from the host computer through the computer interface, thenon-volatile memory device comprising a printed circuit board (PCB); anon-volatile memory chip electrically connected to the PCB, said memorychip comprising a first scoring, the non-volatile memory chipmanufactured with the first scoring, the first scoring positioned on thenon-volatile memory chip to allow the memory chip to readily break alongthe first scoring in response to an external force, wherein the firstscoring is positioned such that breaking the non-volatile memory circuitalong the first scoring renders the non-volatile memory chip inoperableand inhibits retrieval of data from the non-volatile memory chip; ahousing configured to house the PCB; and tabs attached to an outersurface of the housing and positioned to control the insertion depth ofthe memory device into an opening to ensure desired alignment of thescorings and the top surface; and a leverage tool having a top surfaceand an opening configured to receive the non-volatile memory devicereadily such that the application of the external force to thenon-volatile memory device creates a leveraged load causing a breakacross the first scoring, wherein the PCB comprises a second scoringaligned with the first scoring such that the PCB readily breaks alongthe second scoring in response to the external force, wherein breakingthe PCB renders the PCB inoperable, and wherein the housing comprises athird scoring aligned with the first scoring such that the housingreadily breaks along the third scoring in response to the externalforce.
 2. The system of claim 1, wherein the top surface comprises afulcrum and the opening is configured to align the first, second, andthird scorings with the fulcrum such that the application of theexternal force to the non-volatile memory device creates a leveragedforce that separates the scorings at the fulcrum.
 3. The system of claim1, wherein the opening and the housing are jointly keyed to permit asingle orientation of the housing during insertion into the opening. 4.The system of claim 1, wherein the non-volatile memory chip is disposedon and attached to the PCB.
 5. The system of claim 1, wherein the secondscoring is positioned at a same distance as the first scoring along alength of the housing.
 6. The system of claim 1, wherein the thirdscoring is positioned at the same distance as the first and secondscorings along a length of the housing.
 7. The system of claim 1,wherein the non-volatile memory chip comprises an electrically-erasableprogrammable read only memory (EEPROM) chip.
 8. The system of claim 1,wherein the non-volatile memory chip comprises a flash memory chip. 9.The system of claim 1, wherein the non-volatile memory device comprisesa universal serial bus (USB) key.
 10. An apparatus for deliberatelypreventing unauthorized access to data stored on a non-volatile memorydevice, the apparatus comprising: a non-volatile memory chip comprisinga first scoring, the non-volatile memory chip manufactured with thefirst scoring, the first scoring positioned on the non-volatile memorychip such that the non-volatile memory chip readily breaks along thefirst scoring in response to an external force, wherein the firstscoring is positioned such that breaking the non-volatile memory alongthe first scoring renders the non-volatile memory inoperable andinhibits retrieval of data from the non-volatile memory chip; a planarhousing configured to support the non-volatile memory chip, the housingcomprising a second scoring aligned with the first scoring, the firstscoring and second scoring running transverse to the edges of thehousing; and tabs attached to an outer surface of the housing andpositioned to control insertion depth of the memory device into anopening, wherein the tabs align with the first and second scorings tofacilitate breaking the memory device at the first and second scoringswhen the memory device is inserted into the opening to a depth of thetabs and a force perpendicular to the opening is applied to a portion ofthe memory device external to the opening, wherein the opening is sizedto accept the housing of the memory device below the tabs and comprisesa rigid material to oppose the force applied to the memory device. 11.The apparatus of claim 10, wherein the second scoring is positioned at asame distance as the first scoring along a length of the housing. 12.The apparatus of claim 11, wherein the non-volatile memory chip isdisposed on and attached to a PCB, wherein the PCB comprises a thirdscoring positioned at the same distance as the first and second scoringsalong the length of the housing such that the PCB and the housingreadily break along the third scoring in response to the external force.13. The apparatus of claim 10, wherein the non-volatile memory chipcomprises an EEPROM chip.
 14. The apparatus of claim 10, wherein thenon-volatile memory chip comprises a flash memory chip.
 15. Theapparatus of claim 10, wherein the non-volatile memory device comprisesa universal serial bus (USB) key.
 16. A system for deliberatelypreventing unauthorized access to data stored in a non-volatile memory,the system comprising: a host computer; a computer interface connectedto the host computer for accessing data; a non-volatile memory deviceconfigured to store and retrieve data from the host computer through thecomputer interface, the non-volatile memory device comprising a printedcircuit board (PCB), a non-volatile memory chip electrically connectedto the PCB, said memory chip comprising a first scoring configured toallow the memory chip to readily break along the first scoring inresponse to an external force, wherein breaking the non-volatile memorycircuit along the first scoring renders the non-volatile memory circuitinoperable, and a housing configured to house the PCB; and a leveragetool having a top surface and an opening configured to receive thenon-volatile memory device readily such that the application of theexternal force to the non-volatile memory device creates a leveragedload causing a break across the first scoring; wherein the PCB comprisesa second scoring aligned with the first scoring such that the PCBreadily breaks along the second scoring in response to the externalforce, wherein breaking the PCB renders the PCB inoperable, and whereinthe housing comprises a third scoring aligned with the first scoringsuch that the housing readily breaks along the third scoring in responseto the external force; and tabs attached to an outer surface of thehousing and positioned to control the insertion depth of the memorydevice into the opening to ensure desired alignment of the scorings andthe top surface.