Module with embedded wireless user authentication

ABSTRACT

Methods, systems, and computer programs are presented for a self-encrypting device (SED) incorporated into a host system. In one example, the host system includes a memory, a processor, a data channel in communication with the memory and the processor, and the SED. The SED comprises an authentication subsystem, a storage subsystem that stores encrypted data that is encrypted with an encryption key provided by the authentication subsystem, a radio frequency (RF) transceiver, and a data interface in electrical contact with the data channel. The data interface is locked from sending and receiving data until the SED is unlocked by the authentication subsystem with user-authentication information received via the RF transceiver.

CLAIM OF PRIORITY

This patent application is a Continuation Application of U.S. patentapplication Ser. No. 16/103,979, entitled “Self-Encrypting Module withEmbedded Wireless User Authentication,” filed on Aug. 16, 2018, which isa continuation-in-part application of U.S. patent application Ser. No.14/987,749, entitled “Data Security System with Encryption,” filed onJan. 4, 2016, which is a continuation-in-part of U.S. patent applicationSer. No. 12/680,742 filed Mar. 29, 2010, which is the National Stage ofInternational Application number PCT/US2008/077766, filed Sep. 26, 2008,which claims the benefit of U.S. Provisional Patent Application Ser. No.60/975,814 filed Sep. 27, 2007, all of which are incorporated herein byreference in their entirety.

The present application contains subject matter related to U.S. patentapplication Ser. No. 14/987,678, filed on Jan. 4, 2016, entitled “DataSecurity System with Encryption,” which is incorporated herein byreference.

TECHNICAL FIELD

The present invention relates generally to electronic devices, and moreparticularly to memory devices.

BACKGROUND

Security is a critical issue with almost all aspects of computer use.Storage media, such as hard disk drives attached to computers, containvaluable information, which is vulnerable to data theft. A great deal ofmoney and effort are being applied to guarding personal, corporate, andgovernment security information.

As portable memory storage devices have become smaller, easier to lose,more ubiquitous, cheaper, and larger in memory capacity, they have cometo pose extraordinary security problems. It is now possible to downloadmassive amounts of information surreptitiously into portable memorystorage devices, such as universal serial bus flash and micro drives,cellphones, camcorders, digital cameras, iPODs, MP3/4 players, smartphones, palm and laptop computers, gaming equipment, authenticators,tokens (containing memory), etc.—in general, a mass storage device(MSD).

More specifically, there are millions of MSDs being used for backup,transfer, intermediate storage, and primary storage into whichinformation can be easily downloaded from a computer and carried away.The primary purpose of any MSD is to store and retrieve “portablecontent,” which is data and information tied to a particular owner, nota particular computer.

The most common means of providing storage security is to authenticatethe user with a computer-entered password. A password is validatedagainst a MSD stored value. If a match occurs, the drive will open. Or,the password itself is used as the encryption key to encrypt/decryptdata stored to the MSD.

For drives that support on-the-fly encryption, the encryption key isoften stored on the media in an encrypted form. Since the encryption keyis stored on the media, it becomes readily available to those willing tocircumvent the standard interface and read the media directly. Thus, apassword is used as the key to encrypt the encryption key.

For self-authenticating drives with on-the-fly encryption—e.g.,self-encrypting drives (SEDs), their authentication sub-system isresponsible for maintaining security. There is no dependency on a hostcomputer to which it is connected. Thus, a password cannot (or need not)be sent from the host in order to unlock the MSD. In fact, theencryption key no longer needs to be stored on the media. Theauthentication subsystem becomes the means for managing encryption keys.

Some SEDs may also be installed within other devices, such as harddrives with encryption capabilities installed within servers, personalcomputers, printers, scanners, laptops, tablets, embedded systems,mobile devices, etc. However, some solutions rely on a user entering apassword on the hosting device, and then the password is transmitted tothe SED. Because they rely on the host, these SEDs have dependencies onthe architecture of the host, such as hardware interfaces and hostoperating systems. Further, by having to maintain a communicationchannel to receive the passwords, the STDs are susceptible to hackingvia this communication channel; the SEDs cannot be completely locked outfrom the host as the SEDs have to have some open data channels to sendthe user-authentication information.

Thus, a need still remains for improved security. In view of theever-increasing commercial competitive pressures, along with growingconsumer expectations and diminishing opportunities for meaningfulproduct differentiation in the marketplace, it is critical that answersbe found for these problems. Additionally, the needs to reduce costs,improve efficiencies and performance, and meet competitive pressures addan even greater urgency to the critical necessity for finding answers tothese problems.

Solutions to these problems have been long sought, but priordevelopments have not taught or suggested any solutions and, thus,solutions to these problems have long eluded those skilled in the art.

DISCLOSURE OF THE INVENTION

The present invention provides a method of operation of a data securitysystem including: providing a mobile device with a data security systemapplication for connectivity with the data security system; starting thedata security system application; and maintaining connectivity of thedata security system with the mobile device.

The present invention provides a data security system including: a datasecurity transceiver or receiver; an authentication subsystemoperatively connected to the data security transceiver or receiver; anda storage subsystem connected to the authentication subsystem. Theself-encrypting device provides host-independent (e.g., autonomous)user-authentication because the self-encrypting device does not use theresources from the host to authenticate the user, instead, theself-encrypt and device utilizes its own resources to authenticate auser. Further, the user authentication by the self-encrypting device isindependent, not only from the host, but also from the operating system(OS) executing in the host because the OS resources are not used for theuser authentication. The resources used by the self-encrypting devicefor authenticating the user include a radiofrequency transceiver toreceive the user-authentication information.

Certain embodiments of the invention have other aspects in addition toor in place of those mentioned above. The aspects will become apparentto those skilled in the art from a reading of the following detaileddescription when taken with reference to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic of a data security system in accordance with anembodiment of the present invention.

FIG. 2A is an illustration of an authentication key delivery method usedwith the data security system.

FIG. 2B is an illustration of an architecture for a self-encryptingdrive (SED) situated inside a host computer system.

FIG. 2C illustrates a method for unlocking the SED inside a laptop.

FIG. 3A is an illustration of different systems for the user to interactwith the data security system.

FIG. 3B illustrates the interaction of a mobile device with a hostcomputer system having an SED.

FIG. 4 is an illustration of how the user can employ the host computersystem to interact with a data security system.

FIG. 5 is a data security method employing user verification for thedata security system.

FIG. 6A illustrates a management architecture for remote management ofdevices with encryption capabilities.

FIG. 6B is an exemplary data security communication system.

FIG. 6C is another data security communication system with embedded SED.

FIGS. 6D-6E illustrate the organization of the user management database,according to some example embodiments.

FIG. 7 is an administrator sequencing diagram showing the sequence ofoperations between a mobile device and the data security system.

FIG. 8 is an unlocking-sequence diagram where the mobile device is anauthentication factor.

FIG. 9 is an unlocking-sequence diagram showing unlocking using a PINentry from the mobile device.

FIG. 10 is an unlocking-sequence diagram showing unlock using a PINentry and user ID/location/time verification via the server/console.

FIG. 11 is a reset sequencing diagram showing resetting the datasecurity system using a server/console.

FIG. 12 is an unlocking-sequence diagram showing unlocking the datasecurity system using the server/console.

FIG. 13 is a change user's password sequence diagram using theserver/console.

FIG. 14 is a diagram illustrating the remote locking of a device fromthe management console.

FIG. 15 is a diagram illustrating keeping the data security systemunlocked during a reboot process.

FIG. 16 is a user interface for configuring drive operations, accordingto some example embodiments.

FIG. 17 is a user interface for managing users of remote devices,according to some example embodiments.

FIG. 18 is a user interface for setting time and geographic constraintson the use of devices.

FIG. 19 is a user interface that provides a summary of the configuredfeatures for a client, according to some example embodiments.

FIG. 20 is a user interface for configuring administrator contacts for aclient, according to some example embodiments.

FIG. 21 is a user interface for accessing drive-activity information,according to some example embodiments.

FIG. 22 is a flowchart of a method for providing host-independentauthentication for a self-encrypting device incorporated into a hostsystem, according to some example embodiments.

FIG. 23 is a flowchart of a method for remote management ofself-encrypting devices with host-independent autonomous wirelessauthentication, according to some example embodiments.

FIG. 24 is a block diagram illustrating an example of a machine upon orby which one or more example process embodiments described herein may beimplemented or controlled.

DETAILED DESCRIPTION

The following embodiments are described in sufficient detail to enablethose skilled in the art to make and use the invention. It is to beunderstood that other embodiments would be evident based on the presentdisclosure, and that system, process, or mechanical changes may be madewithout departing from the scope of the present invention.

In some implementations, a self-encrypting drive (SED), with embeddedwireless user authentication, is presented. Implementations aredescribed for the use of SEDs as hard drives, e.g., hard disk drives(HDD), solid-state drives (SSD), or other types of Flash-based datastorage memory devices and boards), but the SEDs may also be used forother types of applications, such as printers, scanners, tablets,embedded systems, mobile devices, etc. The SED may be referred to hereinalso as a Data Security System (DSS) or simply as drive. The wirelessauthentication is performed independently of the host device that isaccessing the storage of the SED. For example, a mobile device mayestablish a direct, wireless connection to the SED to provideuser-authentication information and unlock the SED for access fromanother device, such as a host. The host may be unaware of the wirelessauthentication and view the SED as a regular hard drive or other type ofstorage device.

The user-authentication information is kept in an authenticationsubsystem that is separate from the communication channel. Therefore,the user-authentication information is never accessible from theoutside, via the communication channel or any other communicationchannel.

Additionally, the data in the storage media of the SED is encrypted forinternal storage, but the data is transmitted in clear form when sendingto or receiving from the host.

In other implementations, a remote management system is provided forproviding administrative control of users and SEDs. From the remotemanagement system console, an administrator is able to control the SEDs,such as enabling or disabling an SED, configuring access by users,setting time or geographic limits on the use of the SED, permanentlydisabling the SED, etc. Additionally, the remote management system maycreate user accounts, define administrators and users, provide userinterfaces for users and drives, manage user licenses, and set up andenforce security options.

In the following description, numerous specific details are given toprovide a thorough understanding of the invention. However, it will beapparent that the invention may be practiced without these specificdetails. In order to avoid obscuring the present invention, somewell-known circuits, system configurations, and process steps are notdisclosed in detail.

Likewise, the drawings showing embodiments of the system aresemi-diagrammatic and not to scale and, particularly, some of thedimensions are for the clarity of presentation and are shown exaggeratedin the drawing figures. Where multiple embodiments are disclosed anddescribed having some features in common, for clarity and ease ofillustration, description, and comprehension thereof, similar and likefeatures one to another will ordinarily be described with similar or thesame reference numerals. Similarly, although the views in the drawingsfor ease of description generally show similar orientations, thisdepiction in the figures is arbitrary for the most part. Generally, theinvention can be operated in any orientation.

The term “system” as used herein refers to and is defined as the methodand as the apparatus of the present invention in accordance with thecontext in which the term is used. The term “method” as used hereinrefers to and is defined as the operational steps of an apparatus.

For reasons of convenience and not limitation, the term “data” isdefined as information that is capable of being produced by or stored ina computer. The term “data security system” is defined as meaning anyportable memory device incorporating a storage medium. The term “storagemedia” as used herein refers to and is defined as any solid state, NANDflash, and/or magnetic data recording system. The term “locked” refersto the data security system when the storage media is not accessible,and the term “unlocked” refers to the data security system when thestorage media is accessible.

There are generally two methods to make a storage devicetamper-resistant: 1. Apply epoxy to components—an epoxy resin applied tothe printed circuit board can make it difficult to disassemble thestorage device without destroying storage media. 2. Encrypt memorydata—data gets encrypted as it is written to the storage media and anencryption key is required to decipher the data.

Referring now to FIG. 1, therein is shown a schematic of a data securitysystem 100 in accordance with an embodiment of the present invention.The data security system 100 consists of an external communicationchannel 102, an authentication subsystem 104, and a storage subsystem106.

The storage subsystem 106 is electronic circuitry that includes aninterface controller 108, an encryption engine 110, and storage media112. The storage media 112 can be an internal or external hard diskdrive, USB flash drive, solid state drive, hybrid drive, memory card,tape cartridge, and optical media including optical disk (e.g., Blu-raydisk, digital versatile disk or DVD, and compact disk or CD). Thestorage media 112 can include a data protection appliance, archivalstorage system, and cloud-based data storage system. The cloud storagesystem may be accessed utilizing a plug-in (or “plugin”) application orextension software installed in a browser application, either on thehost computer or on another system coupled to the host computer via awired or wireless network, such as RF or optical, or over the world wideweb.

The interface controller 108 includes electronic components such as amicro-controller with the encryption engine 110 of software or hardware,although the encryption engine 110 can be in a separate controller inthe storage sub system 106.

The authentication subsystem 104 is electronic circuitry that includesan authentication controller 114, such as a micro-controller, which mayhave its own non-volatile memory, such as an electrically erasableprogrammable read-only memory (EEPROM).

The external communication channel 102 provides a means of exchangingdata with a host computer system 120. Universal Serial Bus (USB) is oneof the most popular means to connect the data security system 100 to thehost computer system 120. Other examples of the external communicationchannel 102 include Firewire, wireless USB, Serial ATA (SATA),Peripheral Component Interconnect (PCI), Integrated Drive Electronics(IDE), Small Computer System Interface (SCSI), Industry StandardArchitecture (ISA), Personal Computer Memory Card InternationalAssociation (PCMCIA), Peripheral Component Interconnect Express (PCIExpress), a switch fabric, High Definition Multimedia Interface (HDMI),Recommended Standard 232 (RS-232), and radio frequency wirelessnetworks.

The interface controller 108 is capable of translating USB packet datato data that can be written to the storage media 112 in a USBflash-memory-based drive (or other types of data storage media). In someexample embodiments, the interface controller 108 is not operationaluntil the authentication subsystem 104 has authenticated the user 122,that is, the encryption engine 110 will not encrypt or decrypt data andthe external communication channel 102 will not transfer any data untilthe user 122 is authenticated.

The encryption engine 110 is implemented as part of the interfacecontroller 108 and takes clear text and/or data (information) from thehost computer system 120 and converts it to an encrypted form that iswritten to the MSD or the storage media 112. The encryption engine 110also converts encrypted information from the storage media 112 anddecrypts it to clear information for the host computer system 120. Theencryption engine 110 can also be a two-controller subsystem with anencryption controller that has the encryption capability toencrypt/decrypt data on the fly along with managing the communicationprotocol, memory, and other operating conditions, and acommunication/security controller for handling the communication,encryption key management, and communications with the encryptioncontroller.

An encryption key 116 is required by the encryption engine 110 toencrypt/decrypt the information. The encryption key 116 is used in analgorithm (e.g., a 256-bit Advanced Encryption Standard (AES)encryption) that respectively encrypts/decrypts the data by anencryption algorithm to render data unreadable or readable. Theencryption key 116 can be stored either internally or externally to theauthentication controller 114.

The encryption key 116 is transmitted to the encryption engine 110 bythe authentication subsystem 104 once a user 122, having anidentification number or key, has been verified against anauthentication key 118.

It has been discovered that, by the employment of the authentication key118 and the encryption key 116, portable memory storage devices of thevarious embodiments of the present invention can provide an extremelyhigh level of security previously not available in other such devices.

When the data security system 100 is locked, the authentication key 118remains inside the authentication subsystem 104 and cannot be read fromoutside. One method of hiding the authentication key 118 is to store itin the authentication controller 114 in the authentication subsystem104. Setting the security fuse of the authentication controller 114makes it impossible to access the authentication key 118 unless theauthentication controller 114 allows retrieval once the user 122 hasbeen verified. Many micro-controllers come equipped with a security fusethat prevents accessing any internal memory when blown. This is awell-known and widely used security feature. Such a micro-controllercould be used for the authentication controller 114. The authenticationcontroller 114 can be a micro-controller or microprocessor.

The authentication key 118 can be used as in several capacities: 1. Asthe encryption key 116 to encrypt/decrypt the information directly. 2.As a key to recover the encryption key 116 stored in the data securitysystem 100 that can be accessed by the interface controller 108. 3. Usedfor direct comparison by the interface controller 108 to activate theexternal communication channel 102.

Referring now to FIG. 2A, therein is shown an illustration of anauthentication key delivery method used with the data security system100. In this illustration, the authentication key 118 and the encryptionkey 116 are one and the same. The encryption engine 110 employs theauthentication key 118 as the encryption key 116. In other exampleembodiments, the authentication key 118 and the encryption key 116 aredifferent and independent from each other.

The user 122 interacts with the authentication subsystem 104 byproviding user identification 202, a number or key, to theauthentication subsystem 104. The authentication subsystem 104 validatesthe user 122 against the authentication key 118. The authenticationsubsystem 104 then transmits the authentication key 118 as theencryption key 116 to the interface controller 108.

The encryption engine 110, in the interface controller 108, employs theencryption key 116 to convert clear information to encrypted informationand encrypted information to clear information along a data channel206-207. Clear data channel 206 is used to exchange clear data, andencrypted data channel 207 is used to exchange encrypted data. Anyattempt to read encrypted information from the storage media 112 withoutthe encryption key 116 will generally result in information that isunusable by any computer.

FIG. 2B is an illustration of an architecture for a self-encryptingdrive (SED) situated inside a host computer system 204. The hostcomputer system 204 includes the data security system 100, as well asother host components, such as input/output devices 208, a processor210, and a memory 212.

The data security system 100 is being used as a self-encrypting drive,and the data security system 100 interfaces directly with the user 122for authenticating the user 122 so the data security system 100 may beaccessed through the clear data channel 206 (e.g., internal bus 214).Although the data security system 100 may be situated within thecomputer casing of the host computer system 204, or may be attached tothe host computer system, and the data security system 100 may beupgraded or replaced, the data security system 100 is still independentfrom the host computer system 204 for authenticating the user 122.

Other solutions for SEDs store the encryption key on the storage media112 or inside a communications controller, but this type ofimplementation is susceptible to attack because the user-authenticationinformation is still going thru the host computer and the encryption keymay be obtained by brute force or by other means, just by reading thestorage media or the communications controller. Because theauthentication is provided through the communications controller, inthese other solutions, the encryption key that is stored therein may behacked.

On the other hand, in the data security system 100, the clear datachannel 206 is completely locked until the user is authenticated. Insome example embodiments, the storage subsystem 106 is not powered untilthe user is authenticated. Further, the data security system 100 doesnot keep the encryption key 116 inside the encryption engine 110 of theinterface controller 108. Once the user is authenticated, the encryptionkey 116 is sent from the authentication subsystem 104 to the encryptionengine 110.

FIG. 2C illustrates a method for unlocking the SED inside a laptop. Atoperation 222, the SED is locked (e.g., the user has not authenticatedthe SED yet); when the user powers up a laptop 228, the laptop 228 triesto find a boot drive, but since the SED is locked, the laptop 228 doesnot find any bootable devices 230. When the SED is locked, the SED doesnot provide the data interface to the host, so the host is not aware ofthe existence of the SED; in other words, the internal SED is“invisible” to the host. Physically, the SED is in the host, butlogically the SED does not “exist” in the host as long as the datachannel is locked. From a security point of view, this invisibility isbeneficial because it is not possible to attack something you don't see.Once the SED is unlocked, the SED becomes visible and provides internalstorage for the host.

Afterwards, the user unlocks (operation 224) the SED via a mobile appexecuting on a mobile device 232. The mobile app is used to enterauthentication via wireless connection to the SED, as described in moredetail below. The wireless connection to the SED may be protected withits own independent encryption layer.

After the SED is enabled (operation 226), the laptop 228 is able to boot234, and the SED behaves as a regular hard drive. The software and thehardware in the laptop 228 is not aware that the SED is different fromany regular hard drive, and no special software or hardware is requiredto support the SED in the laptop 228.

Additionally, for security reasons, the SED may be locked, even when theoperating system in the laptop 228 is up and running. The remotemanagement system may send a command (e.g., via the mobile device 232)to lock the SED. For example, if an administrator has detected maliciousactivity, the administrator may send a command to lock the SEDimmediately, the operating system would report the failure of the harddrive, and the laptop 228 will not be operational anymore. In somecases, when there is not an urgent threat, the remote lock may be sentwith a timer (e.g., five minutes) to enable the user to close files andmaybe power down the laptop 228; when the timer expires, the SED islocked. In some example embodiments, the SED may generate a shutdownsignal of the laptop 228 for the laptop to shut down before the SED islocked.

During a malicious attack, the attacker may take out the SED and readthe data in the media to look for the encryption. With prior solutions,the hacker may gain access to the media. However, the SED describedherein, when locked, does not provide a data channel to give access tothe storage media, so the attacker may not use brute force to read themedia.

In some cases, the remote management system may send a remove wipe(remote reset, remote kill) command to the SED, and the SED will notonly lock the communication channel, but also delete the encryption key(in some cases, the SED is zeroized). Since the encryption key is nevermade available outside the SED, no other user or entity will have theencryption key and the data in the SED will not be accessible (unlessthe attacker is able to break the encryption, which is an almostimpossible task given the computing resources currently required tobreak long encryption keys).

Referring now to FIG. 3A, therein is shown an illustration of differentsystems for the user 122 to interact with a data security system 300.The interaction can be by a communication combination, which can be by aphysical contact, wired connection, or wireless connection from a cellphone, smartphone, smart watch, wearable appliance, or other wirelessdevice.

In one method for wireless authentication 308, a mobile transceiver 302(e.g., in a mobile phone, tablet, a key-fob, etc.) is employed totransmit user identification 304 to a data security transceiver 306 inan authentication subsystem 310. For exemplary purposes, transceiversare employed for bi-directional communication flexibility, but atransmitter-receiver combination for uni-directional communication couldalso be used.

The authentication subsystem 310 includes the authentication controller114, which is connected to the interface controller 108 in the storagesubsystem 106. The user identification 304 is supplied to the datasecurity transceiver 306 within the authentication subsystem 310 by themobile transceiver 302 from outside the storage subsystem 106 of thedata security system 300. The wireless communication may includeWireless Fidelity (WiFi), Bluetooth (BT), Bluetooth Smart, Near FieldCommunication (NFC), Global Positioning System (GPS), optical, cellularcommunication (for example, Long-Term Evolution (LTE), Long-TermEvolution Advanced (LTE-A)), Code Division Multiple Access (CDMA),Wideband Code Division Multiple Access (WCDMA), Universal MobileTelecommunications System (UMTS), Wireless Broadband (WiBro), or GlobalSystem for Mobile Communications (GSM), and the like.

The authentication subsystem 310 validates the user 122 against theauthentication key 118 by a code sent from the mobile transceiver 302being validated against the authentication key 118. After a successfuluser authentication validation, the authentication subsystem 310 thentransmits the encryption key 116 to the interface controller 108 acrossthe communication channel 307.

The encryption engine 110 then employs the encryption key 116 to convertclear information to encrypted information and encrypted information toclear information along the data channel 206-207. Any attempt to readencrypted information from the storage media 112 without the encryptionkey 116 will result in information that is unusable by the host computersystem 120.

In an optional second authentication mechanism, the authenticationsubsystem 310 validates the user 122 against the authentication key 118by having the user 122 employ a biometric sensor 320 to supply abiometric input 322 to verify his/her identity as an authorized user.Types of biometric identification include a fingerprint, an iris scan, avoice imprint, etc.

In an optional third authentication mechanism, the authenticationsubsystem 310 validates the user 122 against the authentication key 118by having the user 122 employ an electro-mechanical input mechanism 330to supply a unique code 332 to verify his/her identity as an authorizeduser. The unique code 332 can include a numerical, alphanumeric, oralphabetic code, such as a PIN. The electro-mechanical input mechanism330 is within the authentication subsystem 310. The electro-mechanicalinput mechanism 330 receives the unique code 332 from the user 122 fromoutside of the data security system 300. The unique code 332 is suppliedto the electro-mechanical input mechanism 330 within the authenticationsubsystem 310 from outside the storage subsystem 106 of the datasecurity system 300.

No matter which method is used to validate the user 122, theauthentication key 118 and the encryption key 116 remain hidden in theauthentication subsystem 310 until the user 122 is authenticated, andthe interface controller 108 does not have access to the authenticationkey 118 or the encryption key 116. In some embodiments, the securitycontroller may not even have a power until the user has beenauthenticated.

In some example embodiments, the data security system 300 includes aninternal power source, such as a battery 334. In other exampleembodiments, the data security system 300 does not include an internalpower source and uses the power source provided by the host computersystem 120. In other example embodiments, the data security system 300may use both a power source provided by the host and the internal powersource.

FIG. 3B illustrates the interaction of a mobile device 232 with a hostcomputer system 204 having a data security system 300. The data securitysystem 300, installed inside the host computer system 204, acts as anSED with independent authentication methods that do not rely on otherhardware or software of the host computer system 204, such asinput/output devices 208, processor 210, and memory 212. Thehost-independent authentication methods include wireless authentication,biometric authentication, and authentication based on user inputreceived via a keyboard, a keypad, or some other manipulatable inputmechanism, that is independent from the host.

Other SED solutions require authentication utilizing the host computerresources (e.g., I/O 208, processor 210, memory 212). For example, inother solutions, the user-authentication information is entered into thehost computer system 204 via the input/output devices 208, such as akeyboard or a fingerprint reader.

The user-authentication information is then sent to the SED via theinterface controller 108. This means that the interface controller 108has to be opened (e.g., unlocked) in order to receive theuser-authentication information. In the data security system (e.g., SED)300, the interface controller 108 is completely locked from access bythe host computer system 204 until the user 122 is authenticated via theRF transceiver 306, biometric sensor 320, or electro-mechanical inputmechanism 330. In some example embodiments, when the interfacecontroller 108 is locked, the host computer system 204 may not evenrecognize that there is an SED installed in the host computer system204.

Referring now to FIG. 4, therein is shown an illustration of how theuser 122 can employ the host computer system 120 to interact with a datasecurity system 400.

The host computer system 120 is provided with a host application 402.The host application 402 is software or firmware, which communicatesover the external communication channel 102 of the data security system100.

The host application 402 delivers host identifiers 406, such as internalcomponent serial numbers (e.g., hard drive), media access control (MAC)address of a network card, login name of the user, network InternetProtocol (IP) address, an ID created by the data security system 100 andsaved to the host, an ID created by the data security system 100 andsaved to the network, etc., associated with its environment. The hostidentifiers 406 are employed by an authentication subsystem 408 in thedata security system 100.

When the authentication subsystem 408 validates the user 122 against theauthentication key 118 by verifying the host identifiers 406, the datasecurity system 100 will unlock.

For example, the user 122 connects the data security system 100 that islocked to the host computer system 120. The host application 402 sendsthe MAC address of its network card to the data security system 100. Thedata security system 100 recognizes this MAC address as legitimate andunlocks without the user 122 of FIG. 1 having to enter useridentification. This implementation does not require any interactionwith the user 122. In this case, it is the host computer system 120 andits associated environment that are being validated.

The data security system 100 includes: providing the authentication key118 stored in the authentication subsystem 104; providing verificationof the host computer system 120 by the authentication subsystem 104;presenting the encryption key 116 to the storage subsystem 106 by theauthentication subsystem 104; and providing access to the storage media112 by the storage subsystem 106 by way of decrypting the storage mediacontent.

The data security system 100 further includes the authenticationsubsystem 104 for interpretation of biometric input and verification ofthe user 122.

The data security system 100 further includes using the authenticationkey 118 as the encryption key 116 directly.

The data security system 100 further includes using the authenticationkey 118 to decrypt and retrieve the encryption key 116 used to decipherinternal content.

The data security system 100 further includes the authenticationsubsystem 104 for interpretation of signal inputs and verification ofsending unit.

The data security system 100 further includes the authenticationsubsystem 104 for interpretation of manually entered input andverification of the user 122.

The data security system 100 further includes the authenticationsubsystem 104 for interpretation of input sent by a host residentsoftware application for verification of the host computer system 120.

The data security system 100 further includes the encryption engine 110outside the interface controller 108 but connected to the externalcommunication channel 102 for the purpose of converting clear data toencrypted data for unlocking the data security system 100.

Referring now to FIG. 5, therein is shown a data security method 500employing user verification for the data security system 100. The datasecurity method 500 includes; verifying the user against anauthentication key in a block 502; employing the authentication key forretrieving an encryption key in a block 504; and employing theencryption key for allowing unencrypted communication through a storagesubsystem between a host computer system and a storage media in a block506.

FIG. 6A illustrates one of the possible embodiments for a managementarchitecture 600 for remote management of devices with encryptioncapabilities. A management server 604, that includes a user managementdatabase 642, provides remote management, including remote security, ofdevices via a network, such as a cloud 650. A management console 640 mayconnect to the management server 604, directly (e.g., USB port) or viathe cloud 650. Although a management server 604 is illustrated, theimplementation of the management server 604 may be distributed acrossone or more servers that cooperate to provide the required managementcapabilities.

The management console 640 may be used to access several user interfacesfor configuring the remote management, such as interfaces for managingaccounts, users, drives, enforcing IT policies, etc. Some userinterfaces are described below with reference to FIGS. 16-21.

The user management database 642 stores information regarding users anddevices. More details for the user management database 642 are providedbelow with reference to FIGS. 6D and 6E.

The management server 604 may manage a plurality of devices, such aslaptops 228, PCs 661, thermostats 664, smart TVs 666, tablets 668,servers 670, printers and scanners 672, smart appliances 674, mobiledevices 610, and other devices, such as residence doors, elevator doors,garage doors, hotel doors, office room doors, water supply valves,meters, medical devices, medicine cabinets, safes, home and corporatesecurity and access-control systems, home automation devices, smartspeakers, voice-mail systems, etc. Some devices may belong to the samecompany, such as the laptops of Company A 660 or the devices for CompanyB 662.

For example, the remote management server 604 may control the access toan SED 101, as described above. Further, the remote management server604 may control different types of motors that can open or close a dooror a safe, provide controlled access to video security cameras and theirrecorded video, etc.

Remote management may be used for different types of services, such assecure-access control systems, home automation and security systems,healthcare and medical devices, external and internal data storagedevices, etc.

The management server 604 communicates with the mobile device 610 tocontrol the use of the SED 101 inside host computer 630. The applicationexecuting in mobile device 610, as described above with reference toFIG. 4, communicates with the management server 604 to enable access tothe SED 101, once the user authentication enables access to the SED 101,as managed by the management server 604.

Referring now to FIG. 6B, therein is shown an exemplary data securitycommunication system 602. The exemplary data security communicationsystem 602 includes a mobile device 610, a data security system 620, ahost computer 630, and a server/console 640. The mobile device 610 andthe server/console 640 are connected by wired or wireless connectionsthrough a cloud 650, which can be an Internet cloud. The mobile device610 and the data security system 620 are connected by a communicationcombination 301.

The communication combination 301 in the exemplary data securitycommunication system 602 includes a mobile transceiver 612 in the mobiledevice 610 with an antenna 614 wirelessly communicating with an antenna622 of a data security transceiver 624 in the data security system 620.

The mobile device 610 in one embodiment can be a smartphone. In themobile device 610, the mobile transceiver 612 can be connected toconventional mobile device components and to a data security systemapplication 618, which provides information to be used with the datasecurity system 620.

The data security transceiver 624 is connected to a security controller626, which can contain identification, passwords, profiles, orinformation including that of different mobile devices that can accessthe data security system 620. The security controller 626 is connectedto subsystems similar to the authentication subsystem 310, the storagesubsystem 106 (which in some embodiments can have encryption to encryptdata), and the external communication channel 102.

The external communication channel 102 is connectable to the hostcomputer 630 to allow, under specified circumstances, access to data inthe storage sub system 106.

One implementation of the data security system 620 can eliminate thebiometric sensor 320 and the electro-mechanical input mechanism 330 ofFIG. 3A with only a wireless link to the mobile device 610, such as asmartphone. It has been found that this implementation makes the datasecurity system 620 more secure and useful.

The data security system application 618 allows the mobile device 610 todiscover all data security systems in the vicinity of the mobile device610 and show their status (locked/unlocked/blank, paired/unpaired etc.).

The data security system application 618 allows the mobile device 610 toconnect/pair, lock, unlock, change the name and password, and reset alldata on the data security system 620.

The data security system application 618 allows the mobile device 610 toset an inactivity auto-lock so the data security system 620 willautomatically lock after a predetermined period of inactivity or to seta proximity auto-lock so the data security system 620 will be lockedwhen the mobile device 610 is not within a predetermined proximity for apredetermined time period (to improve reliability and avoid signalde-bouncing).

The data security system application 618 allows the mobile device 610 toremember a password, use TouchID, and Apple Watch (both TouchID andApple Watch mentioned here as examples only, there are many other mobiledevices with biometric sensors and wearables that can be used in asimilar mode) so data security system 620 can be unlocked withoutentering re-entering a password on the mobile device 610.

The data security system application 618 allows the mobile device 610 tobe set to operate only with a specific mobile device, such as the mobiledevice 610, so the data security system 620 cannot be unlocked withother mobile devices (1Phone).

The data security system application 618 allows the mobile device 610 toset the data security system 620 to Read-Only.

The data security system application 618 allows the mobile device 610 tobe operated in User Mode or Administrator Mode (administrator's modeoverrides user's settings) and use the server/console 640. Theserver/console 640 is a combination of a computer with a console forentering information into the computer.

The server/console 640 contains a user management database 642, whichcontains additional information that can be transmitted over the cloud650 to the mobile device 610 to provide additional functionality to themobile device 610.

The user management database 642 allows the server/console 640 to createand identify users using UserID (username and password), to lock orunlock the data security system 620, and to provide remote help.

The user management database 642 allows the server/console 640 toremotely reset or unlock the data security system 620.

The user management database 642 allows the server/console 640 toremotely change the data security system user's PIN.

The user management database 642 allows the server/console 640 torestrict/allow unlocking data security system 620 from specificlocations (e.g., by using geo-fencing).

The user management database 642 allows the server/console 640 torestrict/allow unlocking data security system 620 in specified timeperiods and different time zones.

The user management database 642 allows the server/console 640 torestrict unlocking data security system 620 outside of specifiedteam/organization/network, etc.

FIG. 6C is another data security communication system with embedded SED101. Host computer system 204 includes an SED 101, which includes thedata security transceiver 624, the security controller 626, theauthentication subsystem 310, and the storage subsystem 106, asdescribed in FIG. 6B for data security system 620. Additionally, the SED101 includes a data interface 646 and may include an internal powersupply (e.g., a battery 334).

The data interface 646 is used to communicate with other components ofthe host computer system 204, via data channel 676, such as I/O 208,processor 210, memory 212, and power supply 678. In some exampleembodiments, the battery 334 is not included in the SED 101, and the SED101 may utilize the power supply 678 of the host computer (or overallembedded) system 204.

As described above with reference to FIG. 6B, the data securitytransceiver 624 may be used to authenticate the SED 101. In some exampleembodiments, the data interface 646 remains locked (e.g., no data issent out or received via the data interface 646) until the user isauthenticated.

FIGS. 6D-6E illustrate the organization (e.g., configuration) of theuser management database 642, according to some example embodiments. Insome example embodiments, the user management database 642 includes adrive (managed device) table 680, a user table 682, an administratoruser table 684, a drive-user mapping table 690, and a license table 692.

The drive table 680 stores information about the drives manage by theremote management server. The drive table 680 includes the followingfields:

-   -   Drive Identifier (ID) that is one or more unique identifiers for        each drive in the system (e.g., 1, 2, 3, 4). This is an internal        value used by the remote management architecture;    -   Drive unique identifier (e.g., the serial number) is a unique        identifier that differentiates each drive (managed device) from        any other drives in the world. For example, the drive unique        identifier may be the serial number. Some examples are        UAC_DI_1_012896, UAC_DI_1_0b6d2222, etc.;    -   First-use time, which is the time when the drive was first used        (e.g., 2016-03-01 14:05:36/5820275);    -   Enabled, which is a binary flag indicating if the managed drive        is enabled for use. If the drive is not enabled, the managed        drive will not operate and the user will not be able to        authenticate the drive until the drive is enabled;    -   Administrative password, which may be a string of characters        including letters, number, and/or other characters;    -   Reset required, which is a binary flag indicating if the reset        is required for the managed drive;    -   User password, which may be a string of characters including        letters, number, and/or other characters;    -   Administrator unlock, which is a binary flag indicating if there        is a pending unlock request generated by the administrator;    -   Offline mode, which is a binary flag indicating if the drive is        online or offline;    -   License identifier (ID), which is a string of characters        containing the license assigned to the drive by the remote        management system; and    -   Creator user ID that identifies the user that added the drive to        the system.

The user table 682 stores information for each of the users authorizedby the remote management system. The user table 682 includes thefollowing fields:

-   -   The user identifier (ID) that uniquely identifies each of the        users (e.g., 1, 2, 3, 27) in the remote management system;    -   The user login, which is the login used by the user to gain        access to the remote management system (e.g., joe47, angela,        mark, pepe9675@email.com);    -   The user password, which is stored in encrypted form;    -   The date the user was created in the system;    -   Enabled, which is a binary flag indicating if the user is        currently enabled or disabled in the system;    -   A region ID, which identifies the region where the user is        enabled. The region may be an area within the world (e.g.        continent, country, state, county, zip code, etc.), or the        complete world;    -   A country ID, which identifies the country where the user is        enabled. If no country is specified, the user may operate in any        country;    -   A time allowed-from, which indicates a lower boundary for the        date/days/hours when the user is authorized to access one or        more drives;    -   A time allowed-to, which indicates the upper boundary for the        date/days/hours when the user is authorized to access one or        more drives;    -   A time allowed time zone, which indicates the time zone        associated with the time of use boundaries;    -   An allowed latitude;    -   An allowed longitude;    -   An allowed radius that, together with the allowed latitude and        the allowed longitude, defines a region of the world where the        user is enabled to operate;    -   An allowed street;    -   An allowed city;    -   An allowed state;    -   An allowed ZIP code that, together with the allowed street,        allowed city, and allowed state, defines a place where the user        may operate (e.g., a workplace);    -   A license ID; and    -   A temporary password flag, which is a binary flag indicating if        the password is temporary and must be changed.

As described above, the geographic fencing (e.g., boundaries) as well asthe time-of-use boundaries are defined for each user. In other exampleembodiments, the geographic and time limitations may be defined bydrive, which means that a particular drive may only be used in the areaand/or time allowed.

The administrator user table 684 is a table for storing informationregarding the users that are authorized to operate as administrators fortheir respective accounts. The administrator user table 684 includes thefollowing fields:

-   -   A user ID of the administrator. This value links the        administrator to the user table 682;    -   A user name of the administrator;    -   A license ID for the administrator account;    -   A binary flag indicating if two-factor authentication is enabled        for this administrator;    -   A phone number of the administrator; and    -   A custom password for the administrator, which is stored in        encrypted form.

In FIG. 6E, the drive-user mapping table identifies which drives may beused by each user. There is an entry for each unique mapping of user todrive. Therefore, if a user is enabled for the use of three differentdrives, the drive-user mapping table 690 will have three entries withthe same user ID, each of the entries mapping the user to a differentdrive ID.

The drive-user mapping table 690 includes the following fields:

-   -   A drive-user index that uniquely identifies each mapping of user        to drive (e.g., 101, 102, 103, etc.);    -   A user ID of the user (e.g., the user ID of user table 682);    -   A drive ID of the drive (e.g., the drive ID of the drive table        680);    -   A date when the entry was created; and    -   An enabled indicator, which is a binary flag indicating if the        mapping of user to drive is enabled.

The license table 692 stores information regarding the licenses given tousers for accessing the remote management system, including accessingthe configured drives, such as activation codes, when the license wasissued, to whom the license was issued, duration of the license, etc.The license table 692 includes the following fields:

-   -   A license identifier (ID), which uniquely identifies each of the        licenses within the remote management system (e.g., a license        index);    -   A license key, which is a string value that indicates the        license (e.g., FE284567B23EA8648648940DE). This license key is        given to the user and gives the user different capabilities in        the system according to the license type;    -   A license type, which indicates the type of license that the        user has purchased. The license types may include one or more of        master (complete access), test (limited to testing functions),        personal (given to a user), company (assigned to all the users        of a company), temporary (having a limited time of use and/or        number of drives, and/or users, and/or admins), etc.;    -   A license term, which indicates the amount of time left on the        license (e.g., 255 days);    -   A maximum number of administrators that can be configured for        this license (e.g., one, five, etc.);    -   A maximum number of users for this license (e.g., 100);    -   A maximum number of drives covered by this license (e.g., 50);    -   A time when the license was created;    -   A time when the license is to expire;    -   A company name associated with the license; and    -   A user ID of the user that created the license.

It is noted that the embodiments illustrated in FIGS. 6D and 6E areexamples and do not describe every possible embodiment. Otherembodiments may utilize different tables, additional tables, combinetables, etc. The embodiments illustrated in FIGS. 6D and 6E shouldtherefore not be interpreted to be exclusive or limiting, but ratherillustrative.

Referring now to FIG. 7, therein is shown an administrator sequencingdiagram showing the sequence of operations between the mobile device 610and the data security system 620.

Connectivity 700, between the data security system 620 and the mobiledevice 610, is first established with mutual discovery of the otherdevice or system, pairing the device and system, and connection of thedevice and system. The connectivity 700 is secured using a sharedsecret, which is then used to secure (encrypt) communications betweenthe data security system 620 and the mobile device 610 for all futurecommunication sessions. A standard encryption algorithm is selected tobe both efficient to run on the data security system 620 and to beapproved by world-wide security standards.

The connectivity 700 is maintained by the data security systemapplication 618 or the security controller 626 or both operatingtogether as long as the data security system 620 and the mobile device610 are within a predetermined distance of each other. Further, if thepredetermined distance is exceeded, the connectivity 700 is maintainedfor a predetermined period of time after which the data security system620 is locked.

After connection of the mobile device 610 and the data security system620, a data security system administrator application start operation702 occurs in the mobile device 610. Then an administrator sets apassword in an administrator password operation 704. Also, afterconnection of the mobile device 610 and the data security system 620,the data security system 620 is connected to the host computer 630 ofFIGS. 6A and 6B to be powered up and discoverable by the host computer630 in a data security system connected, powered, and discoverableoperation 706.

After the administrator password operation 704, the mobile device 610sends a set administrator password and unlock signal 708 to the datasecurity system 620. The set administrator password and unlock signal708 causes an administrator password set and data security systemunlocked operation 716 to occur in the data security system 620.

When the administrator password set and data security system unlockedoperation 716 is completed, a confirmation: data security systemunlocked signal 712 is sent to the mobile device 610 where aconfirmation: data security system unlocked as administrator operation714 operates. The confirmation: data security system unlocked asadministrator operation 714 permits a set other restrictions operation715 to be performed using the mobile device 610. The set otherrestrictions operation 715 causes a set administrator restrictionssignal 718 to be sent to the data security system 620 where theadministrator restrictions are set and a confirmation: restrictions setsignal 720 is returned to the mobile device 610. Thereafter, the mobiledevice 610 and the data security system 620 are in full operativecommunication.

Because it is possible to communicate with the data security system 620without having physical contact with the data security system 620, it isrequired that significant interactions with the data security system 620be accompanied by a data security system unique identifier that iseither printed on the data security system 620 itself, or that comeswith the data security system 620 packaging and is readily available tothe data security system 620 owner.

On making requests that could affect user data, such as unlocking orresetting the data security system 620, this unique identifier (uniqueID) is required. Attempts to perform these operations without thecorrect identifier are ignored and made harmless. The unique identifieris used to identify the data security system 620 to the mobile device610 in a way that requires the user to have physical control over thedata security system 620 and to verify the connectivity 700 isestablished between the authorized, previously paired device and system,such as the mobile device 610 and the data security system 620. Once thedevices are paired, the shared secret is used to make the communicationconfidential.

Pairing connotes that a mobile device and a data security system have aunique and defined relationship established at some time in the past andenduring.

The unique identifier makes for giving the user some control over thedata security system when the user has physical control of the datasecurity system.

To increase the security of the communication with the data securitysystem 620 where the mobile device 610 is a smartphone, a user maychoose to enable a feature, such as a feature called 1Phone here. Thisfeature restricts significant user interactions with the data securitysystem 620 to one and only one mobile device 610. This is done byreplacing the data security system unique identifier described abovewith a random identifier shared securely between the data securitysystem 620 and the mobile device 610. So, instead of presenting the datasecurity system unique identifier when, for example, the user unlocksthe data security system 620, the 1Phone identifier must be giveninstead. In effect, this makes the user's mobile device 610 a secondauthentication factor, in addition to a PIN or password, for using thedata security system 620. As an example, the paired user phone selectedas “1Phone” can be used without a PIN, and as the user-authenticationsingle factor and/or in a combination with any other user-authenticationfactors. If such feature (1Phone) is selected, the data security system620 cannot be opened with any other phones, except if an administrator'sunlock was enabled before.

It will be understood that other embodiments can be made to require anadministrator's password on the data security system 620 in order to usethe 1Phone feature. Another embodiment may require that theserver/console 640 is capable of recovering the data security system 620in case the 1Phone data is lost on the mobile device 610.

The user may enable a proximity auto-lock feature for the data securitysystem 620. During a communication session, the data securitytransceiver 624 of FIG. 6B reports to the data security system 620 asignal strength measurement for the mobile device 610. The data securitysystem application 618 on the mobile device 610 sends the data securitysystem 620 both the originating signal power level and the threshold forproximity.

Because the signal strength varies due to environmental conditionsaround the transceivers, the data security system 620 mathematicallysmooths the signal strength measurements to reduce the likelihood of afalse positive. When the data security system 620 detects that thesignal power received has dropped below a defined threshold for apredetermined period of time, it will immediately lock the data securitysystem 620 and prevent access to the storage subsystem 106 of FIG. 6B.

The data security system 620 could be used in three different modes: aUser Mode where the functionalities of the data security system 620 aredetermined by the user; an Administrator Mode where an administrator canset an Administrator password and enforce some restrictions on the datasecurity system 620 (e.g., automatic lock after a predetermined periodof inactivity, Read-Only, 1Phone) and where restrictions cannot beremoved by a User; and a Server Mode where an administrator role is setwhere the server/console 640 can remotely reset the data security system620, change user passwords, or just unlock the data security system 620.

Referring now to FIG. 8, therein is shown an unlocking sequence diagramwhere the mobile device 610 is used as an authentication factor. Thisdiagram shows an auto-unlock process, of the data security system 620,initiated by the data security system application 618 from a specificmobile device, the mobile device 610. A user can use one mobile devicethat was initially paired with the data security system 620. If thepaired mobile device 610 is lost, then the data security system 620cannot be unlocked (unless administrator password was set before asshown in FIG. 7).

While similar to FIG. 7, a data security system application startedoperation 800 occurs after the connectivity 700 is established. Anunlock required with mobile device ID signal 802 is sent from the mobiledevice 610 to the data security system 620 after a data security systemconnected, powered and discoverable operation 706. A data securitysystem unlocked operation 804 occurs and a confirmation: data securitysystem unlocked signal 712 is sent from the data security system 620.After a confirmation: data security system unlocked operation 806, themobile device 610 and the data security system 620 are in full operativecommunication.

If a PIN (Personal Identification Number) was not set up, then thepaired mobile device is used as one-factor authentication.

Referring now to FIG. 9, therein is shown an unlock sequencing diagramshowing unlocking using a PIN entry from the mobile device 610. Thisdiagram shows the process of unlocking the data security system 620 byentering a PIN in the data security system application 618 in the mobiledevice 610. The data security system 620 cannot be unlocked withoutentering the correct PIN.

While similar to FIGS. 7 and 8, in FIG. 9 an enter username/passwordoperation 900 occurs after the data security system application startedoperation 800. After the enter username/password operation 900, themobile device 610 sends a verify user ID signal 902 to theserver/console 640. The server/console 640 then makes ausername/password valid determination 904.

When the username/password valid determination 904 verifies the user, avalid user signal 906 is sent to the mobile device 610 for the user toenter the correct PIN in an enter PIN operation 908 in the mobile device610. The mobile device 610 then sends a verify unlock signal 910 todetermine if the correct PIN has been entered to the server/console 640.

The server/console 640 makes a user authorized determination 912 anddetermines if the user is authorized to use the specific data securitysystem, such as the data security system 620, that the PIN is authorizedfor. If authorized, an unlock allowed signal 914 is sent to the mobiledevice 610, which passes on an unlock request signal 916 to the datasecurity system 620.

The data security system unlocked operation 804 is performed and theconfirmation: data security system unlocked signal 712 is sent to themobile device 610 where the confirmation, data security system unlockedoperation 806 is performed.

Referring now to FIG. 10, therein is shown an unlock sequencing diagramshowing unlock using a PIN entry and User ID/location/time verificationvia the server/console 640. This diagram shows the most secure processof unlocking the data security system 620 by entering a PIN in the datasecurity system application 618 from the mobile device 610,authenticating in the server/console 640 server using a UserID(username/password), and by verifying geo-fencing permissions to unlockthe data security system 620 at a specific location and at a certaintime range. The data security system 620 cannot be unlocked withoutentering the PIN, username and password, and having the mobile device610 be present in specific (predefined) location and certain(predefined) time.

While similar to FIGS. 7-9, in FIG. 10 at the server/console 640, anunlock specified data security system operation 1000 is performed toallow setting of the desired conditions under which the specified datasecurity system, such as the data security system 620, will operate. Forexample, the conditions could be within a specific geographical areaand/or specific time frame.

At the mobile device 610, a current condition determination is made,such as in an acquire location and/or current time operation 1002. Thisoperation is performed to determine where the mobile device 610 islocated and or what the current time is where the mobile device 610 islocated. Other current conditions around the mobile device 610 may alsobe determined and sent by a verify unlock signal 1004 to theserver/console 640 where a conditions-met determination 1006 is made.

When the desired conditions are met, an unlock allowed signal 1008 issent to the mobile device 610 for the enter PIN operation 908 to beperformed. After the PIN is entered, a verify unlock signal 1010 is sentwith the PIN and an identification of the data security system 620 thatis in operational proximity to the mobile device 610. The verify unlocksignal 1010 is received by the server/console 640 and a data securitysystem allowed determination 1012 is made to determine that thespecified data security system is allowed to be unlocked by theauthorized user. The server/console 640 verifies that this “specific”user is authorized to use the specified data security system.

After determining the correct information has been provided, theserver/console 640 will provide an unlock allowed signal 914 to themobile device 610, which will provide a unlock request signal 916. Theunlock request signal 916 causes the data security system 620 tooperate.

Referring now to FIG. 11, therein is shown a reset sequencing diagramshowing resetting the data security system 620 using the server/console640. This diagram shows the ability to reset the data security system620 remotely via the server/console 640. The data security system 620can receive commands only from the mobile device 610 over the wirelessconnection. However, by setting a “Reset” flag on the server/console 640for a specific data security system (using its S/N), the data securitysystem application 618 running on the mobile device 610 will query theserver/console 640 for any flags/pending requests in the user managementdatabase 642. When the user connects the data security system 620, thedata security system application 618 on the mobile device 610 willexecute a waiting “reset” command. After a successful reset (e.g., alluser data and credentials are erased and unrecoverable), theserver/console 640 will remove the Reset flag so it will not be executedthe next time the mobile device 610 is connected to the specific datasecurity system.

While similar to FIGS. 7-10, in FIG. 11 the mobile device 610 respondsto the valid user signal 906 by sending an any command waiting signal1100 to the server/console 640 to make a reset command determination1102. When the reset command is present, a perform reset signal 1104will be sent to the mobile device 610.

The mobile device 610 will send a reset security system signal 1106 tothe data security system 620 to start a data security system resetoperation 1108. Upon completion of the data security system resetoperation 1108, the data security system 620 will send a confirmation:data security system reset signal 1110 to the mobile device 610 to set aconfirmation: data security system reset operation 1112 into operation.Thereafter, the mobile device 610 and the data security system 620 arein full operative communication with the data security system 620 reset.

Referring now to FIG. 12, therein is shown an unlock sequencing diagramshowing unlocking the data security system 620 using the server/console640. This diagram shows the ability to unlock the data security system620 remotely via the server/console 640. The data security system 620can receive commands only from the mobile device 610 over the wirelessconnection. However, by setting an “Administrator Unlock” flag on theserver/console 640 for a specific data security system (e.g., using itsS/N), the data security system application 618 running on the mobiledevice 610 will query the server/console 640 for any flags indicatingpending requests. When the user connects the data security system 620,the data security system application 618 on the mobile device 610 willexecute a waiting “Administrator Unlock” command. After successfulAdministrator unlock, the user's data is untouched, but the user'spassword is removed (the data security system 620 cannot be unlocked bythe user). The server/console 640 will reset the Reset flag for the datasecurity system 620 so it will be not executed next time when the mobiledevice 610 is connected to the data security system 620.

While similar to FIGS. 7-11, in FIG. 12, after receiving the any commandwaiting signal 1100, the server/console 640 performs an unlock 1200 whenthere is a command to unlock with an administrator's password. An unlockwith an administrator's password signal 1202 is sent to the mobiledevice 610, which provides an unlock with administrator's passwordsignal 1204 to the data security system 620 to start the data securitysystem unlocked operation 804. Thereafter, the mobile device 610 and thedata security system 620 are in full operative communication.

Referring now to FIG. 13, therein is shown a change-user passwordsequencing diagram using the server/console 640. This diagram shows theability to change the user's password for data security system 620remotely via the server/console 640. The data security system 620 canreceive commands only from the mobile device 610 over the wirelessconnection. However, by setting a “Change User's Password” flag on theserver/console 640 for a specific data security system (e.g., using itsS/N), the data security system application 618 running on the mobiledevice 610 will query the server/console 640 for any flags indicatingpending requests. When the user connects his data security system 620,the data security system application 618 on the mobile device 610 willexecute the pending “Change User's Password” command. After thesuccessful unlock and password change, the user's data is untouched andthe data security system 620 can be unlocked with the new user'spassword. The server/console 640 will reset the “Change User's Password”flag for this data security system 620 so it will not be executed thenext time the mobile device 610 is connected to the specific datasecurity system.

While similar to FIGS. 7-12, in FIG. 13 the server/console 640 respondsto the any command waiting signal 1100 by making a change passworddetermination 1300. When there has been a password change at theserver/console 640, a change user password signal 1302 is sent to themobile device 610, which sends a change user password signal 1304 to thedata security system 620. Thereafter, the mobile device 610 and the datasecurity system 620 are in full operative communication with the newpassword.

In some example embodiments, a user may interact with the server/console640 to recover a lost or forgotten password. The user sends a request tothe server/console 640 to recover the password, which may be a generalpassword for the user, or a particular password for a particular device.

The server/console 640 then authenticates the user (e.g., two factorauthentication), and if the user is authenticated, the server/consoleretrieves the password from the server database and provides thepassword to the user.

In other example embodiments, the password may be reset instead ofrecovered and the user would enter the new password at theserver/console 640.

A method of operation of a data security system comprising: providing amobile device with a data security system application for connectivitywith the data security system; starting the data security systemapplication; and maintaining connectivity of the data security systemwith the mobile device.

The method as described above wherein maintaining the connectivitymaintains the connectivity when the data security system is within apredetermined proximity to the mobile device.

The method as described above wherein maintaining the connectivitymaintains the connectivity when the data security system is within apredetermined proximity to the mobile device for a predetermined periodof time.

The method as described above wherein establishing the connectivityincludes using bi-directional communication between the data securitysystem and the mobile device.

The method as described above wherein establishing the connectivityincludes using uni-directional communication between the data securitysystem and the mobile device.

The method as described above further comprising communication betweenthe mobile device with the data security system application and a servercontaining a user management database.

The method as described above further comprising providing securityinformation in a security controller in the data security system.

The method as described above further comprising: providing a serverwith identification of a specified data security system; providing thedata security system with a specific identification; and unlocking thedata security system when the identification of the specified datasecurity system is the same as the specific identification of the datasecurity system.

The method as described above wherein providing a mobile device with thedata security system application provides a data security systemadministrator's application and further includes: setting anadministrator's password in the mobile device; transmitting theadministrator's password from the mobile device to the data securitysystem; and setting the administrator's password in the data securitysystem and unlocking the data security system.

The method as described above further comprising: providing an unlockrequest along with a mobile device identification from the mobile deviceto the data security system; and receiving the unlock request in thedata security system and unlocking the data security system.

The method as described above further comprising: entering a user nameor password in the mobile device; determining when the user name orpassword is valid in a server after receiving the user name or passwordfrom the mobile device; communicating from the server to the mobiledevice when the user name or password is valid; and communicating fromthe mobile device to the data security system when the user name orpassword is valid to unlock the data security system.

The method as described above further comprising: entering a user nameor password in the mobile device; determining when the user name orpassword is valid in a server after receiving the user name or passwordfrom the mobile device; communicating from the server to the mobiledevice when the user name or password is valid; determining when theidentification number is valid in the server after receiving theidentification number from the mobile device; and unlocking the datasecurity system through the mobile device when the server determines theidentification number is valid.

The method as described above further comprising: providing a validlocation of the mobile device to a server; determining in the serverwhen the mobile device is in the valid location; and unlocking the datasecurity system through the mobile device when the server determines themobile device is in the valid location.

The method as described above further comprising: providing a currenttime of operation for the data security system at the mobile device to aserver; determining in the server when the mobile device is within thecurrent time; and unlocking the data security system through the mobiledevice when the server determines the mobile device has the currenttime.

The method as described above further comprising: providing a command ina server; providing the command to the mobile device from the server inresponse to a command waiting signal from the mobile device; andperforming the command in the data security system through the mobiledevice when the command is provided from the server.

The method as described above further comprising: providing a changepassword command in a server; providing the change password command tothe mobile device from the server in response to a change passwordsignal from the mobile device; and unlocking the data security systemwith the changed password in the data security system.

The method as described above further comprising connecting the datasecurity system to a host computer for power and to be discoverable bythe host computer.

A data security system comprising: a data security transceiver orreceiver; an authentication subsystem operatively connected to the datasecurity transceiver or receiver; and a storage subsystem connected tothe authentication subsystem.

The system as described above further comprising a security controllerconnected to the data security transceiver or the receiver and to theauthentication subsystem.

The system as described above further comprising a mobile device havinga data security system application operating with the securitycontroller for maintaining connectivity when the data security system iswithin a predetermined proximity to the mobile device.

The system as described above further comprising a mobile device havinga data security system application operating with the securitycontroller for maintaining connectivity when the data security system iswithin a predetermined proximity to the mobile device for apredetermined period of time.

The system as described above further comprising a mobile device havinga mobile transceiver or receiver for maintaining connectivity usingbi-directional communication between the data security system and themobile device.

The system as described above further comprising a mobile device havinga mobile transceiver or receiver for maintaining connectivity usinguni-directional communication between the data security system and themobile device.

The system as described above further comprising a wired or wirelessconnection communication between a mobile device with a data securitysystem application and a server containing a user management database.

The system as described above wherein the data security system includesan external communication channel for connection to a host computer.

FIG. 14 is a diagram illustrating the remote locking of a device fromthe management console. An administrator may enter a command to unlockat the server/console 640, and when the mobile device 610, associatedwith data security system 620, establishes a connection with the serverconsole 640, the data security system will be locked and the user willnot be able to unlock it until a new command is generated to unlock thedevice.

At operation 1402, the lock is specified at the server/console 640 forthe specific data security system 620. When the mobile device 610 sendsa connection request 1404 from the application executing on the mobiledevice, the server/console responds 1406 with a command to lock the datasecurity system 620.

The mobile device 610 forwards 1408 the lock DSS command. The datasecurity system 620 then performs the law of operation 1410, whichdisables user unlocking of the data security system 620 until a newunlock command is received. For example, the new unlock command may besent by an administrator of the account associated with the datasecurity system 620.

After the data security system 620 is locked, the data security system620 sends a locked confirmation 1412 to the mobile device 610. Themobile device 610 then forwards 1414 the locked confirmation to theserver/console 640. The server/console 640 then confirms 1416 that theDSS has been locked, so the DSS 620 will show as locked and the lockrequest is completed.

FIG. 15 is a diagram illustrating keeping the data security system 620unlocked during a reset process. If a host performs a reboot, the hostshuts down and then restarts again. If the host has a secure SED and theSED is using the power source in the host, when the host shuts down, theSED will lose power and the SED will be locked. Even if the SED uses itsown power supply, the SED may detect that the host has shut down and theSED will lock.

When the host restarts, the SED will not be available until the userunlocks the SED. However, in some cases, it is convenient to keep theSED unlocked during a reboot, or some other short-term power cycle, sothe user does not have to go through the unlock process again. From thepoint of view of the user, the user already unlocked the SED, so thereshouldn't be a need to unlock it again, just because the host reboots.

In some example embodiments, a restart timer is used to keep the datasecurity system 620 unlocked during a reboot. The restart timer may beimplemented on the mobile device 610, as illustrated in FIG. 15, or maybe implemented by the data security system 620 itself (not shown).

At operation 1502, the application executing on the mobile device 610 isactivated, and at operation 1504, the DSS 620 is unlocked as previouslydescribed.

At operation 1506, the data security system 620 detects a host restartoperation, and a restart notification is sent 1508 to the mobile device610. The mobile device 610 then starts a restart timer 1510, such thatwhen the data security system 620 restarts within a threshold amount oftime, the data security system 620 will automatically be initialized inthe unlocked state without requiring user authentication.

In operation 1512, the data security system 620 initializes. The datasecurity system is discovered at operation 1514 by the mobile device610. After the discovery, the mobile device 610 performs a check 1516 todetermine if the restart timer has expired.

If the restart timer has not expired, the mobile device 610 sends astart-unlocked command 1518 to the data security system 620. If therestart timer has expired, the mobile device 610 starts a new unlocksequence 1520 that requires user authentication. At operation 1522, thedata security system 620 initializes in the unlocked state in responseto the start unlocked command 1518 received from the mobile device 610.

If the data security system 620 implements the restart timer, the datasecurity system 620 will check the timer upon initialization. If thetimer has not expired, the data security system 620 will initialize inthe unlock state; otherwise, the data security system 620 will wait forthe unlock sequence.

FIG. 16 is a user interface 1602 for configuring drive operations,according to some example embodiments. The remote management userinterface provides different options for managing users, administrators,counts, drives, licenses, etc., as described below with reference toFIGS. 16-21.

FIG. 16 shows the user interface 1602 for managing drives (“manageddrives”). The user interface 1602 includes a message indicating thatthis screen corresponds to an account summary for a company (e.g.,CorpA), for a given administrator of the company (e.g.,admin.corpa@srm.com).

The drive information is presented in tabular form in a drives dashboard1604, which includes drives table 1608 and a search option 1606 forsearching drives. The drives table 1608 includes information for a listof drives, identified in the first column by their serial number. Foreach drive, the drives table 1608 indicates if the drive is active ornot, a flag indicating if offline use is allowed, a flag indicating if areset is pending for the drive, a flag indicating if an administratorunlock command is pending, a flag indicating if a change of userpassword is pending, and a more button 1612 that provides additionaloptions. In some example embodiments, the more button 1612 providesoptions for deleting a drive from the system and for instantly lockingthe drive (as soon as communication with the drive is established).

The options for managing drives allow flexibility in the control ofSEDs. For example, if an administrator suspects that a drive is beingattacked by a malicious agent, the administrator can set a command todelete the drive or instantly lock the drive 1610. Once communication isestablished with the drive (e.g., via the mobile device), a delete driveoperation will destroy the encryption key in the drive, and since thedata is stored encrypted, it will not be possible to access the datastored in the drive.

If the instant lock is set, the drive will automatically lock. Forexample, if a laptop is stolen, the instant lock will automatically lockthe drive, without having to wait for a timeout or detecting that themobile device is beyond the safe area of operation.

Additionally, the administrator may request a remote unlock of thedrive, and when the indication is established with the drive, the drivewill automatically unlock and enable the data channel.

If the administrator selects one of the drives, a new screen (not shown)will provide additional options for managing the drive, such as enablingor disabling the drive, resetting the drive, changing the user password,and ordering an administrator unlock, indicating the user associatedwith the drive.

FIG. 17 is a user interface 1702 for managing users of remote devices,according to some example embodiments. The user interface 1702 includesa users dashboard 1704 and a window 1706 for adding users.

The users dashboard 1704 presents the users of the system in a userstable 1708. For each user, the users table 1708 provides the name of theuser, the login, a flag indicating if the user is enabled or disabled,and a button that provides additional commands, such as delete user,rename user, change password, etc.

The window 1706 provides fields for entering the name of the new user,the email address of the new user, an option for importing data for theuser, and a create-user button 1710.

FIG. 18 is a user interface 1802 for setting time and geographicconstraints on the use of devices. The user interface 1802 allowsconfiguring options for a user (e.g., alex@corpa.com). A window 1804lists the drives enabled for this user and provides a field for addingadditional drives.

Further, the windows 1808 and 1806 provide options for setting limits tothe drives. The window 1808 includes two fields for entering a begintime and an end time in the day when the use is allowed. Another fieldallows the user to select the time zone for the time boundaries. If notime limits are set, the user may use the drive anytime during the day.

The window 1806 enables setting geographic limitations for the use ofthe allowed drives. The limitations may include setting an address(including street address, city, and country) or geographic coordinates,that together with a radius defines the region where the drive or drivesmay be used. The geographic limitations may also be configured for usein a given continent. A map 1810 highlights the areas where use isenabled or disabled based on the geographic parameters configured.

FIG. 19 is a user interface 1902 that provides a summary of theconfigured features for a client, according to some example embodiments.Window 1904 includes different options for managing an account, and theoption “Summary” 1908 indicates that this is the summary view. Thewindow 1904 further includes a table 1906 that provides summary data forthe account.

In some example embodiments, the summary data includes the followingfields: Licensed to, which indicates the name of the company that ownsthe license; License Type, which indicates the type of license; LicenseCreated By, which indicates the creator of the license; the License Key;Number of Administrators, which indicates the current number ofadministrators and the total number of possible administrators; Numberof Users, which indicates the current number of users and the maximumnumber of users; and Number of Drives, which indicates the currentnumber of drives in use and the maximum number of drives allowed by thelicense.

FIG. 20 is a user interface 2002 for configuring administrator contactsfor a client, according to some example embodiments. In user interface2002, the Admin Contacts option 2008 is highlighted within window 2004,and the administrators table 2006 shows a summary of the configuredadministrators, including their name or login, mobile phone information,and the last time the administrator logged into the system. In otherexample embodiments, other fields may be included, such as the fields ofadministrator user table 684 of FIG. 6D.

A similar interface (not shown) is presented when the user selects theUser Contacts option, and the information about the users is presented.Additional details may be provided, including any of the fields of usertable 682 of FIG. 6D.

FIG. 21 is a user interface 2102 for accessing drive-activityinformation, according to some example embodiments. The drives table2106, inside window 2104, provides information about the drivesconfigured for the client when the Drives Activity option 2108 isselected.

Each entry in the drives table 2106 includes the drive identifier (e.g.,serial number), the date when the drive was provisioned (e.g.,configured into the system), the administrator that provisioned thedrive, the last time the drive was used, the user that used the drivelast, and a geographical icon that would present the location where thedrive was used for the last time. In other example embodiments,additional drive information may be provided, such as the drive datafrom drive table 680 of FIG. 6D.

FIG. 22 is a flowchart of a method 2200 for providing host-independentuser-authentication for a self-encrypting device incorporated into ahost system, according to some example embodiments. While the variousoperations in this flowchart are presented and described sequentially,one of ordinary skill will appreciate that some or all of the operationsmay be executed in a different order, be combined or omitted, or beexecuted in parallel.

At operation 2202, a self-encrypting device is provided in a hostcomputer system having one or more processors, and a data channel.

From operation 2202, the method 2200 flows to operation 2204 forestablishing a clear communication channel between a data interface ofthe self-encrypting device and a data channel of the host computersystem. The clear communication channel is locked until theself-encrypting device is authenticated.

From operation 2204, the method 2200 flows to operation 2206 forreceiving, via a radio frequency (RF) transceiver of the self-encryptingdevice, user-authentication information.

From operation 2206, the method 2200 flows to operation 2208 where anauthentication subsystem of the self-encrypting device unlocks the clearcommunication channel based on the user-authentication information.

From operation 2208, the method 2200 flows to operation 2210 forencrypting data, received by the self-encrypting device through the datainterface, with an encryption key provided by the user-authenticationsubsystem of the self-encrypting device.

From operation 2210, the method 2200 flows to operation 2212, where theencrypted data is stored in a storage subsystem of the self-encryptingdevice.

In one example, the self-encrypting device authenticates a user withoutuse of the one or more processors of the host computer system.

In one example, the RF transceiver is configured for communication witha mobile device, wherein the mobile device sends the user-authenticationinformation to unlock the self-encrypting device.

In one example, an application in the mobile device provides a userinterface for obtaining the user-authentication information from a user.

In one example, an application in the mobile device authenticates a userby validating the user with a management server, wherein theself-encrypting device receives an unlock command from the mobile devicein response to the management server validating the user.

In one example, the host computer system further includes an encryptionengine, wherein the authentication subsystem stores an encryption keyand the authentication subsystem transmits the encryption key to theencryption engine when the self-encrypting device is unlocked.

In one example, the self-encrypting device initializes a timer when ashutdown of the system is detected, wherein the self-encrypting deviceinitializes in a locked state and the self-encrypting device isautomatically unlocked if the self-encrypting device is initializedbefore an expiration of the timer.

In one example, data is transmitted in clear form between the datainterface and the data channel.

In one example, the authentication subsystem stores an authenticationkey for authenticating a user for unlocking the self-encrypting device.

In one example, the host computer system is one of a laptop, a personalcomputer, a kitchen appliance, a printer, a scanner, a server, a tabletdevice, or a smart television set.

FIG. 23 is a flowchart of a method 2300 for remote management ofself-encrypting devices with host-independent autonomous wirelessauthentication, according to some example embodiments. While the variousoperations in this flowchart are presented and described sequentially,one of ordinary skill will appreciate that some or all of the operationsmay be executed in a different order, be combined or omitted, or beexecuted in parallel.

Operation 2302 is for providing a user interface to access a managementserver for managing users of self-encrypting devices. The managementserver comprises a database storing information about the users and theself-encrypting devices.

From operation 2302, the method 2300 flows to operation 2304 forreceiving, by the management server, a request from a mobile device tounlock a self-encrypting device for a user, the self-encrypting devicebeing in wireless communication with the mobile device.

From operation 2304, the method 2300 flows to operation 2306 where themanagement server verifies user-authentication information of the user,received in the request, for unlocking access to the self-encryptingdevice.

From operation 2306, the method 2300 flows to operation 2308 where themanagement server sends an unlock command to the mobile device based onthe checking, the mobile device sending an unlock request to theself-encrypting device via the wireless communication. Theself-encrypting device is configured to unlock the data channel, toprovide data access to encrypted storage in the self-encrypting device.

In one example, the method 2300 further comprises receiving, via theuser interface, a second request to lock the self-encrypting device;detecting, by the management server, a connection with the mobile devicein wireless communication with the self-encrypting device; and sending alock command to the mobile device to lock the self-encrypting device.

In one example, the method 2300 further comprises receiving, via theuser interface, a third request to reset the self-encrypting device;detecting, by the management server, a connection with the mobile devicein wireless communication with the self-encrypting device; and sending areset command to the mobile device, the self-encrypting deviceconfigured to delete an encryption key in the self-encrypting device inresponse to the reset command.

In one example, the method 2300 further comprises providing, in the userinterface, options to configure the self-encrypting devices, the optionsbeing to reset, enable, disable, lock, or unlock each self-encryptingdevice.

In one example, each drive has a unique hardware identifier stored inthe database.

In one example, the method 2300 further comprises providing, in the userinterface, options to allow access to one or more self-encryptingdevices by a given user.

In one example, the method 2300 further comprises providing, in the userinterface, options to establish geographic boundaries for use of theself-encrypting devices by the user.

In one example, the method 2300 further comprises providing, in the userinterface, options to establish time-of-day boundaries for use of theself-encrypting devices by the user.

In one example, the method 2300 further comprises providing in the userinterface, options to manage licenses for an account in the managementserver, the options including determining a maximum number ofadministrators, a maximum number of self-encrypting devices, and amaximum number of users.

In one example, the method 2300 further comprises providing, in the userinterface, options to view self-encrypting device activity includingdata of provisioning, user that provisioned, time of last access, userin last access, and geographic location of last access.

FIG. 24 is a block diagram illustrating an example of a machine 2400upon or by which one or more example process embodiments describedherein may be implemented or controlled. In alternative embodiments, themachine 2400 may operate as a standalone device or may be connected(e.g., networked) to other machines. In a networked deployment, themachine 2400 may operate in the capacity of a server machine, a clientmachine, or both in server-client network environments. In an example,the machine 2400 may act as a peer machine in a peer-to-peer (P2P) (orother distributed) network environment. Further, while only a singlemachine 2400 is illustrated, the term “machine” shall also be taken toinclude any collection of machines that individually or jointly executea set (or multiple sets) of instructions to perform any one or more ofthe methodologies discussed herein, such as via cloud computing,software as a service (SaaS), or other computer cluster configurations.

Examples, as described herein, may include, or may operate by, logic, anumber of components, or mechanisms. Circuitry is a collection ofcircuits implemented in tangible entities that include hardware (e.g.,simple circuits, gates, logic, etc.). Circuitry membership may beflexible over time and underlying hardware variability. Circuitriesinclude members that may, alone or in combination, perform specifiedoperations when operating. In an example, hardware of the circuitry maybe immutably designed to carry out a specific operation (e.g.,hardwired). In an example, the hardware of the circuitry may includevariably connected physical components (e.g., execution units,transistors, simple circuits, etc.) including a computer-readable mediumphysically modified (e.g., magnetically, electrically, by moveableplacement of invariant massed particles, etc.) to encode instructions ofthe specific operation. In connecting the physical components, theunderlying electrical properties of a hardware constituent are changed(for example, from an insulator to a conductor or vice versa). Theinstructions enable embedded hardware (e.g., the execution units or aloading mechanism) to create members of the circuitry in hardware viathe variable connections to carry out portions of the specific operationwhen in operation. Accordingly, the computer-readable medium iscommunicatively coupled to the other components of the circuitry whenthe device is operating. In an example, any of the physical componentsmay be used in more than one member of more than one circuitry. Forexample, under operation, execution units may be used in a first circuitof a first circuitry at one point in time and reused by a second circuitin the first circuitry, or by a third circuit in a second circuitry, ata different time.

The machine (e.g., computer system) 2400 may include a hardwareprocessor 2402 (e.g., a central processing unit (CPU), a hardwareprocessor core, or any combination thereof), a self-encrypting drive(SED) 2403, a main memory 2404, and a static memory 2406, some or all ofwhich may communicate with each other via an interlink (e.g., bus) 2408.The machine 2400 may further include a display device 2410, analphanumeric input device 2412 (e.g., a keyboard), and a user interface(UI) navigation device 2414 (e.g., a mouse). In an example, the displaydevice 2410, alphanumeric input device 2412, and UI navigation device2414 may be a touch screen display. The machine 2400 may additionallyinclude a mass storage device (e.g., drive unit) 2416, a signalgeneration device 2418 (e.g., a speaker), a network interface device2420, and one or more sensors 2421, such as a Global Positioning System(GPS) sensor, compass, accelerometer, or another sensor. The machine2400 may include an output controller 2428, such as a serial (e.g.,universal serial bus (USB)), parallel, or other wired or wireless (e.g.,infrared (IR), near field communication (NFC), etc.) connection tocommunicate with or control one or more peripheral devices (e.g., aprinter, card reader, etc.).

The mass storage device 2416 may include a machine-readable medium 2422on which is stored one or more sets of data structures or instructions2424 (e.g., software) embodying or utilized by any one or more of thetechniques or functions described herein. The instructions 2424 may alsoreside, completely or at least partially, within the main memory 2404,within the static memory 2406, within the hardware processor 2402, orwithin the SED 2403 during execution thereof by the machine 2400. In anexample, one or any combination of the hardware processor 2402, the SED2403, the main memory 2404, the static memory 2406, or the mass storagedevice 2416 may constitute machine-readable media.

While the machine-readable medium 2422 is illustrated as a singlemedium, the term “machine-readable medium” may include a single medium,or multiple media, (e.g., a centralized or distributed database, and/orassociated caches and servers) configured to store the one or moreinstructions 2424.

The term “machine-readable medium” may include any medium that iscapable of storing, encoding, or carrying instructions 2424 forexecution by the machine 2400 and that cause the machine 2400 to performany one or more of the techniques of the present disclosure, or that iscapable of storing, encoding, or carrying data structures used by orassociated with such instructions 2424. Non-limiting machine-readablemedium examples may include solid-state memories, and optical andmagnetic media. In an example, a massed machine-readable mediumcomprises a machine-readable medium 2422 with a plurality of particleshaving invariant (e.g., rest) mass. Accordingly, massed machine-readablemedia are not transitory propagating signals. Specific examples ofmassed machine-readable media may include non-volatile memory, such assemiconductor memory devices (e.g., Electrically Programmable Read-OnlyMemory (EPROM), Electrically Erasable Programmable Read-Only Memory(EEPROM)) and flash memory devices; magnetic disks, such as internalhard disks and removable disks; magneto-optical disks; and CD-ROM andDVD-ROM disks.

The instructions 2424 may further be transmitted or received over acommunications network 2426 using a transmission medium via the networkinterface device 2420.

As used herein, the term “or” may be construed in either an inclusive orexclusive sense. Moreover, plural instances may be provided forresources, operations, or structures described herein as a singleinstance. Additionally, boundaries between various resources,operations, modules, engines, and data stores are somewhat arbitrary,and particular operations are illustrated in a context of specificillustrative configurations. Other allocations of functionality areenvisioned and may fall within a scope of various embodiments of thepresent disclosure. In general, structures and functionality presentedas separate resources in the example configurations may be implementedas a combined structure or resource. Similarly, structures andfunctionality presented as a single resource may be implemented asseparate resources. These and other variations, modifications,additions, and improvements fall within a scope of embodiments of thepresent disclosure as represented by the appended claims. Thespecification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense.

While the invention has been described in conjunction with a specificbest mode, it is to be understood that many alternatives, modifications,and variations will be apparent to those skilled in the art in light ofthe foregoing description. Accordingly, it is intended to embrace allsuch alternatives, modifications, and variations that fall within thescope of the included claims. All matters set forth herein or shown inthe accompanying drawings are to be interpreted in an illustrative andnon-limiting sense.

What is claimed is:
 1. A method comprising: providing a user interfacefor configuring access parameters to access a security device from ahost device through a data channel, the access through the data channelbeing disabled until a user is authenticated based on the accessparameters; receiving, by the security device from a wireless device viawireless communication separate from the data channel, a command toenable the access through the data channel to the security device basedon user authentication received by the wireless device and the accessparameters; enabling access through the data channel to the securitydevice based on the received command and the access parameters; trackinga proximity between the security device and the wireless device; andautomatically disabling access, based on the access parameters, throughthe data channel when the wireless device is not within a predeterminedproximity for a predetermined time period.
 2. The method as recited inclaim 1, further comprising: providing in the user interface an optionto reset the security device; sending, to the security device, aremote-wipe command based on a selection of the option to reset thesecurity device; and deleting, by the security device, an encryption keyin the security device based on the remote-wipe command.
 3. The methodas recited in claim 1, wherein the user interface provides an option forcontrolling operation of a motor in the host device.
 4. The method asrecited in claim 1, wherein the host device is a camera, wherein thesecurity device provides controlled access to the camera.
 5. The methodas recited in claim 1, wherein the host device is a door access controlsystem, wherein the security device provides controlled access to unlockthe door.
 6. The method as recited in claim 1, wherein the wirelesscommunication is one of Wireless Fidelity (WiFi), Bluetooth (BT), orNear Field Communication (NFC).
 7. The method as recited in claim 1,wherein the security device is one of a Universal Serial Bus (USB)drive, a solid-state drive (SSD), a hard disk drive (HDD), or a memorycard.
 8. The method as recited in claim 1, further comprising:providing, in the user interface, options to configure the securitydevice, the options being to reset, enable, disable, lock, unlock,password recovery, password change, or configure the access parametersof the security device.
 9. The method as recited in claim 1, furthercomprising: providing, in the user interface, options to establishgeographic boundaries for use of the security device by the user, thegeographic boundaries defined for a location of the wireless device. 10.The method as recited in claim 1, further comprising: providing in theuser interface an option to disable access by a given user to thesecurity device permanently or for a limited time.
 11. The method asrecited in claim 1, further comprising: executing an application on thewireless device upon connection of the security device to the hostdevice; and providing, by the application, a user interface for enteringuser authentication to enable access to the security device through thedata channel.
 12. A system comprising: a memory; and one or morecomputer processors, wherein instructions, when executed by the one ormore computer processors, cause the system to perform operationscomprising: providing a user interface for configuring access parametersto access a security device from a host device through a data channel,the access through the data channel being disabled until a user isauthenticated based on the access parameters; receiving, by the securitydevice from a wireless device via wireless communication separate fromthe data channel, a command to enable the access through the datachannel to the security device based on user authentication received bythe wireless device and the access parameters; enabling access throughthe data channel to the security device based on the received commandand the access parameters; tracking a proximity between the securitydevice and the wireless device; and automatically disabling access,based on the access parameters, through the data channel when thewireless device is not within a predetermined proximity for apredetermined time period.
 13. The system as recited in claim 12,wherein the instructions further cause the one or more computerprocessors to perform operations comprising: providing in the userinterface an option to reset the security device; sending, to thesecurity device, a remote-wipe command based on a selection of theoption to reset the security device; and deleting, by the securitydevice, an encryption key in the security device based on theremote-wipe command.
 14. The system as recited in claim 12, wherein thesecurity device is one of a Universal Serial Bus (USB) drive, asolid-state drive (SSD), a hard disk drive (HDD), or a memory card. 15.The system as recited in claim 12, wherein the instructions furthercause the one or more computer processors to perform operationscomprising: providing in the user interface an option to disable accessby a given user to the security device permanently or for a limitedtime.
 16. The system as recited in claim 12, further comprising:executing an application on the wireless device upon connection of thesecurity device to the host device; and providing, by the application, auser interface for entering user authentication to enable access to thesecurity device through the data channel.
 17. A non-transitorymachine-readable storage medium including instructions that, whenexecuted by a machine, cause the machine to perform operationscomprising: providing a user interface for configuring access parametersto access a security device from a host device through a data channel,the access through the data channel being disabled until a user isauthenticated based on the access parameters; receiving, by the securitydevice from a wireless device via wireless communication separate fromthe data channel, a command to enable the access through the datachannel to the security device based on user authentication received bythe wireless device and the access parameters; enabling access throughthe data channel to the security device based on the received commandand the access parameters; tracking a proximity between the securitydevice and the wireless device; and automatically disabling access,based on the access parameters, through the data channel when thewireless device is not within a predetermined proximity for apredetermined time period.
 18. The non-transitory machine-readablestorage medium as recited in claim 17, wherein the machine furtherperforms operations comprising: providing in the user interface anoption to reset the security device; sending, to the security device, aremote-wipe command based on a selection of the option to reset thesecurity device; and deleting, by the security device, an encryption keyin the security device based on the remote-wipe command.
 19. Thenon-transitory machine-readable storage medium as recited in claim 17,wherein the security device is one of a Universal Serial Bus (USB)drive, a solid-state drive (SSD), a hard disk drive (HDD), or a memorycard.
 20. The non-transitory machine-readable storage medium as recitedin claim 17, wherein the machine further performs operations comprising:providing in the user interface an option to disable access by a givenuser to the security device permanently or for a limited time.