On-demand physically secure data storage

ABSTRACT

Safe deposit boxes, services, and methods for physically secure data storage are provided that include securing a network-enabled computer within a safe deposit box, receiving, in the network-enabled computer, data transmitted from a remote computer coupled for data communications with the network-enabled computer; and storing the data in the memory of the network-enabled computer. Securing a network-enabled computer within a safe deposit box may be carried out by providing a locked safe deposit box having the networked enabled computer stored within. Securing a network-enabled computer within a safe deposit box may be carried out by providing a lockable safe deposit box having the networked enabled computer integrated within.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The field of the invention is data processing, or, more specifically,methods, systems, and products for physically secure data storage.

2. Description of Related Art

Safe deposit boxes have long been used for physically securingvaluables. A safe deposit box (or safety deposit box) is a type of safeusually located in groups inside a vault in a bank, post office, orother physically secure location. A safe deposit box is useful forphysically securing valuables such jewels, money, or important documentssuch as wills or property deeds. A safe deposit box provides physicalsecurity for these valuables from theft, fire, flood, and othercalamities. In a typical arrangement, a user pays the service providerthat maintains the security of the safe deposit box, such as a bank orpost office, a fee for the use of the box, which can be opened only withproduction of the assigned key, the bank's master key, the propersignature, a code, a driver's license, or other required information oridentification.

Some security minded users of data may store static digital mediarecorded on, for example USB key or a recordable compact disc, in a safedeposit box. Storing this static data in the safe deposit box, however,requires a user to travel to the safe deposit box and deposit within thesafe deposit box the digital media containing the static data content.Traveling to the safe deposit box may be time consuming and cumbersomefor a user. There is therefore an ongoing need for on-demand physicallysecure data storage.

SUMMARY OF THE INVENTION

Safe deposit boxes, services, and methods for physically secure datastorage are provided that include securing a network-enabled computerwithin a safe deposit box, receiving, in the network-enabled computer,data transmitted from a remote computer coupled for data communicationswith the network-enabled computer; and storing the data in the memory ofthe network-enabled computer. Securing a network-enabled computer withina safe deposit box may be carried out by providing a locked safe depositbox having the networked enabled computer stored within. Securing anetwork-enabled computer within a safe deposit box may be carried out byproviding a lockable safe deposit box having the networked enabledcomputer integrated within.

Receiving, in a network-enabled computer, data transmitted from a remotecomputer coupled for data communications with the network-enabledcomputer may include receiving encrypted data. Storing the data in thememory of the network-enabled computer may also include decrypting thereceived encrypted data.

The foregoing and other objects, features and advantages of theinvention will be apparent from the following more particulardescriptions of exemplary embodiments of the invention as illustrated inthe accompanying drawings wherein like reference numbers generallyrepresent like parts of exemplary embodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 sets forth a network diagram illustrating an exemplary system ofcomputers useful in physically secure data storage according toembodiments of the present invention.

FIG. 2 sets forth a line drawing of a safe deposit box having a networkenabled computer permanently integrated within the safe deposit box.

FIG. 3 sets forth a block diagram of the safe deposit box of FIG. 2useful in physically secure data storage according to embodiments of thepresent invention.

FIG. 4 sets forth a line drawing of a safe deposit box for data storageaccording to the present invention that does not include a permanentlyintegrated network enabled computer.

FIG. 5 sets forth a line drawing for an exemplary safe deposit box thatprovides network and power connectivity within the safe deposit box.

FIG. 6 sets forth a flow chart illustrating an exemplary method forphysically secure data storage according to embodiments of the presentinvention.

FIG. 7 sets forth a flow chart illustrating an exemplary service forsecure data storage according to embodiments of the present invention.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS On-Demand PhysicallySecure Data Storage

Exemplary methods, safe deposit boxes, and services for physicallysecure data storage according to embodiments of the present inventionare described with reference to the accompanying drawings, beginningwith FIG. 1. FIG. 1 sets forth a network diagram illustrating anexemplary system of computers useful in physically secure data storageaccording to embodiments of the present invention. The data processingsystem of FIG. 1 includes wide area network (“WAN”) (101). The networkconnection aspect of the architecture of FIG. 1 is only for explanation,not for limitation. In fact, systems for physically secure data storagemay be connected as LANs, WANs, intranets, internets, the Internet,webs, the World Wide Web itself, or other connections as will occur tothose of skill in the art. Such networks are media that may be used toprovide data communications connections between various devices andcomputers connected together within an overall data processing system.

In the example of FIG. 1, several exemplary remote computers includingpersonal computer (108), a PDA (112), a computer workstation (104), amobile phone (110), and laptop (126) are connected to the WAN (101).Network-enabled mobile phone (110) connects to the WAN (101) through awireless link (116), the laptop (126) connects to the WAN (101) througha wireless link (118), and the PDA (112) connects to the network (101)through a wireless link (114). In the example of FIG. 1, the personalcomputer (108) connects to the WAN (101) through a wireline connection(120) and the computer workstation (104) connects to the WAN (101)through a wireline connection (122).

Also connected to the WAN (101), in the example of FIG. 1, is a networkenabled computer (106) secured within a safe deposit box (186). A safedeposit box is a physically secure box often leased to a user andmaintained by a service provider such as a bank, post office, or otherinstitution. The exemplary safe deposit box (186) of FIG. 1 is locatedwithin a bank vault (188) thereby providing secure physical storage ofthe computer (106).

The network enabled computer (106) secured within a safe deposit box(186) of FIG. 1 is capable generally of receiving transmitted from anyof the remote computers (108, 112, 104, 110, 126) and storing the datain the memory of the network-enabled computer (106). The network enabledcomputer (106) secured within a safe deposit box (186) therebyadvantageously provides physically secure storage of data available fortransmission on-demand from any of the remote computers. The networkenabled computer (106) secured within a safe deposit box (186) of FIG. 1is also capable of wireline or wireless connectivity to the network.

The arrangement of servers and other devices making up the exemplarysystem illustrated in FIG. 1 are for explanation, not for limitation.Data processing systems useful according to various embodiments of thepresent invention may include additional servers, routers, otherdevices, and peer-to-peer architectures, not shown in FIG. 1, as willoccur to those of skill in the art. Networks in such data processingsystems may support many data communications protocols, including forexample TCP/IP, HTTP, WAP, HDTP, and others as will occur to those ofskill in the art. Various embodiments of the present invention may beimplemented on a variety of hardware platforms in addition to thoseillustrated in FIG. 1.

Computers (106) may be physically secured within safe deposit boxesaccording to the present invention by permanently integrating within asafe deposit box a network enabled computer, by providing safe depositbox capable of receiving within the safe deposit box a network enabledcomputer, or in other ways as will occur to those of skill in the art.For further explanation, FIG. 2 sets forth a line drawing of a safedeposit box having a network enabled computer permanently integratedwithin the shell of the safety deposit box. FIG. 2 sets forth a linedrawing of a safety deposit box (202) with two views (200 and 201). Thefirst view (200) illustrates the outside of the safety deposit box. Theexemplary safety deposit box (202) includes a lockable shell (203)having a door (206) allowing access to the interior of the safe depositbox (202). The door (206) has a combination lock (204) for locking thedoor (206) of the lockable shell (203) of the safe deposit box (202).The combination a lock (204) of FIG. 2 is for illustration and not forlimitation. In fact, many locks may be useful for securing a lockableshell of a safe deposit box. Such locks include pad locks, barrel locks,and others that will occur to those of skill in the art.

The second view (201) of the safe deposit box (202) of FIG. 2 provides aview of the interior of the safe deposit box (202). The safety depositbox (202) of FIG. 2 includes a network enabled computer (208)permanently integrated within the safe deposit box (202). The safedeposit box (202) provides physically secure data storage of data storedonto the network enabled computer (208) permanently integrated within.The safe deposit box of FIG. 2 advantageously provides an interiorcapable of traditional physical storage of physical valuables, as wellas physically secure data storage on the network enabled computer (208).

For further explanation, FIG. 3 sets forth a block diagram of the safedeposit box (202) of FIG. 2 useful in physically secure data storageaccording to embodiments of the present invention. The safe deposit box(202) of FIG. 2 includes a permanently integrated network enabledcomputer (208). The computer (206) of FIG. 3 includes at least onecomputer processor (156) or ‘CPU’ as well as random access memory (168)(“RAM”) which is connected through a system bus (160) to processor (156)and to other components of the computer.

Stored in RAM (168) is an operating system (154). Operating systemsuseful in computers according to embodiments of the present inventioninclude UNIX™, Linux™, Microsoft Windows NT™, AIX™, IBM's i5/OS™, andothers as will occur to those of skill in the art.

Also stored in RAM (168) is a secured data transfer program, in thisexample, a secure shell program (‘SSH’) (208). The SSH program includescomputer instructions for securely receiving data for physically securestorage on the network enabled computer secured within the safe depositbox. SSH is a program capable of logging into another computer over anetwork, executing commands in a remote computer, and moving files fromone computer to another across a network. SSH provides strongauthentication and secure communications over insecure channels bytunneling data in encrypted sessions.

Also stored RAM (168) in the example of FIG. 3 is a synchronizationdaemon (210). The synchronization daemon (210) of FIG. 3 includecomputer program instructions that run in the background and atpredefined times or in response to certain events. The synchronizationdaemon initiates a secure connection with a remote computer andinitiates the transfer of data for physically secure storage on thenetwork enabled computer. The term ‘daemon’ is typically term used inUNIX based systems. The term is used in this specification forexplanation and not for limitation to mean a process that runs in thebackground and at predefined times or in response to certain events. Infact many operating systems provide support for daemons, though they aresometimes called other names. Windows, for example, refers to daemons as‘system agents’ and ‘services.’

The network enabled computer (206) secured within the safe deposit boxof FIG. 3 includes non-volatile computer memory (166) coupled through asystem bus (160) to processor (156) and to other components of thecomputer. Non-volatile computer memory (166) may be implemented as ahard disk drive (170), optical disk drive (172), electrically erasableprogrammable read-only memory space (so-called ‘EEPROM’ or ‘Flash’memory) (174), RAM drives (not shown), or as any other kind of computermemory as will occur to those of skill in the art. The non-volatilememory of FIG. 3 may be permanently secured within the network enabledcomputer or be implemented as removable non-volatile memory allowing auser to conveniently physically remove the media on which data has bephysically stored according to embodiments of the present invention.

For further network security of the data stored within the safe depositbox, the disk drives of the network enable computer of FIG. 3 may beconfigured to perform ‘write only operations.’ Strictly speaking, a diskdrive cannot be totally write only because the disk drive must be ableto read track and sector of the non-volatile memory to write data tothat memory. A disk drive may be configured, however, to be ‘write only’by configuring the disk drive to ignore all received read commandsthereby effectively making the disk drive write-only. The write-onlydisk drive may alternatively be configured to return in response to allread instructions an error message or return in response to the readinstruction data unrelated to the read instruction. Such data unrelatedto the read instruction may include predetermined data to send inresponse to all read instructions or unrelated data created in real timein response to the read instruction. Such a write only drive within thenetwork enabled computer secured within a safe deposit box reduces thenetwork secure requirements for secure data storage.

For additional security, a disk drive may be augmented to requirephysical access to the computer to read from non-volatile memory. Such adisk drive may include for example a read enable switch accessible onlywith physical access to the computer. Such a read enable switch may beused to switch the disk drive from a ‘normal read’ state that providesnormal read functions of the disk drive and a ‘write only’ state that,for example, ignores all received read commands, returns in response toall read instructions an error message, or returns in response to theread instruction data unrelated to the read instruction.

For additional security, the network enabled computer within a safedeposit box with a write only disk drive may also include removablenon-volatile memory thereby allowing a user to periodically retrieve thenon-volatile memory from the network enabled computer and then read thedata from the memory using another computer that has not be configuredto ignore read commands.

The exemplary network enabled computer (206) of FIG. 3 includes acommunications adapter (167) for implementing data communications (184)with other remote computers (182). Such data communications may becarried out through serially through RS-232 connections, throughexternal buses such as USB, through data communications networks such asIP networks, and in other ways as will occur to those of skill in theart. Communications adapters implement the hardware level of datacommunications through which one computer sends data communications toanother computer, directly or through a network. Examples ofcommunications adapters useful for physically secure data storageaccording to embodiments of the present invention include modems forwired dial-up communications, Ethernet (IEEE 802.3) adapters for wirednetwork communications, and 802.11b adapters for wireless networkcommunications.

The safe deposit boxes including a permanently integrated networkenabled computer described with reference to FIGS. 2 and 3 are forexplanation and not for limitation. In fact, safe deposit boxes usefulin physically secure data storage according to embodiments of thepresent invention may be implemented in a number of ways. For furtherexplanation therefore, FIG. 4 sets forth a line drawing of a safedeposit box for data storage according to the present invention thatdoes not include a permanently integrated network enabled computer. Theexemplary safe deposit box (250) of FIG. 4 is illustrated in two views(220 and 222). The first view (220) illustrating the front of theexemplary safe deposit box (250) includes a lockable shell (252) capableof receiving a network enabled computer. The lockable shell (252)capable of receiving a network enabled computer may be various shapesand sizes to accommodate various network enabled computers.

The lockable shell (252) of the safe deposit box (252) of FIG. 4 alsoincludes a door (228) providing access to the interior of the safedeposit box (252). The door (228) of the lockable shell (252) includes acombination a lock (230) for securing the lockable shell. Thecombination a lock (230) of FIG. 4 is for illustration and not forlimitation. In fact, many locks may be useful for securing a lockableshell of a safe deposit box. Such locks include pad locks, barrel locks,and others that will occur to those of skill in the art.

The second view (222) of FIG. 4 shows the exemplary safe deposit box(250) from the rear. The lockable shell (252) capable of receiving anetwork enabled computer within includes an aperture (226) for receivinga network cable within the lockable shell and an aperture (224) forreceiving a power cable within the lockable shell. The aperture (226)for receiving a network cable within the lockable shell and the aperture(224) for receiving a power cable within the lockable shell may besufficient sizes to provide network and power access to the computerstored within the safe deposit box.

Providing apertures for receiving a network cable and power cableswithin the lockable shell may result in a service provider of safedeposit boxes having to provide many networks and power outlets outsidethe safe deposit box. This may be cumbersome. For further explanation,FIG. 5 sets forth a line drawing for an exemplary safe deposit box thatprovides network and power connectivity within the safe deposit box. Theexemplary safe deposit box (280) of FIG. 5 is illustrated in two views(240 and 242). The first view (240) illustrating the front of theexemplary safe deposit box (280) includes a lockable shell (282) capableof receiving a network enabled computer. The lockable shell (282)capable of receiving a network enabled computer may be various shapesand sizes to accommodate various network enabled computers.

The lockable shell (282) of the safe deposit box (280) of FIG. 5 alsoincludes a door (244) providing access to the interior of the safedeposit box (280). The door (244) of the lockable shell (282) includes acombination a lock (246) for securing the lockable shell. Thecombination a lock (246) of FIG. 5 is for illustration and not forlimitation. In fact, many locks may be useful in securing a lockableshell of a safe deposit box. Such locks include pad locks, barrel locks,and others that will occur to those of skill in the art.

The second view (242) of FIG. 5 shows the exemplary safe deposit box(280) from the interior. The lockable shell (282) capable of receiving anetwork enabled computer within includes a power outlet (248) forreceiving a power plug of the power cable of the network enabledcomputer secured with the safe deposit box. The lockable shell (282)capable of receiving a network enabled computer within also includes anetwork port (270) for receiving a network cable to provide networkconnectivity to the computer secured with the safe deposit box.

The exemplary safe deposit boxes described with reference to FIGS. 2-5illustrate some exemplary ways in which safe deposit boxes forphysically secure data storage according to embodiments of the presentinvention may be implemented. The exemplary safe deposit boxes are forillustration and not for limitation. Safe deposit boxes according toembodiments of the present invention may be implemented in many ways inaccordance with the scope of the present invention.

For further explanation, FIG. 6 sets forth a flow chart illustrating anexemplary method for physically secure data storage according toembodiments of the present invention. The method of FIG. 6 includessecuring (302) a network-enabled computer (106) within a safe depositbox (186). Securing (302) a network-enabled computer (106) within a safedeposit box (186) may be carried out by providing a lockable safedeposit box having the networked enabled computer stored within. Suchsafe deposit boxes may have a lockable shell, such as the exemplarylockable shells described above, capable of receiving a network enabledcomputer and a lock for securing the lockable shell.

Securing (302) a network-enabled computer (106) within a safe depositbox (186) may also be carried out by providing a lockable safe depositbox having the networked enabled computer integrated within. Securing(302) a network-enabled computer (106) within a safe deposit box (186)provides a user with a traditional safe deposit box for physical storageof important possessions, as well as physically secure data storageaccording to embodiments of the present invention.

The method of FIG. 6 also includes receiving (304), in thenetwork-enabled computer (106), data (306) transmitted from a remotecomputer (104) coupled for data communications with the network-enabledcomputer (106). Receiving (304) data (306) transmitted from a remotecomputer (104) coupled for data communications with the network-enabledcomputer (106) may be initiated periodically by a synchronization daemonthat runs in the background and periodically initiates a connection witha remote computer (104) and initiates the transfer of data to thenetwork enabled computer (106) secured within the safe deposit box(186).

As discussed above, for network security often data received by thenetwork enabled computer is transmitted in encrypted form. Receiving(304) data (306) transmitted from a remote computer (104) coupled fordata communications with the network-enabled computer (106) according tothe method of FIG. 6 therefore includes receiving (602) encrypted data.As discussed above, a secured data transfer program, such as forexample, a secure shell program (‘SSH’) may be installed on the networkenabled computer (106) that is capable of authenticating a remotecomputer (104), logging into the remote computer (104) over a network,and tunneling data to the network enabled computer in an encryptedsession.

The method of FIG. 6 also includes storing (308) the data (306) in thememory (320) of the network-enabled computer (106). In the example ofFIG. 6, storing (308) the data (306) in the memory (320) of thenetwork-enabled computer (106) includes decrypting (604) the receivedencrypted data and storing the data in unencrypted form in memory (320)of the network enabled computer (106).

For further security, storing (308) the data (306) in the memory (320)of the network-enabled computer (324) may include writing the data toremovable non-volatile memory. Removable non-volatile memory allows auser to retrieve the data stored (310) in the network enabled computerwithout leaving a copy of the data in the network enabled computer.

As discussed above, for further network security, network enabledcomputers secured within a safe deposit box may be implemented withwrite only disk drives. As discussed above, a disk drive must be able toread track and sector of the non-volatile memory to write data to thatmemory. A disk drive may be configured to be ‘write only,’ however, byconfiguring the disk drive to ignore all received read commands therebyeffectively making the disk drive write-only, or to return an errormessage or data unrelated to the read instruction in response to allread commands.

Conventional safe deposit boxes are currently available through variousservice providers, such as, for example, banks, post offices, and otherinstitutions. Safe deposit boxes according to embodiments of the presentinvention may also advantageously be provided by service providers. Forfurther explanation therefore, FIG. 7 sets forth a flow chartillustrating an exemplary service for secure data storage that may becarried out by a service provider. The method of FIG. 7 includesproviding (710) for lease a physically secure safe deposit box (702)having stored within the safe deposit box a network enabled computer. Asdiscussed above, providing (710) for lease a physically secure safedeposit box (702) having stored within the safe deposit box a networkenabled computer may be carried out, for example, by a service providerwho provides for lease a physically secure safe deposit box capable ofreceiving with it a network enabled computer or a safe deposit boxhaving an integrated network enabled computer.

The method of FIG. 7 includes maintaining (712) the security of the safedeposit box (702) in a secure area (704). Maintaining (712) the securityof the safe deposit box (702) may be carried out by securing the safedeposit box within a vault or other physical fortification. Maintainingthe security of the safe deposit box may also include human securityguards, video surveillance equipment, and other security measures tomaintain the security of the safe deposit box as will occur to those ofskill in the art.

The method of FIG. 7 also includes maintaining (714) networkconnectivity (708) to the network enabled computer within the safedeposit box (702). Maintaining (714) network connectivity (708) to thenetwork enabled computer within the safe deposit box (702) may includemonitoring network connectivity and providing connectivity fail-over.Maintaining (714) network connectivity (708) to the network enabledcomputer within the safe deposit box (702) may be carried out by theservice provider or outsourced to a third party who specializes innetwork maintenance.

The method of FIG. 7 also includes maintaining (716) power (706) to thenetwork enabled computer within the safe deposit box (702). Maintaining(716) power (706) to the network enabled computer within the safedeposit box (702) may include providing back up power generators forpower fail-over protection of the network enabled computers. Maintaining(716) power (706) to the network enabled computer within the safedeposit box (702) may be carried out by the service provider oroutsourced to a third party who specializes in power maintenance.

Exemplary embodiments of the present invention are described largely inthe context of a fully functional computer system for physically securedata storage. Readers of skill in the art will recognize, however, thataspects of the present invention also may be embodied in a computerprogram product disposed on signal bearing media for use with anysuitable data processing system. Such signal bearing media may betransmission media or recordable media for machine-readable information,including magnetic media, optical media, or other suitable media.Examples of recordable media include magnetic disks in hard drives ordiskettes, compact disks for optical drives, magnetic tape, and othersas will occur to those of skill in the art. Examples of transmissionmedia include telephone networks for voice communications and digitaldata communications networks such as, for example, Ethernets™ andnetworks that communicate with the Internet Protocol and the World WideWeb. Persons skilled in the art will immediately recognize that anycomputer system having suitable programming means will be capable ofexecuting the steps of the method of the invention as embodied in aprogram product. Persons skilled in the art will recognize immediatelythat, although some of the exemplary embodiments described in thisspecification are oriented to software installed and executing oncomputer hardware, nevertheless, alternative embodiments implemented asfirmware or as hardware are well within the scope of the presentinvention.

It will be understood from the foregoing description that modificationsand changes may be made in various embodiments of the present inventionwithout departing from its true spirit. The descriptions in thisspecification are for purposes of illustration only and are not to beconstrued in a limiting sense. The scope of the present invention islimited only by the language of the following claims.

1. A method for physically secure data storage, the method comprising:securing a network-enabled computer within a safe deposit box,receiving, in the network-enabled computer, data transmitted from aremote computer coupled for data communications with the network-enabledcomputer; and storing the data in non-volatile memory of thenetwork-enabled computer.
 2. The method of claim 1 wherein securing anetwork-enabled computer within a safe deposit box further comprisesproviding a locked safe deposit box having the networked enabledcomputer stored within.
 3. The method of claim 1 wherein securing anetwork-enabled computer within a safe deposit box further comprisesproviding a lockable safe deposit box having the networked enabledcomputer integrated within.
 4. The method of claim 3 wherein receiving,in a network-enabled computer, data transmitted from a remote computercoupled for data communications with the network-enabled computerfurther comprises receiving encrypted data.
 5. The method of claim 4wherein storing the data in the memory of the network-enabled computerfurther comprises decrypting the received encrypted data.
 6. The methodof claim 1 wherein storing the data in the memory of the network-enabledcomputer further comprises writing the data to removable non-volatilememory.
 7. The method of claim 1 further comprising: receiving a readinstruction to read the data stored in the memory of the network-enabledcomputer; and returning in response to the read instruction an errormessage.
 8. The method of claim 1 further comprising: receiving a readinstruction to read the data stored in the memory of the network-enabledcomputer; and returning in response to the read instruction dataunrelated to the read instruction.
 9. The method of claim 1 wherein thenetwork-enabled computer is wirelessly connected to the network.
 10. Asafe deposit box for data storage; the safe deposit box comprising: alockable shell capable of receiving a network enabled computer within;and a lock for securing the lockable shell.
 11. The safe deposit box ofclaim 10 wherein the lockable shell capable of receiving a networkenabled computer within further comprises an aperture for receiving anetwork cable within the lockable shell and an aperture for receiving apower cable within the lockable shell.
 12. The safe deposit box of claim10 wherein the lockable shell capable of receiving a network enabledcomputer within further comprises a network port for networkconnectivity to the network enabled computer within and a power outletfor power connectivity to the network enabled computer.
 13. The safedeposit box of claim 10 wherein the lockable shell further comprises anetwork enabled computer permanently secured within the shell includinga computer processor; and a non-volatile computer memory coupled fordata transfer to the processor.
 14. The safe deposit box of claim 13wherein the network enabled computer permanently secured within theshell computer further comprises removable non-volatile memory.
 15. Thesafe deposit box of claim 13 wherein the computer memory has disposedwithin it a synchronization engine.
 16. The safe deposit box of claim 13wherein the computer memory has disposed within it a secure datatransfer program.
 17. A service for secure data storage, the servicecomprising: providing for lease a physically secure safe deposit boxhaving stored within the safe deposit box a network enabled computer;maintaining the security of the safe deposit box; maintaining networkconnectivity to the network enabled computer within the safe depositbox; and maintaining power to the network enabled computer within thesafe deposit box.
 18. The service of claim 17 wherein providing forlease a physically secure safe deposit box having stored within the safedeposit box a network enabled computer further comprises providing forlease a network enabled computer having a disk drive that requiresphysical access to the computer to enable normal read functions.
 19. Theservice of claim 17 further comprising providing for sale removablenon-volatile memory for storing data transferred to the network enabledcomputer.
 20. The service of claim 17 further comprising providing forlease removable non-volatile memory for storing data transferred to thenetwork enabled computer.