+

WO1999005601A1 - Systeme de securite - Google Patents

Systeme de securite Download PDF

Info

Publication number
WO1999005601A1
WO1999005601A1 PCT/AU1998/000572 AU9800572W WO9905601A1 WO 1999005601 A1 WO1999005601 A1 WO 1999005601A1 AU 9800572 W AU9800572 W AU 9800572W WO 9905601 A1 WO9905601 A1 WO 9905601A1
Authority
WO
WIPO (PCT)
Prior art keywords
housing
data processing
electronic data
processing means
access
Prior art date
Application number
PCT/AU1998/000572
Other languages
English (en)
Inventor
James Edward Green
Original Assignee
James Edward Green
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by James Edward Green filed Critical James Edward Green
Priority to AU83260/98A priority Critical patent/AU8326098A/en
Publication of WO1999005601A1 publication Critical patent/WO1999005601A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • This invention relates to a security system.
  • the invention has particular but not exclusive application to a security system for preventing unauthorised access to data or other information stored in or processed by electronic data processing systems.
  • electronic data processing system has a broad meaning and includes any system in which data is processed electronically.
  • electronic data processing systems include mobile telephones, computers, EFTPOS facilities and secure access systems.
  • mobile phones include a chip which when activated establishes a legalising assignment or identification to an individual phone.
  • a removable smart card then assigns a unique telephone number to the individual phone and when the legal assignment and the telephone number are associated upon use of the phone, billing procedures are initiated and directed to the owner of the phone. If unauthorised access to the interior of the phone casing is gained, the chip and phone software can be monitored and data flow and analysed whereby telephone account billings can be falsified.
  • access to the interior of the devices simplifies access to security codes embedded in an EEPROM chip for example, and allows monitoring of data flow and analysis of the "eavesdropped" data to enable decryption of the encrypted messages.
  • switching means which are activated when the case containing the chip or software to be secured is opened.
  • the switching means activates a mechanism to protect the chip or software.
  • the present invention aims to provide an alternative to known security systems for preventing unauthorised access to data or other information stored in or processed by electronic data processing systems.
  • This invention in one aspect resides broadly in a security system for preventing unauthorised access to data or other information stored in or processed by electronic data processing means enclosed within a housing, the security system including:- detection means for detecting access or attempted access to the electronic data processing means from without the housing, and destruction means for destroying the data or other information stored in or processed by the electronic data processing means.
  • the detection means are adapted to activate the destruction means to destroy the data or other information stored in or processed by the electronic data processing means upon detection by the detection means of access or attempted access to the electronic data processing means from without the housing.
  • the detection means may take various forms and in one embodiment may be a normally open switch closed when the housing is opened.
  • the housing may be sealed with the electronic data processing means may be sealed within the housing and the interior of the housing pressurised to above atmospheric pressure with the detection means comprising a pressure sensitive switch.
  • the detection means includes processor circuit means in the electronic data processing means, and housing circuit means in the housing.
  • the processor circuit means and the housing circuit may constitute a reactance circuit and the reactance may be either a capacitive reactance or an inductive reactance.
  • the system includes :- oscillator means tuned to the reactance circuit for generating a fixed frequency; frequency detector means for detecting variation from the fixed frequency, and switching means responsive to detection of the frequency variation to apply a voltage to destroy the chip containing the data or other information stored in or processed by the electronic data processing means.
  • the destruction means includes a stand-alone power supply independent of the primary power supply to the electronic data processing means .
  • the arrangement may also include voltage detection means for detecting a predetermined minimum threshold voltage in the stand-alone power supply, the voltage detection means actuating the stand-alone power supply to destroy the data or other information stored in or processed by the electronic data processing means upon detection by the voltage detection means of the predetermined minimum threshold voltage. It is preferred that the system further includes warning means for warning that the voltage of the stand-alone power supply is approaching the predetermined minimum threshold voltage.
  • this invention resides broadly in a method of preventing unauthorised access to data or other information stored in or processed by electronic data processing means enclosed within a housing, the method including:- detecting access or attempted access to the electronic data processing means from without the housing, and destroying the data or other information stored in or processed by the electronic data processing means in response to detection of the access or attempted access.
  • the method includes :- locating processor circuit means in the electronic data processing means, and locating housing circuit means in the housing; wherein the processor circuit means and the housing means constitute detection means for detecting access or attempted access to the electronic data processing means from without the housing.
  • this invention resides broadly in a mobile telephone including :- a housing; electronic data processing means enclosed within the housing; detection means for detecting access or attempted access to the electronic data processing means from without the housing, and destruction means for destroying the data or other information stored in or processed by the electronic data processing means.
  • FIG 1 is a schematic illustration of a housing containing a chip
  • FIG 2 is a schematic illustration of a mobile telephone
  • FIG 3 is a schematic circuit diagram of an arrangement to destroy the chip if the security of the housing is breached
  • FIG 4 schematically illustrates a reactance coupling for detecting if the security of the housing is breached
  • FIG 5 is a schematic circuit diagram illustrating the operation of a security system in accordance with the invention which includes an inductive coupling
  • FIG 6 is a schematic circuit diagram illustrating the operation of a security system in accordance with the invention which includes a capacitive coupling and an independent internal power supply to destroy the chip.
  • a housing 10 contains a chip 11 to which it is desired to prevent close physical access.
  • a practical example is a mobile telephone 14 illustrated in FIG 2 which has a housing 15, a battery power pack 16 covering a hatchway 17 providing access to internal componentry including chip 18.
  • an internal power-supply in the form of a long-life battery 13 is connectable through normally open switch 12 to chip 11.
  • switch 12 When switch 12 is enabled, voltage source 13 is connected across chip 11 and destroys it.
  • Switch 12 is activated by detection means 37 which detect any breaching of housing 10. Consequently if an attempt is made to locate a monitor or data analyser physically close to chip 11, as for example by opening a hatchway, removing a cover or even drilling a hole to insert a micro-device, the breaching of housing 10 is detected by detection means 37, and power is applied from voltage source 13 to destroy chip 11.
  • the security system of the present invention preserves security by destroying any sensitive data before it can be accessed. It will be appreciated that the chip will be destroyed on all occasions when the integrity of housing 10 is breached. This means that the chip is destroyed even when authentic repair work is being carried out and the housing is opened legitimately.
  • the chips to be protected may be completely sealed within an integral housing (not shown) and the housing pressurised to a pressure above or below atmospheric.
  • a pressure sensitive switch (not shown) detects the variation in pressure if the housing is breached and closes the circuit to destroy the chip as described above.
  • the housing can include two surfaces juxtaposed when the housing is closed and separated when the housing is opened. Juxtaposition of the surfaces has the effect of opening a normally closed electrical switch. If the juxtaposed surfaces become separated the switch closes and the circuit to a power supply is completed to destroy the chip.
  • the juxtaposed surfaces 19 and 20 may each include a circuit component 21,22 such that the juxtaposed components constitute a reactance coupling circuit.
  • FIGS 5 and 6 respectively illustrate inductive and capacitive coupling of the juxtaposed surfaces to effect destruction of the chip when the reactance of the coupling circuit varies.
  • Induction loops 23 and 24 (in FIG 5) and capacitor plates 29 and 30 (in FIG 6) are respectively positioned in juxtaposed surfaces of the housing hatch and the housing per se.
  • oscillator 25 generates a fixed frequency in accordance with the reactance of coupling 23,24 or 29,30.
  • Frequency detector 26 detects variation in the frequency from oscillator 25 generated by variation in the reactance of the coupling by breaching the housing by separating the normally juxtaposed surfaces. If frequency detector 26 detects a variation in the frequency, a normally open switch 27 is closed to connect independent voltage supply 28 across the chip to thereby destroy it.
  • a minimum threshold voltage detector 29 is connected across long-life battery 28 to detect when the voltage drops to a predetermined level.
  • a warning signal can be generated by signal generating means (not shown) to give a warning as the voltage of power source 28 approaches the minimum threshold level.
  • the so called “scorched earth” security of the present invention operates to ensure that the chips are destroyed irrespective of the circumstances under which the housing is opened or otherwise breached, ie whether authorised or unauthorised.
  • the security system of the present invention has a number of advantages over known security systems which are directed toward denying access to the chip rather that destroying the chip if access is obtained.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un système de sécurité destiné à prévenir l'accès non autorisé aux données et autres informations stockées ou traitées au niveau d'un dispositif informatique (11) renfermé dans un carter (10). Ce système de sécurité se compose d'un détecteur (37) et d'un dispositif de destruction (13, 12). Le détecteur (37) assure la détection de l'accès ou de la tentative d'accès au dispositif informatique extrait de son carter. Le dispositif de destruction (13, 12) assure la destruction des données et autres informations stockées ou traitées au niveau du dispositif informatique (11).
PCT/AU1998/000572 1997-07-22 1998-07-20 Systeme de securite WO1999005601A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU83260/98A AU8326098A (en) 1997-07-22 1998-07-20 Security system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPO8176A AUPO817697A0 (en) 1997-07-22 1997-07-22 Security system
AUPO8176 1997-07-22

Publications (1)

Publication Number Publication Date
WO1999005601A1 true WO1999005601A1 (fr) 1999-02-04

Family

ID=3802466

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU1998/000572 WO1999005601A1 (fr) 1997-07-22 1998-07-20 Systeme de securite

Country Status (2)

Country Link
AU (2) AU690058B3 (fr)
WO (1) WO1999005601A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009009201A3 (fr) * 2007-04-24 2009-03-12 Wms Gaming Inc Sécurisation de machines de jeu de pari mobiles

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4691350A (en) * 1985-10-30 1987-09-01 Ncr Corporation Security device for stored sensitive data
WO1988008176A1 (fr) * 1987-04-14 1988-10-20 Ido Ag Installation protegee contre une intervention non-autorisee
GB2227107A (en) * 1978-10-14 1990-07-18 Emi Ltd Equipment for electronically storing data
DE4018688A1 (de) * 1990-06-11 1991-01-10 Siemens Ag Verfahren zum schutz einer integrierten schaltung gegen das auslesen sensitiver daten
WO1991005306A1 (fr) * 1989-10-03 1991-04-18 University Of Technology, Sydney Circuits avec coffret de protection electro-actif permettant la detection des tentatives d'acces ou de penetration non autorisees
WO1998013872A1 (fr) * 1996-09-23 1998-04-02 Siemens Aktiengesellschaft Systeme de protection d'analyse pour puce a semi-conducteur

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4593384A (en) * 1984-12-21 1986-06-03 Ncr Corporation Security device for the secure storage of sensitive data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2227107A (en) * 1978-10-14 1990-07-18 Emi Ltd Equipment for electronically storing data
US4691350A (en) * 1985-10-30 1987-09-01 Ncr Corporation Security device for stored sensitive data
WO1988008176A1 (fr) * 1987-04-14 1988-10-20 Ido Ag Installation protegee contre une intervention non-autorisee
WO1991005306A1 (fr) * 1989-10-03 1991-04-18 University Of Technology, Sydney Circuits avec coffret de protection electro-actif permettant la detection des tentatives d'acces ou de penetration non autorisees
DE4018688A1 (de) * 1990-06-11 1991-01-10 Siemens Ag Verfahren zum schutz einer integrierten schaltung gegen das auslesen sensitiver daten
WO1998013872A1 (fr) * 1996-09-23 1998-04-02 Siemens Aktiengesellschaft Systeme de protection d'analyse pour puce a semi-conducteur

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009009201A3 (fr) * 2007-04-24 2009-03-12 Wms Gaming Inc Sécurisation de machines de jeu de pari mobiles

Also Published As

Publication number Publication date
AUPO817697A0 (en) 1997-08-14
AU690058B3 (en) 1998-04-09

Similar Documents

Publication Publication Date Title
US8006101B2 (en) Radio transceiver or other encryption device having secure tamper-detection module
WO2001063994A2 (fr) Boite inviolable destinee a des dispositifs electroniques equipes de memoires contenant des informations sensibles
US6512454B2 (en) Tamper resistant enclosure for an electronic device and electrical assembly utilizing same
US10528769B2 (en) Method and apparatus for destroying nonvolatile computer memory
KR100988414B1 (ko) 데이터 보안장치
MY107292A (en) Electro-active cradle circuits for the detection of access or penetration.
WO2005120086A1 (fr) Dispositif d'acces portatif a authentification biometrique
CN111327422A (zh) 一种带密钥销毁的密码机及密钥销毁方法
US8732860B2 (en) System and method for securing data to be protected of a piece of equipment
US9832027B2 (en) Tamper detection systems and methods for industrial and metering devices not requiring a battery
CA2457017C (fr) Dispositif et methode assurant la reconnaissance d'au moins un individu, dispositif et systeme assurant le controle de l'acces, et applications correspondantes
JP2989200B2 (ja) 個人識別装置
GB2060228A (en) Computer System
US6275151B1 (en) Cognitive intelligence carrying case
WO1999005601A1 (fr) Systeme de securite
US10282565B2 (en) Computer security environment
JP2002189635A (ja) 記憶装置
RU2210807C2 (ru) Устройство защиты информации
SE9902532L (sv) Apparatus and method for safeguarding electronic equipment from theft
EP0027058A1 (fr) Système d'ordinateur
EP2180466A2 (fr) Améliorations introduites dans un lecteur à carte magnétique avec une protection contre les attaques exothermiques et thermiques, et processus d'assemblage
US20230376619A1 (en) Tamper and zeroization response unit
GB2400453A (en) A remote protection system for disabling electrical equipment.
JPH09223076A (ja) 記憶装置及び記憶装置を有するシステム
DK1965328T3 (en) Method for protection and thus secured mobile device

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: KR

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1999509099

Format of ref document f/p: F

NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载