Secure USB Flash Drive. Biometric & Professional Drives

Similar documents
Secure Data Exchange Solution

Secure Web Access Solution

e-code Academy Information Security Diploma Training Discerption

Firmware security features in HP Compaq business notebooks

Encrypting with BitLocker for disk volumes under Windows 7

SecureD Technical Overview

Kaspersky Endpoint Security 10 for Windows. Deployment guide

User Guide. G 4 Supreme. April AES 256 Encrypted USB Flash Drive. Prepared By: Md. Zakir Hosen

USB Portable Storage Device: Security Problem Definition Summary

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

DriveLock and Windows 7

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

HP ProtectTools Embedded Security Guide

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

ACER ProShield. Table of Contents

HIPAA Security Training Manual

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Windows 7. Qing Liu Michael Stevens

Managed Portable Security Devices

Chapter 1: Introduction

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7

etoken Single Sign-On 3.0

USB Portable Storage Device: Security Problem Definition Summary

Certified Secure Computer User

SecureAge SecureDs Data Breach Prevention Solution

Endpoint protection for physical and virtual desktops

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

Chapter 8: Security Measures Test your knowledge

Advanced Authentication

128-Bit Versus 256-Bit AES Encryption

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices

Introducing etoken. What is etoken?

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

Smart TPM. User's Manual. Rev MD-STPM-1001R

True Identity solution

Sharpen your document and data security HP Security solutions for imaging and printing

Chapter 7 Types of Storage. Discovering Computers Your Interactive Guide to the Digital World

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

BM482E Introduction to Computer Security

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

How do I Check if My Computer is Compatible with Windows 7

USB FLASH DRIVE. User s Manual 1. INTRODUCTION FEATURES SPECIFICATIONS PACKAGE CONTENTS SYSTEM REQUIREMENTS...

[STORAGE SOLUTIONS: FILM INDUSTRY]

Major upgrade versions. To see which features each version of Windows 7 has, go to Microsoft's Compare Windows page.

Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual

DriveLock and Windows 8

Two-Factor Authentication

SecureLock. User Manual

FAQ for USB Flash Drive

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide

Securing the endpoint and your data

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

The virtual safe: A user-focused approach to data encryption

How To Store Data On A Computer (For A Computer)

ABSTRACT I. INTRODUCTION

Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual

HP ProtectTools User Guide

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Excerpt of Cyber Security Policy/Standard S Information Security Standards

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

M-Shield mobile security technology

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Protecting personally identifiable information: What data is at risk and what you can do about it

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Guidelines on use of encryption to protect person identifiable and sensitive information

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide

OdysseyTM. removable hard disk storage system. secure. fast. expandable.

FEITIAN PKI Authentication Token. epass2003 with FIPS Cer tification

Enova X-Wall LX Frequently Asked Questions

Practice test Domain-2 Security (Brought to you by RMRoberts.com)

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

SOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51.

Did you know your security solution can help with PCI compliance too?

d2 Quadra ENTERPRISE CLASS Professional Hard Disk DESIGN BY NEIL POULTON esata 3Gb/s FireWire 800 & 400 USB 2.0

Certified Secure Computer User

Imaging Computing Server User Guide

Token User Guide. Version 1.0/ July 2013

Endpoint protection for physical and virtual desktops

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple

22 nd NISS Conference

Introduction to BitLocker FVE

How To Use An Ipa Powerbook With A Hard Drive (Mini) And Powerbank (Mini Hard Drive) For A Portable Hard Drive

Transcription:

Secure USB Flash Drive Biometric & Professional Drives

I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE FLASH DRIVE... 4 V. FEATURES... 5 VI. BENEFITS... 6 High Security... 6 Usability... 6 Portability... 6 User Friendly... 6 Standards Complied... 6 Antivirus protection (Optional)... 6 VII. SPECIFICATION... 7 VIII. ABOUT E-CODE... 8 1

II. INTRODUCTION This document provides a brief description for the Secure Flash Memory offered by e-code, Saudi Arabia including Features and Financial Offering. Overview The document introduces a new concept of providing security for valuable user assets and identity protection in portable device like a secure Flash memory using Biometric identification and Encryption of information stored. The need for secure portable storage is raising every day. One must carry his most valued data with no worry of any one who can view or use it. USB flash storage is currently very popular due to the ease of carry and ease of use. Combining fingerprint matching with USB flash storage raises the security of this portable storage. More security introduced is the encryption of the stored data to secure the drive against advanced attacks on memory. This is the ultimate security level that can be applied on the USB flash drives. Copyrights and Trademarks All of the content on this manual and accompanying software(including all text, graphics, sounds, demos, patches, hints and other files) is covered under KSA and international copyright and trademark laws by E-Code and other companies, and are property of E-Code, or are presented with permission and/or under license. This content may not be used for any commercial use without express written permission of E-Code, and possibly other copyright or trademark owners. All other trademarks and copyrights are the property of their respective owners. 2015, e-code 2

III. SECURE FLASH DRIVE Description A USB flash drive, also known under a variety of other names, is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. USB flash drives are typically removable and rewritable, and physically much smaller than an optical disc. Most weigh less than 30 grams. As of January 2013, drives of up to 512 gigabytes (GB) were available. A one-terabyte (TB) drive was unveiled at the 2013 Consumer Electronics Show and became available later that year. Storage capacities as large as 2 TB are planned, with steady improvements in size and price per capacity expected. Some allow up to 100,000 write/erase cycles, depending on the exact type of memory chip used, and have a 10-year shelf storage time. This USB flash drive is vulnerable to many attacks and thus data security is not guaranteed. Even if there are USB flash drives available that require password authentication, this is a high security level. The Secure USB Flash Drive introduced here eliminates all the vulnerabilities within the common USB Flash storage. Also, the highest security level is introduced based on biometric user authentication of the owner. Along with the fingerprint authentication, there is password authentication and memory encryption to secure the memory chip against hardware attacks. Elimination of Vulnerabilities Highest security level based on Biometric user authentication/ Password Memory encryption to secure the chip against hardware attacks 3

IV. MODULES OF SECURE FLASH DRIVE The secure USB Flash Storage consists of 3 modules: 1. Fingerprint Module: a fingerprint thermal sensor along with the matching module. 2. Security Processor: to perform the encryption operation on the written data before storing it to memory, and decrypt this data before reading it from memory. 3. Flash Memory Chip: this chip is the storage media that contains the user data. This memory is being managed from the security module (Processor). 4

V. FEATURES MULTIPLE DRIVE STORAGE The Secure Flash USB Drive can be used as multiple drive exactly as hard disk. Each drive permissions can be easily changed to be read only or read/write. Public and Private storage: meaning public storage require no authentication. MANAGEMENT SOFTWARE STORED ON FLASH DRIVE No need for driver download. Driver is stored on the secure drive and cannot be removed. THREE FACTOR USER AUTHENTICATION Fingerprint and user password authentication. No operation can be done (write/read) without user authentication. Data Encryption to resist hardware attacks that restore directly from memory chip. DATA ENCRYPTION STORAGE Data is encrypted before storage (writing) on the flash memory. Data is decrypted before read from secure flash drive. Strong encryption algorithm: AES 256- bit. 5

VI. BENEFITS High Security A number of security mechanisms are employed, helping significantly to eliminate the risk of fraud, attacks and misuse from unauthorized individuals and hackers. User authentication using 2 factor authentication: password and fingerprint. Data is stored encrypted in memory to resist the hardware attacks on memory. Strong and standard encryption algorithm for data: AES 256-bit. Usability The secure flash drive can be used many times as it uses writable flash memory chip. About 100,000 write cycles is the memory retention. Not like other secure storage: memory is erasable and writable. High memory write cycles about 100,000. Portability Easy to carry and use secure drive. Weight less than 100g. Small size. USB interface. User Friendly The management software is user friendly GUI that any common user can be easily familiar with: Install is just easy as plug and play. Software is stored permanently on the secure flash drive. Create multiple drives on the secure flash drive easily. Drives permissions can be changed easily to be read only or read/write or write protected. Standards Complied The secure USB flash drive is totally standard complied. USB standard interface. Encryption algorithm is a standard AES with the ultimate key length 256-bit. Fingerprint module is standard sensor and matching processor. Antivirus protection (Optional) Defend data and identities against viruses, worms, and other malware threats with on-board antivirus software, which constantly monitors file transfers to the drive. 6

VII. SPECIFICATION Operating System Hardware Interface Software Interface Onboard Cryptography Capacity Authentication Factors Fingerprint Sensor Operating Temperature Range Warranty Windows 8.1/8/7/Vista (Bus, Ent and Home editions SP2)/XP (Prof and Home SP3) Mac OS 10.5 or higher USB 2 and higher Lite software driver stored on-board AES 256-bit 2, 4,8,16,32, and 64 GB 2 factors : Password and Fingerprint On-board high speed sensor. -25o to 85o C Memory 2 Years 7

VIII. ABOUT E-CODE E-Code is a leading progressive, innovative company in the field of information security providing technology, state of the art solutions, consulting, integration and testing services to safeguard the information assets, identities and the supporting infrastructure against unauthorized use. Our high quality service and excellent benefits and the ability of being reliable and responsible put us as a leader on the top of digital security companies. E-Code provides unique products and solutions, which cover many security areas fulfilling customers need in different market sectors. We provide a set of products and solutions covering the following areas: software protection, data encryption, security hardware, digital signature, secure identification and authentication, secure online distribution of digital Contents. We supports different market sectors like; governmental institutes, organizations, banks, software development companies, multimedia software and game producers, media and ebooks publishers and individual users. Dongle Fingerprint Smart Token Smart Card Fingerprint Smart OTP Card Smart Token Fingerprint OTP Token Secure SD Card Secure Flash with Fingerprint Website Email www.e-code.com info@e-code.com, support@e-code.com, sales@e-code.com Telephone Fax 8