Secure USB Flash Drive Biometric & Professional Drives
I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE FLASH DRIVE... 4 V. FEATURES... 5 VI. BENEFITS... 6 High Security... 6 Usability... 6 Portability... 6 User Friendly... 6 Standards Complied... 6 Antivirus protection (Optional)... 6 VII. SPECIFICATION... 7 VIII. ABOUT E-CODE... 8 1
II. INTRODUCTION This document provides a brief description for the Secure Flash Memory offered by e-code, Saudi Arabia including Features and Financial Offering. Overview The document introduces a new concept of providing security for valuable user assets and identity protection in portable device like a secure Flash memory using Biometric identification and Encryption of information stored. The need for secure portable storage is raising every day. One must carry his most valued data with no worry of any one who can view or use it. USB flash storage is currently very popular due to the ease of carry and ease of use. Combining fingerprint matching with USB flash storage raises the security of this portable storage. More security introduced is the encryption of the stored data to secure the drive against advanced attacks on memory. This is the ultimate security level that can be applied on the USB flash drives. Copyrights and Trademarks All of the content on this manual and accompanying software(including all text, graphics, sounds, demos, patches, hints and other files) is covered under KSA and international copyright and trademark laws by E-Code and other companies, and are property of E-Code, or are presented with permission and/or under license. This content may not be used for any commercial use without express written permission of E-Code, and possibly other copyright or trademark owners. All other trademarks and copyrights are the property of their respective owners. 2015, e-code 2
III. SECURE FLASH DRIVE Description A USB flash drive, also known under a variety of other names, is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. USB flash drives are typically removable and rewritable, and physically much smaller than an optical disc. Most weigh less than 30 grams. As of January 2013, drives of up to 512 gigabytes (GB) were available. A one-terabyte (TB) drive was unveiled at the 2013 Consumer Electronics Show and became available later that year. Storage capacities as large as 2 TB are planned, with steady improvements in size and price per capacity expected. Some allow up to 100,000 write/erase cycles, depending on the exact type of memory chip used, and have a 10-year shelf storage time. This USB flash drive is vulnerable to many attacks and thus data security is not guaranteed. Even if there are USB flash drives available that require password authentication, this is a high security level. The Secure USB Flash Drive introduced here eliminates all the vulnerabilities within the common USB Flash storage. Also, the highest security level is introduced based on biometric user authentication of the owner. Along with the fingerprint authentication, there is password authentication and memory encryption to secure the memory chip against hardware attacks. Elimination of Vulnerabilities Highest security level based on Biometric user authentication/ Password Memory encryption to secure the chip against hardware attacks 3
IV. MODULES OF SECURE FLASH DRIVE The secure USB Flash Storage consists of 3 modules: 1. Fingerprint Module: a fingerprint thermal sensor along with the matching module. 2. Security Processor: to perform the encryption operation on the written data before storing it to memory, and decrypt this data before reading it from memory. 3. Flash Memory Chip: this chip is the storage media that contains the user data. This memory is being managed from the security module (Processor). 4
V. FEATURES MULTIPLE DRIVE STORAGE The Secure Flash USB Drive can be used as multiple drive exactly as hard disk. Each drive permissions can be easily changed to be read only or read/write. Public and Private storage: meaning public storage require no authentication. MANAGEMENT SOFTWARE STORED ON FLASH DRIVE No need for driver download. Driver is stored on the secure drive and cannot be removed. THREE FACTOR USER AUTHENTICATION Fingerprint and user password authentication. No operation can be done (write/read) without user authentication. Data Encryption to resist hardware attacks that restore directly from memory chip. DATA ENCRYPTION STORAGE Data is encrypted before storage (writing) on the flash memory. Data is decrypted before read from secure flash drive. Strong encryption algorithm: AES 256- bit. 5
VI. BENEFITS High Security A number of security mechanisms are employed, helping significantly to eliminate the risk of fraud, attacks and misuse from unauthorized individuals and hackers. User authentication using 2 factor authentication: password and fingerprint. Data is stored encrypted in memory to resist the hardware attacks on memory. Strong and standard encryption algorithm for data: AES 256-bit. Usability The secure flash drive can be used many times as it uses writable flash memory chip. About 100,000 write cycles is the memory retention. Not like other secure storage: memory is erasable and writable. High memory write cycles about 100,000. Portability Easy to carry and use secure drive. Weight less than 100g. Small size. USB interface. User Friendly The management software is user friendly GUI that any common user can be easily familiar with: Install is just easy as plug and play. Software is stored permanently on the secure flash drive. Create multiple drives on the secure flash drive easily. Drives permissions can be changed easily to be read only or read/write or write protected. Standards Complied The secure USB flash drive is totally standard complied. USB standard interface. Encryption algorithm is a standard AES with the ultimate key length 256-bit. Fingerprint module is standard sensor and matching processor. Antivirus protection (Optional) Defend data and identities against viruses, worms, and other malware threats with on-board antivirus software, which constantly monitors file transfers to the drive. 6
VII. SPECIFICATION Operating System Hardware Interface Software Interface Onboard Cryptography Capacity Authentication Factors Fingerprint Sensor Operating Temperature Range Warranty Windows 8.1/8/7/Vista (Bus, Ent and Home editions SP2)/XP (Prof and Home SP3) Mac OS 10.5 or higher USB 2 and higher Lite software driver stored on-board AES 256-bit 2, 4,8,16,32, and 64 GB 2 factors : Password and Fingerprint On-board high speed sensor. -25o to 85o C Memory 2 Years 7
VIII. ABOUT E-CODE E-Code is a leading progressive, innovative company in the field of information security providing technology, state of the art solutions, consulting, integration and testing services to safeguard the information assets, identities and the supporting infrastructure against unauthorized use. Our high quality service and excellent benefits and the ability of being reliable and responsible put us as a leader on the top of digital security companies. E-Code provides unique products and solutions, which cover many security areas fulfilling customers need in different market sectors. We provide a set of products and solutions covering the following areas: software protection, data encryption, security hardware, digital signature, secure identification and authentication, secure online distribution of digital Contents. We supports different market sectors like; governmental institutes, organizations, banks, software development companies, multimedia software and game producers, media and ebooks publishers and individual users. Dongle Fingerprint Smart Token Smart Card Fingerprint Smart OTP Card Smart Token Fingerprint OTP Token Secure SD Card Secure Flash with Fingerprint Website Email www.e-code.com info@e-code.com, support@e-code.com, sales@e-code.com Telephone Fax 8