DataLock Technology
From Wikipedia, the free encyclopedia
This article or section is written like an advertisement. Please help rewrite this article from a neutral point of view. Mark blatant advertising which would require a fundamental rewrite in order to become encyclopedic for speedy deletion, using {{db-spam}}. (December 2007) |
The creator of this article, or someone who has substantially contributed to it, may have a conflict of interest regarding its subject matter. |
A DataLock is a hardware security mechanism integrated with portable storage to provide self-contained locking and user authentication capabilities. The drive is self-secured and host independent.
Contents |
[edit] Technology
The portable storage is integrated with an on-board input mechanism such as keypad used to enter a combination (like a combination lock) or a Personal identification number (PIN). When locked, a DataLock enabled storage device is invisible to its host. With the correct combination, it becomes unlocked to allow read/write access and behaves as a standard USB flash drive. Upon removal, it automatically locks.
Temper resistance is implemented using on-the-fly full disk encryption. When unlocked, all data sent to the drive is encrypted.
[edit] History
DataLock technology IP is own by ClevX, LLC. Corsair Memory was the first to manufacture and launched a DataLock-based drive named Flash Padlock to the consumer retail market at August 2007[1].
[edit] Benefits
DataLock enabled portable storage provides a unified authentication mechanism for all content and portable applications contained within.
DataLock security is managed by the device and not the host. A DataLock drive does not depend on any host software or a specialized device driver. Once unlocked, the device is accessed as a USB mass storage device class.
Security is cross platform and host independent. Since authentication does not depend on or requires host functions, it works equally well with all operating systems that support the USB Mass Storage Class: for example Windows, Mac OS, Linux, office equipment and embedded devices.
Since no DataLock communication channel exists when locked, it is immune to brute force attack originating from its host.