Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges A discussion of security issues and archite...
<ul><li>The Presenter – Fred Thomas </li></ul><ul><li>Iomega Involvement – Who is Iomega? </li></ul><ul><li>Topics  </li><...
Peerless Description
<ul><li>General </li></ul><ul><li>Disk Storage Capacity </li></ul><ul><li>Operating System Compatibility </li></ul><ul><ul...
Peerless Latent Security Features <ul><li>Secure Memory Device (SMD) with cryptographic authentication (SmartCard Technolo...
Peerless Block Diagram Inertial Latch Voice Coil Motor Spin Motor Pre-Amp Secure IC ESD Protection Eject Mechanism Motor I...
Data Security Applications for Removable Data Storage <ul><li>DRM (Digital Rights Management) </li></ul><ul><li>Enterprise...
What is DRM? <ul><li>Digital Rights Management. </li></ul><ul><li>In this context, DRM means the use of technology to prot...
<ul><li>DRM Roles: </li></ul><ul><ul><li>Content Providers </li></ul></ul><ul><ul><li>Security Technology providers (H/W, ...
<ul><li>Removable Data Storage Drive/Cartridge’s DRM Role: </li></ul><ul><ul><li>Pass a unique*, unaltered and authenticat...
The Removable Data Storage Secure Pipe Problem
Peerless SMD Contents <ul><li>MS#  -  Peerless Media Serial #  </li></ul><ul><li>DK  -  Drive Private Key # (1 of numerous...
A DRM Protocol for Peerless
Why an Enterprise Centric Secure Removable Data Storage Product? <ul><li>Allows utility of cartridge-based removable data ...
Specific Enterprise Secure Drive System Objectives <ul><li>Provide enterprise centric security solution, not individual ce...
Enterprise Secure Drive Building Blocks <ul><li>Encryption (Symmetric vs. Asymmetric) </li></ul><ul><li>Authentication (Ha...
The “Cash in the Bag” Problem
Peerless Enterprise Drive Distributed Encryption Key Implementation
Conclusions about Security Market from the Perspective of Removable Data Storage <ul><li>Hard to see path to DRM revenues ...
Objectives of Today’s Talk <ul><li>Create an awareness of Peerless and other Iomega removable storage devices fielded data...
Iomega Contact Information Business Contact: Tim Dammon Product General Manager  Iomega Corporation 4435 Eastgate Mall San...
Have a Good Day!
Upcoming SlideShare
Loading in …5
×

Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges

764
-1

Published on

A discussion of security issues and architectures for removable data storage.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
764
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges

  1. 1. Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges A discussion of security issues and architectures for removable data storage. Fred Thomas, Chief Technologist, Adv. R&D, R&D RSA Conference 2002
  2. 2. <ul><li>The Presenter – Fred Thomas </li></ul><ul><li>Iomega Involvement – Who is Iomega? </li></ul><ul><li>Topics </li></ul><ul><ul><li>Peerless </li></ul></ul><ul><ul><li>Peerless Latent Data Security Features </li></ul></ul><ul><ul><li>Data Security Applications for Removable Storage </li></ul></ul><ul><ul><ul><li>Peerless DRM Solution Discussion </li></ul></ul></ul><ul><ul><ul><li>Peerless Enterprise/Government Centric Data Security Solution Discussion </li></ul></ul></ul><ul><ul><li>Synopsis of message </li></ul></ul>Overview of Today’s Presentation
  3. 3. Peerless Description
  4. 4. <ul><li>General </li></ul><ul><li>Disk Storage Capacity </li></ul><ul><li>Operating System Compatibility </li></ul><ul><ul><li>USB </li></ul></ul><ul><ul><li>IEEE 1394 </li></ul></ul><ul><li>External Connections </li></ul><ul><ul><li>USB </li></ul></ul><ul><ul><li>IEEE 1394 </li></ul></ul>10GB or 20GB   Windows 98 / Me / 2000, Mac OS 8.6 - 9.x Windows 98 SE/ Me / 2000, Mac OS 8.6 - 9.x   USB connector (2) 6-pin 1394 connectors     Peerless Specifications <ul><li>Performance </li></ul><ul><li>Average Seek Time </li></ul><ul><li>Typical Start/Stop time </li></ul><ul><li>Average Data Transfer Rate </li></ul><ul><ul><li>USB </li></ul></ul><ul><ul><li>IEEE 1394 </li></ul></ul><ul><li>Segmented Buffer with write cache </li></ul><ul><li>Rotational Speed </li></ul>112 ms (read), 13 ms (write) 3.0 sec   Up to 1 MB/sec Up to 15 MB/sec 2MB - Upper 174KB is used for Firmware 4200 RPM
  5. 5. Peerless Latent Security Features <ul><li>Secure Memory Device (SMD) with cryptographic authentication (SmartCard Technology) in Peerless data storage cartridge. </li></ul><ul><li>Asymmetric encryption keys and strings embedded in SMD. </li></ul><ul><li>Drive µP capable of host PC isolated asymmetric string encryption. </li></ul><ul><li>Factory encryption of cartridge unique media serial number with private key series for cartridge seeding. </li></ul><ul><li>Unalterable media serial number – In SMD and on media. </li></ul><ul><li>Cartridge based latent irradiance tag authentication system. </li></ul>
  6. 6. Peerless Block Diagram Inertial Latch Voice Coil Motor Spin Motor Pre-Amp Secure IC ESD Protection Eject Mechanism Motor ID Tag ID Circuitry External Memory Read Channel VCM Driver Spindle Driver Micro-Cntrlr ROM RAM LCD Micro-Cntrlr Logic RAM Power Supply IDE Slave I/O Expansion LED Power Electronics ROM Logic Peerless Cartridge Jasper DE Cartridge Flex HDD PCA Drive PCA Connector PCA Peerless Drive Interface Module Bus Switch
  7. 7. Data Security Applications for Removable Data Storage <ul><li>DRM (Digital Rights Management) </li></ul><ul><li>Enterprise Secure Drive Product </li></ul><ul><ul><li>Address the data security needs of the enterprise/government organization, not the individual. </li></ul></ul>
  8. 8. What is DRM? <ul><li>Digital Rights Management. </li></ul><ul><li>In this context, DRM means the use of technology to protect copyrighted information in digital form. </li></ul><ul><ul><li>e.g. Music, Video, Publications </li></ul></ul><ul><ul><li>Technology Objectives: Check-in Check-out, Limited device play capability, tracking of content owners, limited digital copying, tying content to limited hardware, etc. </li></ul></ul><ul><li>The industry players driving DRM are the “Content Providers.” </li></ul><ul><ul><li>BMG Entertainment, Sony, EMI Capitol Records, Universal Music Group, … etc. </li></ul></ul>
  9. 9. <ul><li>DRM Roles: </li></ul><ul><ul><li>Content Providers </li></ul></ul><ul><ul><li>Security Technology providers (H/W, encryption: RSA, Certicom, Atmel, DigiMarc, etc.) </li></ul></ul><ul><ul><li>DRM Secure Delivery providers (Host Software: Liquid Audio, InterTrust, MicroSoft) </li></ul></ul><ul><ul><li>DRM Enablers (Device Mfgrs: Iomega, MicroSoft, SanDisk, Diamond Rio, etc.) </li></ul></ul><ul><ul><li>DRM Killers (Napster, open environment computers, internet, hackers ..) </li></ul></ul><ul><li>Iomega perspective: </li></ul><ul><li>Iomega should address the basic DRM problem from a removable media provider’s perspective in a robust manner, but also in a manner that is as user/customer non-intrusive as possible. </li></ul>What is the Role of Removable Data Storage Drive/Media Manufacturer In the DRM Landscape?
  10. 10. <ul><li>Removable Data Storage Drive/Cartridge’s DRM Role: </li></ul><ul><ul><li>Pass a unique*, unaltered and authenticated media serial number (MSN) from an Iomega data cartridge to a third-party DRM Software application upon an invoked authenticated MSN transfer call by the third-party DRM Software application. This should be done without the requirement for Internet connectivity . </li></ul></ul><ul><ul><li>*At present all Iomega removable magnetic media has a unique media serial number encoded on it. </li></ul></ul>What is the Requirement of DRM from Removable Data Storage?
  11. 11. The Removable Data Storage Secure Pipe Problem
  12. 12. Peerless SMD Contents <ul><li>MS# - Peerless Media Serial # </li></ul><ul><li>DK - Drive Private Key # (1 of numerous loaded at </li></ul><ul><li>factory off of trade-secret list) </li></ul><ul><li>      DKI# - Drive Private/Public Key Index number </li></ul><ul><li>FEMS# - Factory Encrypted MS# </li></ul><ul><li>(asymmetrically encrypted at Factory </li></ul><ul><li>with trade-secret private key list L4) </li></ul><ul><li>FKI# - Factory Private/Public Key Index Number </li></ul>
  13. 13. A DRM Protocol for Peerless
  14. 14. Why an Enterprise Centric Secure Removable Data Storage Product? <ul><li>Allows utility of cartridge-based removable data storage technology into corporate, university & government computing environments where removable storage is seen as a liability at present due to information security considerations. </li></ul><ul><li>A seamless solution which supports a spectrum of data security solutions as a core building block. </li></ul>
  15. 15. Specific Enterprise Secure Drive System Objectives <ul><li>Provide enterprise centric security solution, not individual centric solution </li></ul><ul><li>Data transportability within the enterprise while addressing the “Dedicated Insider Threat” </li></ul><ul><li>Maintain ability to physically secure data and enhance this attribute </li></ul><ul><li>Incorporate linkage and support of user authentication and tracking in disk file management </li></ul><ul><li>Secure and authenticated drive data transfers </li></ul><ul><li>Manage “possible” security lapses in future - updateable system </li></ul><ul><li>Provide enterprise centric Digital Rights Management (DRM) – Secure Pipe </li></ul><ul><li>Transparent compatibility with other data encryption software </li></ul><ul><li>Low cost solution / do not re-invent the wheel / use existing technology </li></ul>
  16. 16. Enterprise Secure Drive Building Blocks <ul><li>Encryption (Symmetric vs. Asymmetric) </li></ul><ul><li>Authentication (Hash Function, Digital Signatures & Biometric) </li></ul><ul><li>Distribution of security </li></ul><ul><li>Physical linkage (Smart Card Secure Memory Devices) </li></ul><ul><li>Migration capable </li></ul><ul><li>RF tag technology </li></ul><ul><li>“ Non-exposed” security mechanisms </li></ul>
  17. 17. The “Cash in the Bag” Problem
  18. 18. Peerless Enterprise Drive Distributed Encryption Key Implementation
  19. 19. Conclusions about Security Market from the Perspective of Removable Data Storage <ul><li>Hard to see path to DRM revenues from removable data storage supplier perspective at present. </li></ul><ul><li>Enterprise Secure Drive product may be a large niche market for Iomega with long legs into the future. </li></ul><ul><li>From a technology development perspective, both robust DRM and Enterprise security for removable data storage can be addressed with many of the same tools and resources. Co-development recommended. </li></ul><ul><li>To most effectively address and sell to this market, Iomega should seek an appropriate E-Security partner. </li></ul>
  20. 20. Objectives of Today’s Talk <ul><li>Create an awareness of Peerless and other Iomega removable storage devices fielded data security technologies within the E-security community. </li></ul><ul><li>Explore possible routes to commercializing this new class of security features embedded within removable data storage devices. We are looking for a partner/partners with a strong presence in the enterprise/government data security marketplace, with a focus on hardware solutions. This partner/partners would provide resources to help evaluate, develop and sell a secure removable data storage solution for this market. </li></ul>
  21. 21. Iomega Contact Information Business Contact: Tim Dammon Product General Manager Iomega Corporation 4435 Eastgate Mall San Diego, CA 92121 Phone: 858-795-7049 Fax: 858-795-7004 Email: dammon@iomega.com Technical Contact: Fred Thomas Chief Technologist, Adv. R&D, R&D Iomega Corporation 1821 West Iomega Way Roy, UT 84067 Phone: 801-332-4662 Fax: 801-332-1030 Email: thomasf@iomega.com
  22. 22. Have a Good Day!
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×