SlideShare a Scribd company logo
1 of 22
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges A discussion of security issues and architectures for removable data storage.  Fred Thomas, Chief Technologist, Adv. R&D, R&D RSA Conference 2002
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Overview of Today’s Presentation
Peerless Description
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],10GB or 20GB   Windows 98 / Me / 2000, Mac OS 8.6 - 9.x Windows 98 SE/ Me / 2000, Mac OS 8.6 - 9.x   USB connector (2)  6-pin 1394 connectors     Peerless Specifications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],112 ms (read), 13 ms (write) 3.0 sec   Up to 1 MB/sec Up to 15 MB/sec 2MB - Upper 174KB is used for Firmware 4200 RPM
Peerless Latent Security Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Peerless Block Diagram Inertial Latch Voice Coil Motor Spin Motor Pre-Amp Secure IC ESD Protection Eject Mechanism Motor ID Tag ID Circuitry External Memory Read  Channel VCM Driver Spindle Driver Micro-Cntrlr ROM RAM LCD Micro-Cntrlr Logic RAM Power Supply IDE Slave  I/O Expansion LED Power Electronics ROM Logic Peerless  Cartridge Jasper DE Cartridge Flex HDD PCA Drive PCA Connector PCA Peerless Drive Interface Module Bus Switch
Data Security Applications for Removable Data Storage ,[object Object],[object Object],[object Object]
What is DRM? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is the Role of Removable Data Storage Drive/Media Manufacturer In the DRM Landscape?
[object Object],[object Object],[object Object],What is the Requirement  of DRM from Removable Data Storage?
The Removable Data Storage Secure Pipe Problem
Peerless SMD Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A DRM Protocol for Peerless
Why an Enterprise Centric Secure Removable Data Storage Product? ,[object Object],[object Object]
Specific Enterprise Secure Drive System Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Secure Drive Building Blocks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The “Cash in the Bag” Problem
Peerless Enterprise Drive Distributed Encryption Key Implementation
Conclusions about Security Market from the Perspective of Removable Data Storage ,[object Object],[object Object],[object Object],[object Object]
Objectives of Today’s Talk ,[object Object],[object Object]
Iomega Contact Information Business Contact: Tim Dammon Product General Manager  Iomega Corporation 4435 Eastgate Mall San Diego, CA 92121 Phone:  858-795-7049 Fax: 858-795-7004 Email: dammon@iomega.com Technical Contact: Fred Thomas Chief Technologist, Adv. R&D, R&D  Iomega Corporation 1821 West Iomega Way Roy, UT  84067 Phone:  801-332-4662 Fax: 801-332-1030 Email: thomasf@iomega.com
Have a Good Day!

More Related Content

What's hot

DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights ManagementPeter1020
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introductionerry wardhana
 
2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodataSteph Cliche
 
Iadis Tns2007 Presentation
Iadis Tns2007 PresentationIadis Tns2007 Presentation
Iadis Tns2007 PresentationCarlos Serrao
 
Icete Secrypt2007 Presentation
Icete Secrypt2007 PresentationIcete Secrypt2007 Presentation
Icete Secrypt2007 PresentationCarlos Serrao
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last standGeorge Delikouras
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09tverbeck
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 

What's hot (18)

DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introduction
 
What is DRM?
What is DRM? What is DRM?
What is DRM?
 
2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata2010 12-03 a-lawyers_guidetodata
2010 12-03 a-lawyers_guidetodata
 
Iadis Tns2007 Presentation
Iadis Tns2007 PresentationIadis Tns2007 Presentation
Iadis Tns2007 Presentation
 
Icete Secrypt2007 Presentation
Icete Secrypt2007 PresentationIcete Secrypt2007 Presentation
Icete Secrypt2007 Presentation
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 

Viewers also liked

People of the State of California vs. Academy of Art University
People of the State of California vs. Academy of Art UniversityPeople of the State of California vs. Academy of Art University
People of the State of California vs. Academy of Art UniversityCity Attorney of San Francisco
 
Adobe AIR: Stage3D and AGAL
Adobe AIR: Stage3D and AGALAdobe AIR: Stage3D and AGAL
Adobe AIR: Stage3D and AGALDaniel Freeman
 
De mayor quiero ser (1)
De mayor quiero ser (1)De mayor quiero ser (1)
De mayor quiero ser (1)Anapazos17
 
High Point Presentation
High Point PresentationHigh Point Presentation
High Point PresentationSian_Teasdale
 
Mango S.A.: Reinventando el sector de la moda
Mango S.A.: Reinventando el sector de la modaMango S.A.: Reinventando el sector de la moda
Mango S.A.: Reinventando el sector de la modaIQS Barcelona
 
Cerfa 13905 modification_cessation
Cerfa 13905 modification_cessationCerfa 13905 modification_cessation
Cerfa 13905 modification_cessationmeilleurplacement
 
Excursiones visitas paris
Excursiones visitas parisExcursiones visitas paris
Excursiones visitas parisAliciaof
 
Excellence in Innovation and R&D. Reasons to invest in Austria/Carinthia.
Excellence in Innovation and R&D. Reasons to invest in Austria/Carinthia.Excellence in Innovation and R&D. Reasons to invest in Austria/Carinthia.
Excellence in Innovation and R&D. Reasons to invest in Austria/Carinthia.Forum Velden
 
Consejos clave en Redacción Digital
Consejos clave en Redacción DigitalConsejos clave en Redacción Digital
Consejos clave en Redacción DigitalInterlat
 
Perspectiva Fotográfica Artesanías
Perspectiva Fotográfica ArtesaníasPerspectiva Fotográfica Artesanías
Perspectiva Fotográfica ArtesaníasSebasKinte
 
79545140 เธ‚เน‰เธญเธชเธญเธš-เน‚เธ„เธงเธ•เธฒ-เธกเธŠ-55-เธงเธดเธ—เธขเนŒ1
79545140 เธ‚เน‰เธญเธชเธญเธš-เน‚เธ„เธงเธ•เธฒ-เธกเธŠ-55-เธงเธดเธ—เธขเนŒ179545140 เธ‚เน‰เธญเธชเธญเธš-เน‚เธ„เธงเธ•เธฒ-เธกเธŠ-55-เธงเธดเธ—เธขเนŒ1
79545140 เธ‚เน‰เธญเธชเธญเธš-เน‚เธ„เธงเธ•เธฒ-เธกเธŠ-55-เธงเธดเธ—เธขเนŒ1Kanittha Tinan
 
Game over: cómo y cuando cerrar tu startup
Game over: cómo y cuando cerrar tu startupGame over: cómo y cuando cerrar tu startup
Game over: cómo y cuando cerrar tu startupJosé Miguel Corrales
 
Guía de bienvenida La Nueva Medina 1
Guía de bienvenida La Nueva Medina 1Guía de bienvenida La Nueva Medina 1
Guía de bienvenida La Nueva Medina 1Isabel Muñoz Díaz
 
Codigo del comercio
Codigo del comercioCodigo del comercio
Codigo del comercioDavid Marin
 

Viewers also liked (20)

Presentation to EDPP by Triangle Transit
Presentation to EDPP by Triangle TransitPresentation to EDPP by Triangle Transit
Presentation to EDPP by Triangle Transit
 
People of the State of California vs. Academy of Art University
People of the State of California vs. Academy of Art UniversityPeople of the State of California vs. Academy of Art University
People of the State of California vs. Academy of Art University
 
Adobe AIR: Stage3D and AGAL
Adobe AIR: Stage3D and AGALAdobe AIR: Stage3D and AGAL
Adobe AIR: Stage3D and AGAL
 
De mayor quiero ser (1)
De mayor quiero ser (1)De mayor quiero ser (1)
De mayor quiero ser (1)
 
High Point Presentation
High Point PresentationHigh Point Presentation
High Point Presentation
 
NYTECH "Measuring Your User Experience Design"
NYTECH "Measuring Your User Experience Design"NYTECH "Measuring Your User Experience Design"
NYTECH "Measuring Your User Experience Design"
 
Mango S.A.: Reinventando el sector de la moda
Mango S.A.: Reinventando el sector de la modaMango S.A.: Reinventando el sector de la moda
Mango S.A.: Reinventando el sector de la moda
 
Cerfa 13905 modification_cessation
Cerfa 13905 modification_cessationCerfa 13905 modification_cessation
Cerfa 13905 modification_cessation
 
Excursiones visitas paris
Excursiones visitas parisExcursiones visitas paris
Excursiones visitas paris
 
Plano Expomaq
Plano ExpomaqPlano Expomaq
Plano Expomaq
 
Excellence in Innovation and R&D. Reasons to invest in Austria/Carinthia.
Excellence in Innovation and R&D. Reasons to invest in Austria/Carinthia.Excellence in Innovation and R&D. Reasons to invest in Austria/Carinthia.
Excellence in Innovation and R&D. Reasons to invest in Austria/Carinthia.
 
Consejos clave en Redacción Digital
Consejos clave en Redacción DigitalConsejos clave en Redacción Digital
Consejos clave en Redacción Digital
 
Conéctate contigo
Conéctate contigoConéctate contigo
Conéctate contigo
 
Fundamentos De Redes
Fundamentos De RedesFundamentos De Redes
Fundamentos De Redes
 
Perspectiva Fotográfica Artesanías
Perspectiva Fotográfica ArtesaníasPerspectiva Fotográfica Artesanías
Perspectiva Fotográfica Artesanías
 
79545140 เธ‚เน‰เธญเธชเธญเธš-เน‚เธ„เธงเธ•เธฒ-เธกเธŠ-55-เธงเธดเธ—เธขเนŒ1
79545140 เธ‚เน‰เธญเธชเธญเธš-เน‚เธ„เธงเธ•เธฒ-เธกเธŠ-55-เธงเธดเธ—เธขเนŒ179545140 เธ‚เน‰เธญเธชเธญเธš-เน‚เธ„เธงเธ•เธฒ-เธกเธŠ-55-เธงเธดเธ—เธขเนŒ1
79545140 เธ‚เน‰เธญเธชเธญเธš-เน‚เธ„เธงเธ•เธฒ-เธกเธŠ-55-เธงเธดเธ—เธขเนŒ1
 
SGI HPC DAY 2011 Kiev
SGI HPC DAY 2011 KievSGI HPC DAY 2011 Kiev
SGI HPC DAY 2011 Kiev
 
Game over: cómo y cuando cerrar tu startup
Game over: cómo y cuando cerrar tu startupGame over: cómo y cuando cerrar tu startup
Game over: cómo y cuando cerrar tu startup
 
Guía de bienvenida La Nueva Medina 1
Guía de bienvenida La Nueva Medina 1Guía de bienvenida La Nueva Medina 1
Guía de bienvenida La Nueva Medina 1
 
Codigo del comercio
Codigo del comercioCodigo del comercio
Codigo del comercio
 

Similar to Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges

Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Keysolvecore
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019Ulf Mattsson
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 
Gartner Cool Vendor Report 2014
Gartner Cool Vendor Report 2014Gartner Cool Vendor Report 2014
Gartner Cool Vendor Report 2014jenjermain
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRStorage Switzerland
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinBitmovin Inc
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsAndris Soroka
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionUlf Mattsson
 
Samsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial ServicesSamsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial ServicesSamsung SDS America
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonUlf Mattsson
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentationjuniortstanley
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data securityUlf Mattsson
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Mindtree Ltd.
 

Similar to Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges (20)

TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Key
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 
Gartner Cool Vendor Report 2014
Gartner Cool Vendor Report 2014Gartner Cool Vendor Report 2014
Gartner Cool Vendor Report 2014
 
Webinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPRWebinar: How to Design Primary Storage for GDPR
Webinar: How to Design Primary Storage for GDPR
 
DRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and BitmovinDRM Basics With Irdeto and Bitmovin
DRM Basics With Irdeto and Bitmovin
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
 
Samsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial ServicesSamsung SDS FIDO for Financial Services
Samsung SDS FIDO for Financial Services
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
 

Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges

  • 1. Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges A discussion of security issues and architectures for removable data storage. Fred Thomas, Chief Technologist, Adv. R&D, R&D RSA Conference 2002
  • 2.
  • 4.
  • 5.
  • 6. Peerless Block Diagram Inertial Latch Voice Coil Motor Spin Motor Pre-Amp Secure IC ESD Protection Eject Mechanism Motor ID Tag ID Circuitry External Memory Read Channel VCM Driver Spindle Driver Micro-Cntrlr ROM RAM LCD Micro-Cntrlr Logic RAM Power Supply IDE Slave I/O Expansion LED Power Electronics ROM Logic Peerless Cartridge Jasper DE Cartridge Flex HDD PCA Drive PCA Connector PCA Peerless Drive Interface Module Bus Switch
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. The Removable Data Storage Secure Pipe Problem
  • 12.
  • 13. A DRM Protocol for Peerless
  • 14.
  • 15.
  • 16.
  • 17. The “Cash in the Bag” Problem
  • 18. Peerless Enterprise Drive Distributed Encryption Key Implementation
  • 19.
  • 20.
  • 21. Iomega Contact Information Business Contact: Tim Dammon Product General Manager Iomega Corporation 4435 Eastgate Mall San Diego, CA 92121 Phone: 858-795-7049 Fax: 858-795-7004 Email: dammon@iomega.com Technical Contact: Fred Thomas Chief Technologist, Adv. R&D, R&D Iomega Corporation 1821 West Iomega Way Roy, UT 84067 Phone: 801-332-4662 Fax: 801-332-1030 Email: thomasf@iomega.com
  • 22. Have a Good Day!