Inventor(s)

n/aFollow

Abstract

Many physical locations such as research laboratories and secure facilities implement security measures to prevent data stored at such facilities from being leaked to the outside world. However, leakage of data via small portable electronic devices and/or storage devices by individuals that gain access to the physical location is a concern. Security personnel and physical entryways with scanning technology are deployed to mitigate this concern. However, this is a costly and imperfect solution, with no immediate destruction of data from unauthorized devices. This disclosure describes a secure data destruction portal that enables immediate destruction of data on unauthorized storage media. Per the techniques, hardware exiting a facility is detected and it is determined whether the detected hardware is authorized. If unauthorized storage hardware is found at an exit point, high-intensity magnetic pulses and/or destructive high-energy waves are targeted at the unauthorized device to render them unreadable. Destruction of data is performed by choosing an appropriate configuration of such mechanisms even for hardware that is shielded. The techniques enable immediate destruction of data, thus eliminating the threat of physical data exfiltration.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS