[go: up one dir, main page]

MA40477A - Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants - Google Patents

Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants

Info

Publication number
MA40477A
MA40477A MA040477A MA40477A MA40477A MA 40477 A MA40477 A MA 40477A MA 040477 A MA040477 A MA 040477A MA 40477 A MA40477 A MA 40477A MA 40477 A MA40477 A MA 40477A
Authority
MA
Morocco
Prior art keywords
components
controlled
stored information
technology
sensitive
Prior art date
Application number
MA040477A
Other languages
English (en)
Inventor
Peter Hofleitner
Martin Tross
Original Assignee
Pahmet Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pahmet Llc filed Critical Pahmet Llc
Publication of MA40477A publication Critical patent/MA40477A/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42DBLASTING
    • F42D3/00Particular applications of blasting techniques
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42BEXPLOSIVE CHARGES, e.g. FOR BLASTING, FIREWORKS, AMMUNITION
    • F42B3/00Blasting cartridges, i.e. case and explosive
    • F42B3/087Flexible or deformable blasting cartridges, e.g. bags or hoses for slurries
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C11/00Electric fuzes
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C15/00Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges
    • F42C15/40Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically
    • F42C15/42Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically from a remote location, e.g. for controlled mines or mine fields
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C9/00Time fuzes; Combined time and percussion or pressure-actuated fuzes; Fuzes for timed self-destruction of ammunition
    • F42C9/14Double fuzes; Multiple fuzes
    • F42C9/16Double fuzes; Multiple fuzes for self-destruction of ammunition
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Burglar Alarm Systems (AREA)
  • Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)

Abstract

L'invention concerne un système et un procédé pour la destruction d'informations stockées électroniquement et/ou de composants qui incorporent une technologie sensible ou qui contiennent des informations sensibles lors du déroulement d'un ou de plusieurs événements prédéterminés. Le système et le procédé de la présente invention sont particulièrement appropriés à la protection d'informations stockées électroniquement et/ou de technologie classifiée dans des systèmes déployés dans un environnement de fonctionnement. Le système et le procédé de la présente invention peuvent être incorporés dans des drones, des aéronefs de dimension normale, un type quelconque de véhicule, des mines, des missiles, des torpilles, des bombes, des téléphones, des caméras, des robots, des satellites ou d'autres engins spatiaux, des ordinateurs, des disques durs, des clés usb, des commutateurs, des routeurs, des dispositifs d'écoute, des porte-documents, des coffres-forts, et, d'une manière générale, tout dispositif qui utilise des composants sur lesquels des données sensibles sont stockées ou des composants qui utilisent une technologie à laquelle seul du personnel autorisé doit accéder.
MA040477A 2014-08-26 2015-08-26 Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants MA40477A (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US201462041738P 2014-08-26 2014-08-26

Publications (1)

Publication Number Publication Date
MA40477A true MA40477A (fr) 2016-03-03

Family

ID=55400468

Family Applications (1)

Application Number Title Priority Date Filing Date
MA040477A MA40477A (fr) 2014-08-26 2015-08-26 Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants

Country Status (5)

Country Link
US (2) US10521598B2 (fr)
EP (2) EP3186585B1 (fr)
IL (1) IL250739A0 (fr)
MA (1) MA40477A (fr)
WO (1) WO2016033123A1 (fr)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3186585B1 (fr) 2014-08-26 2020-04-22 Pahmet LLC Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants
US9431354B2 (en) 2014-11-06 2016-08-30 International Business Machines Corporation Activating reactions in integrated circuits through electrical discharge
US9859227B1 (en) 2016-06-30 2018-01-02 International Business Machines Corporation Damaging integrated circuit components
US10290594B2 (en) 2016-07-28 2019-05-14 International Business Machines Corporation Fragmenting computer chips
CN110419209A (zh) * 2017-03-31 2019-11-05 日本电气株式会社 信息处理装置、信息处理方法和信息处理程序
US11093611B2 (en) 2017-06-25 2021-08-17 ITsMine Ltd. Utilization of deceptive decoy elements to identify data leakage processes invoked by suspicious entities
AU2019230114B2 (en) * 2018-03-07 2024-01-04 Austin Star Detonator Company Enhanced safety and reliability for a networked detonator blasting system
US11243710B1 (en) * 2018-04-02 2022-02-08 Dominic B. Picone System and method for remote drive destruction
US11096243B2 (en) 2018-04-13 2021-08-17 Kwesst Inc. Programmable multi-waveform RF generator for use as battlefield decoy
US10969467B1 (en) 2018-04-13 2021-04-06 Kwesst Inc. Programmable multi-waveform RF generator for use as battlefield decoy
EP3604049B1 (fr) * 2018-08-03 2022-10-05 Aptiv Technologies Limited Unité de commande de véhicule sécurisée
CN110210260B (zh) * 2019-06-13 2020-12-08 深圳市风云实业有限公司 数据自毁系统及方法
IL283154B2 (en) 2021-05-12 2024-09-01 D Fend Solutions Ad Ltd Disruption to an operation of an unmanned aerial vehicle background
CO2022013208A1 (es) * 2022-09-15 2024-03-18 Fernandez Juan Carlos Cantillo Dispositivo destructor de hardware

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3827362A (en) * 1972-08-14 1974-08-06 Us Navy Electrical circuit destruct system
US4464989A (en) 1983-05-13 1984-08-14 The United States Of America As Represented By The United States Department Of Energy Integral low-energy thermite igniter
NL1005598C2 (nl) * 1997-03-21 1998-09-22 Iq Sec N V S A Inrichting voor het beveiligen van waardevolle goederen en opslagrek alsmede basisstation ten gebruike daarmee.
WO2002095550A2 (fr) 2001-04-25 2002-11-28 Marc Elisha Grey Dispositif de securite servant a securiser physiquement un support de stockage de donnees numerisees, et procede d'utilisation associe
FR2837304B1 (fr) * 2002-03-13 2004-05-28 Commissariat Energie Atomique Dispositif electronique securise
US7021217B2 (en) 2002-04-11 2006-04-04 Tanner Research, Inc. Versatile cavity actuator and systems incorporating same
US7964045B1 (en) 2003-06-11 2011-06-21 The United States Of America As Represented By The Secretary Of The Army Method for producing and using high explosive material
US7576653B2 (en) * 2006-03-15 2009-08-18 Angel Secure Networks, Inc. Secure panel with remotely controlled embedded devices
US20090251283A1 (en) 2006-05-02 2009-10-08 Orient Instrument Computer Co., Ltd. Property management system
US8275724B2 (en) 2008-10-15 2012-09-25 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Method of improving system performance and survivability through changing function
US9015075B2 (en) * 2006-09-29 2015-04-21 Oracle America, Inc. Method and apparatus for secure information distribution
US9135473B2 (en) 2007-08-08 2015-09-15 Honeywell International Inc. Method and apparatus for erasure of data from a data storage device located on a vehicle
US8332661B2 (en) * 2008-09-11 2012-12-11 Mostovych Andrew N Method and apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from microdevices
US20100132047A1 (en) * 2008-11-24 2010-05-27 Honeywell International Inc. Systems and methods for tamper resistant memory devices
GB2497920A (en) * 2011-12-08 2013-07-03 Pangaea Media Ltd Apparatus for storing data includes an SSD and means for causing physical damage to the SSD
US8925462B2 (en) * 2012-06-27 2015-01-06 Raytheon Company Intermediate voltage arming
CN104102882B (zh) * 2013-04-12 2017-05-03 腾讯科技(深圳)有限公司 一种应用程序隐私数据的保护方法及装置
EP3186585B1 (fr) 2014-08-26 2020-04-22 Pahmet LLC Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants

Also Published As

Publication number Publication date
EP3186585A4 (fr) 2018-04-11
US10521598B2 (en) 2019-12-31
US20200097668A1 (en) 2020-03-26
US20170277901A1 (en) 2017-09-28
EP3186585B1 (fr) 2020-04-22
US10824743B2 (en) 2020-11-03
EP3186585A1 (fr) 2017-07-05
IL250739A0 (en) 2017-04-30
EP3726180A1 (fr) 2020-10-21
WO2016033123A1 (fr) 2016-03-03

Similar Documents

Publication Publication Date Title
MA40477A (fr) Système et procédé pour la destruction autonome ou télécommandée d'informations stockées ou de composants
CO2019013817A2 (es) Sistema y método para la identificación biométrica
Atkinson et al. Drone forensics: The impact and challenges
FR3072581B1 (fr) Drone de recherche et de marquege d'une cible
Mohan Cybersecurity in drones
WO2017011051A3 (fr) Techniques de protection et de chiffrement de données sécurisées pour dispositifs informatiques et stockage d'informations
Schulte The Strategic Risks of Devaluing Nuclear Weapons
Lemieux Intelligence and surveillance technologies
Caton Dancing on the Razor’s Edge: A Foundational Review of IoT Exploitation and Defense through the Lens of TECHINT Collection
Hall I See You: Examining GPS Technology under Alabama's Criminal Code
Bates Driverless Vehicle Security: Considering Potential Attacks and Countermeasures for Military Applications
Lee The interim years of cyberspace
Paladini Near Space Instability. Geopolitical Tensions, Debris Crisis, and Cyberattacks
Fussey Chapter 13-Terrorist threats to the Olympics, 1972–2016: Chapter taken from Terrorism and the Olympics ISBN: 978-0-203-83522-7
Kanaoka et al. Ransomware: Threat Analysis and Countermeasures
Oakley Exploiting Payloads
Barstow Land Grant Application-Barstow, Benjamin (Nobleborough)
BĂEȚICA A Study on Security of Information Systems
Sonar et al. Protection of user data in cloud computing
Libby Land Grant Application-Libby, Jonathan (Scarborough)
Bamford Battle in the Cloud
SK8134Y1 (sk) Kryt na kameru notebooku
El-Said et al. Detect and Defend System On a Stick (D2S2) Against GPS Spoofing Attack
Sprenger Launcher test set for Nov. 17: Trinational Meeting Paves Way For Contract Covering MEADS'Final Years
Boone Remember the Dream... It's Our Time to Act!