How Secure Is It; Device Security; Application Security; Data Protection - Kingston Technology imation S250 User Manual

Secure usb drives
Table of Contents

Advertisement

Secure Sessions
Device Updates
»
Mac Only—Auto-Launch Assistant

How secure is it?

Imation Personal has been designed from the ground up with security in mind. A combination
of advanced security technologies are used to ensure that only you can access your data.
Additionally, it has been designed to be physically secure, to prevent hardware-level attacks and
tampering, as well as to make the device rugged and long-lasting.
The Imation Cryptochip is hardened against physical attacks such as power attacks and bus
sniffing. It is physically impossible to tamper with its protected data or reset the password
counter. If the Cryptochip detects a physical attack from a hacker, it destroys the encryption
keys, making the stored encrypted files inaccessible.
We strive to be very open about the security architecture and technology that we use in
designing and building this product. There is no hocus-pocus or handwaving here. We use
established cryptographic algorithms, we develop threat models, and we perform security
analyses (internal and third party) of our systems all the way through design, development and
deployment.

DEVICE SECURITY

Data Encryption Keys
»
AES key generated by onboard Random Number Generator
»
AES key generated at initialization time and encrypted with hash of user password
»
No backdoors: AES key cannot be decrypted without the user password
»
AES key never leaves the hardware and is not stored in NAND flash

Data Protection

»
Secure volume does not mount until password is verified in hardware
»
Password try-counter implemented in tamper-resistant hardware
»
Once password try-count is exceeded, all data is erased by hardware
»
Secure box architecture accessible only to firmware to store sensitive data and settings

APPLICATION SECURITY

Device Password Protection
»
USB command channel encryption to protect device communications
»
Password-in-memory protection to protect against cold-boot and other attacks
»
Virtual Keyboard to protect against keyloggers and screenloggers
IMATION PERSONAL - POWERED BY IRONKEY - USER GUIDE
PAGE 7

Advertisement

Table of Contents
loading

This manual is also suitable for:

Imation d250

Table of Contents