Advertisement

Quick Links

HDDkey
The KEY for your undisturbed sleep...
WARNING!
HDDKEY is intended to be used with hard drives ONLY!
DO NOT try to connect it to your CD-ROM or DVD-ROM.
Connecting the HDDKEY to a device other than the
HARD DRIVE can damage the HDDKEY!
There can be only one HDDKEY controlled hard drive on
one IDE cable!
Do NOT connect any IEEE-1394 FireWire devices and do
NOT connect your key token to the FireWire port!
www.elkom.com.tw
HDDkey – user manual
ELKOM
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HDDkey and is the answer not in the manual?

Questions and answers

Summary of Contents for elkom HDDkey

  • Page 1 HDDkey The KEY for your undisturbed sleep... WARNING! HDDKEY is intended to be used with hard drives ONLY! DO NOT try to connect it to your CD-ROM or DVD-ROM. Connecting the HDDKEY to a device other than the HARD DRIVE can damage the HDDKEY!
  • Page 2: Table Of Contents

    Image 8..........................7 Image 9. Key tokens......................7 4. Preparing drives .....................8 5. More HDDKEY devices and only one secret key token ....8 The 6pin header socket ....................9 SPECIFICATION ..............10 10 pin secret key header on the HDDKEY controller board......10 Power supply socket on the HDDKEY controller board.
  • Page 3: Features

    ELKOM FEATURES HDDKEY is a revolutionary device intended to encrypt in real time, the entire hard disk con- tent, on the fly, without performance degradation. You will not notice that the device is at- tached. You will not notice any performance lose of your system. Everything on the hard drive is encrypted from the partition table, through the boot sector (MBR) to the operating system, swap file and all user files.
  • Page 4: Installation Overview

    ELKOM www.elkom.com.tw INSTALLATION 1. Installation Overview HDDKEY is an operating system independent and does not require any software drivers. HDDkey – user manual...
  • Page 5: System Configurations

    HDDKEY encrypted hard drives to the same IDE controller. The drive controlled by HDDKEY is fully encrypted. However, the drive that is positioned in front of the HDDKEY stores only clear text and is therefore an unencrypted drive. Encrypted and non-encrypted text may be exchanged by simply dragging and dropping files.
  • Page 6: Image 4. Slave Drive Encrypted With Master Dvd Recorder

    The user is advised to hide one small memory device token in a safe and secret repository and use only one secret key token at a time. HDDkey – user manual...
  • Page 7: Image 7

    Older FireWire 6pin connector sometimes spotted in the computer hardware. The pin number ONE is marked at the bottom of the printed circuit board of the HDDKEY. Connect a cable from your computer’s cabinet to the pins on the HDDKEY as follows: Image 7.
  • Page 8: Preparing Drives

    From now you are secure! Until your secret key token is under your possession you are safe. The HDDKEY does not have any recovery feature so if you lose all of your secret key tokens then your data will be lost forever.
  • Page 9: The 6Pin Header Socket

    ELKOM between devices. You can do the same if you connect three or four HDDKEY controllers in your computer system by bridging them together using a piece of wire with appropriate plugs. Your normal key token can be connected to any HDDKEY in the chain.
  • Page 10: Specification

    • KEY ACCEPT LED must not flash during the normal operation when a key token was accepted 10 pin secret key header HDDKEY FireWire on the HDDKEY controller board. number Pin description Pin Description 93C46 EEPROM chipselect TPA+ 93C46 EEPROM clock...
  • Page 11: Jumper Settings On The Hddkey Controller Board

    In case of the data corruption caused by a virus or a simple operating system failure please recover your data in the usual way with the HDDKEY present in your computer and with your proper key token. Even if you have corrupted data on your hard drive you can recover them.

Table of Contents