DigiSAFE DiskCrypt Mobile DCM300 User Manual

DISKCRYPT MOBILE
DCM300
USER MANUAL
This page has been left blank intentionally
DiskCrypt
®
Mobile
USER MANUAL
G-P6019-TM001
(ISSUE A)
Issue Date: Apr 2009
Copyright
© 2009 ST Electronics (Info-Security) Pte Ltd. All rights reserved. No part of this material may be reproduced, transcribed, used or disclosed to any third party in any form or by any means, without the written permission of ST Electronics (Info-Security) Pte Ltd.
Trademarks
DigiSAFE logo and DiskCrypt are either trademarks or registered trademarks of ST Electronics (Info-Security) Pte Ltd in Singapore and/or in other countries. DigiSAFE logo is a registered trademark in U.S. Patent and Trademark Office. All other trademarks or registered trademarks are the property of their respective owners.
2009.04.01 Version 1.0
ST Electronics (Info-Security) Pte Ltd
ST Electronics Jurong East Building 100 Jurong East Street 21 Singapore 609602 Tel: (65) 6568 7118 Fax: (65) 6568 7226 Email: info@digisafe.com Website: www.digisafe.com
G-P6019-TM001 ST Electronics (Info-Security) ISSUE A
This page has been left blank intentionally
i
G-P6019-TM001 ST Electronics (Info-Security) ISSUE A
Disclaimer
DigiSAFE DiskCrypt Mobile DCM300 has been designed to be compliant with the SATA hard drive operating spe cification s as well as USB 1.1/2.0 and Firewire 400/800 operating specifications.
ST Electronics (Info-Security) accepts no liability for any loss of data or the inability of DiskCrypt Mobile to work with equipment that are not compatible with the above operating specifications. Nor can ST Electronics (Info-Security) accept any liability or responsibility for software which is also non compliant.
Thank you for purchasing DiskCrypt Mobile.
ii
G-P6019-TM001 ST Electronics (Info-Security) ISSUE A
Contents
1. About this Guide.................................................. 1
2. Introduction ........................................................ 2
2.1. About DiskCrypt Mobile DCM300 2
2.2. DCM300 Connection Ports 3
2.3. Checklist 3
2.4. Specifications 4
3. Installation.......................................................... 5
3.1 Installing a hard drive 5
3.2 Connecting DCM300 to a computer 6
3.3 Using the built-in keypad 7
3.4 Using an AC Power Adapter 8
4 Authentication........................................................ 9
4.1 Inserting the smart card 9
4.2 Entering your PIN 9
5 Setting up the drive.............................................. 10
5.1 Setting up a new drive 10
5.2 Setting up an existing drive 10
6 Disconnecting DCM300......................................... 11
7 Smart Card Security Features............................... 12
7.1 PIN Change 12
7.2 Administrative Mode 13
8 Helpful Information......................................... ..... 14
8.1 Partitioning and formatting your hard drive 14
9 Care and Handling........................................ ........ 15
10 Frequently Asked Questions .............................. 16
11 Troubleshooting ................................................ 19
iii
G-P6019-TM001 ST Electronics (Info-Security) ISSUE A
AMENDMENT RECORD
AMDT NO. AFFECTED PAGE(S) ECN/DCR NO. EFFECTIVE DATE
iv
G-P6019-TM001 ST Electronics (Info-Security) ISSUE A
1. About this Guide
This guide is designed to provide step-by-step instructions for installation of DigiSAFE DiskCrypt Mobile DCM300 and as a reference for its operation and usage.
PLEASE READ AND FOLLOW THE INSTRUCTIONS
PROVIDED IN THIS GUIDE CAREFULLY AND
THOROUGHLY.
FAILURE TO DO SO MAY RESULT IN DAMAGE TO
DISKCRYPT MOBILE AND ANY OR ALL OF THE
CONNECTED DEVICES.
1
G-P6019-TM001 ST Electronics (Info-Security) ISSUE A
2. Introduction
2.1. About DiskCrypt Mobile DCM300
Congratulations on your purchase of DigiSAFE DiskCrypt Mobile DCM300. DiskC ryp t Mobile DCM300 represents the most advanced secure Mobile storage solution today, utilizing smart card authentication technology and AES 128/256 bits full disk encryption. With DiskCrypt Mobile, you can enjoy Mobile storage with the speed and convenience of both USB 2.0 and Firewire 400/800 in a compact form factor, and be assured that your data is safe from prying eyes.
DCM300 is a secure portable hard drive enclosure consisting of a 2.5” SATA hard drive enclosure and a hardware-based encryption module that performs full disk encryption, i.e. it encrypts every byte and every sector of data that is written into the hard drive. The device is designed to fit standard 2.5” hard drives with a SATA interface, and communicates with the computer via either standard USB 2.0 ports or Firewire 400/800 ports. By encrypting every single byte and sector, DCM300 is operating system independent and does not require any software drivers. It also encrypts all temporary files, as well as areas that would normally be missed and left “in the clear” by software encryption products. Encryption and decryption occurs transparently without any loss in disk performance. Users simply use their computers as usual with the assurance and complete piece of mind that their data is fully protected in the unfortunate event that their hard drives are stolen or lost.
DCM300 stores the hard drive encryption key in smart cards (two are provided per unit). Smart card technology is well understood and represents the highest level of security possible for secure data storage. It is vastly more secure than other solutions that use hardware tokens, where the encryption key is stored in insecure memory that can be easily duplicated. In contrast, smart cards store the encryption key securely within, and can only be accessed upon presentation of a valid PIN. The user will need both the smart card as well as knowledge of its PIN to be able to access the data in the connected hard drive. By doing so, DCM300 enforces two-factor authentication, whic h is a higher security protection by ensuring that the user possesses both the physical Smart Card and the knowledge of its PIN.
The user is required to authenticate him or herself each time DCM300 is plugged into the computer. After authentication, the drive present s itself to the operating sys tem and the user is granted normal drive access.
2
Loading...
+ 18 hidden pages