![](/html/ec/ecf9/ecf91d8d955a36ecb4ecd69618b7edd3f86fb046b02ee7b6f1c4150cfc5cc0c3/bg2.png)
This page has been left blank intentionally
![](/html/ec/ecf9/ecf91d8d955a36ecb4ecd69618b7edd3f86fb046b02ee7b6f1c4150cfc5cc0c3/bg3.png)
DiskCrypt
®
Mobile
USER MANUAL
G-P6019-TM001
(ISSUE A)
Issue Date: Apr 2009
Copyright
© 2009 ST Electronics (Info-Security) Pte Ltd. All rights reserved. No part of this
material may be reproduced, transcribed, used or disclosed to any third party in any form
or by any means, without the written permission of ST Electronics (Info-Security) Pte Ltd.
Trademarks
DigiSAFE logo and DiskCrypt are either trademarks or registered trademarks of ST
Electronics (Info-Security) Pte Ltd in Singapore and/or in other countries. DigiSAFE logo is
a registered trademark in U.S. Patent and Trademark Office. All other trademarks or
registered trademarks are the property of their respective owners.
2009.04.01 Version 1.0
ST Electronics (Info-Security) Pte Ltd
ST Electronics Jurong East Building
100 Jurong East Street 21
Singapore 609602
Tel: (65) 6568 7118
Fax: (65) 6568 7226
Email: info@digisafe.com
Website: www.digisafe.com
![](/html/ec/ecf9/ecf91d8d955a36ecb4ecd69618b7edd3f86fb046b02ee7b6f1c4150cfc5cc0c3/bg4.png)
G-P6019-TM001
ST Electronics (Info-Security) ISSUE A
This page has been left blank intentionally
i
![](/html/ec/ecf9/ecf91d8d955a36ecb4ecd69618b7edd3f86fb046b02ee7b6f1c4150cfc5cc0c3/bg5.png)
G-P6019-TM001
ST Electronics (Info-Security) ISSUE A
Disclaimer
DigiSAFE DiskCrypt Mobile DCM300 has been designed to be compliant with the SATA
hard drive operating spe cification s as well as USB 1.1/2.0 and Firewire 400/800 operating
specifications.
ST Electronics (Info-Security) accepts no liability for any loss of data or the inability of
DiskCrypt Mobile to work with equipment that are not compatible with the above
operating specifications. Nor can ST Electronics (Info-Security) accept any liability or
responsibility for software which is also non compliant.
Thank you for purchasing DiskCrypt Mobile.
ii
![](/html/ec/ecf9/ecf91d8d955a36ecb4ecd69618b7edd3f86fb046b02ee7b6f1c4150cfc5cc0c3/bg6.png)
G-P6019-TM001
ST Electronics (Info-Security) ISSUE A
Contents
1. About this Guide.................................................. 1
2. Introduction ........................................................ 2
2.1. About DiskCrypt Mobile DCM300 2
2.2. DCM300 Connection Ports 3
2.3. Checklist 3
2.4. Specifications 4
3. Installation.......................................................... 5
3.1 Installing a hard drive 5
3.2 Connecting DCM300 to a computer 6
3.3 Using the built-in keypad 7
3.4 Using an AC Power Adapter 8
4 Authentication........................................................ 9
4.1 Inserting the smart card 9
4.2 Entering your PIN 9
5 Setting up the drive.............................................. 10
5.1 Setting up a new drive 10
5.2 Setting up an existing drive 10
6 Disconnecting DCM300......................................... 11
7 Smart Card Security Features............................... 12
7.1 PIN Change 12
7.2 Administrative Mode 13
8 Helpful Information......................................... ..... 14
8.1 Partitioning and formatting your hard drive 14
9 Care and Handling........................................ ........ 15
10 Frequently Asked Questions .............................. 16
11 Troubleshooting ................................................ 19
iii
![](/html/ec/ecf9/ecf91d8d955a36ecb4ecd69618b7edd3f86fb046b02ee7b6f1c4150cfc5cc0c3/bg7.png)
G-P6019-TM001
ST Electronics (Info-Security) ISSUE A
AMENDMENT RECORD
AMDT NO. AFFECTED PAGE(S) ECN/DCR NO. EFFECTIVE DATE
iv
![](/html/ec/ecf9/ecf91d8d955a36ecb4ecd69618b7edd3f86fb046b02ee7b6f1c4150cfc5cc0c3/bg8.png)
G-P6019-TM001
ST Electronics (Info-Security) ISSUE A
1. About this Guide
This guide is designed to provide step-by-step instructions for installation of DigiSAFE
DiskCrypt Mobile DCM300 and as a reference for its operation and usage.
PLEASE READ AND FOLLOW THE INSTRUCTIONS
PROVIDED IN THIS GUIDE CAREFULLY AND
THOROUGHLY.
FAILURE TO DO SO MAY RESULT IN DAMAGE TO
DISKCRYPT MOBILE AND ANY OR ALL OF THE
CONNECTED DEVICES.
1
![](/html/ec/ecf9/ecf91d8d955a36ecb4ecd69618b7edd3f86fb046b02ee7b6f1c4150cfc5cc0c3/bg9.png)
G-P6019-TM001
ST Electronics (Info-Security) ISSUE A
2. Introduction
2.1. About DiskCrypt Mobile DCM300
Congratulations on your purchase of DigiSAFE DiskCrypt Mobile DCM300. DiskC ryp t Mobile
DCM300 represents the most advanced secure Mobile storage solution today, utilizing
smart card authentication technology and AES 128/256 bits full disk encryption. With
DiskCrypt Mobile, you can enjoy Mobile storage with the speed and convenience of both
USB 2.0 and Firewire 400/800 in a compact form factor, and be assured that your data is
safe from prying eyes.
DCM300 is a secure portable hard drive enclosure consisting of a 2.5” SATA hard drive
enclosure and a hardware-based encryption module that performs full disk encryption, i.e.
it encrypts every byte and every sector of data that is written into the hard drive. The
device is designed to fit standard 2.5” hard drives with a SATA interface, and
communicates with the computer via either standard USB 2.0 ports or Firewire 400/800
ports. By encrypting every single byte and sector, DCM300 is operating system
independent and does not require any software drivers. It also encrypts all temporary
files, as well as areas that would normally be missed and left “in the clear” by software
encryption products. Encryption and decryption occurs transparently without any loss in
disk performance. Users simply use their computers as usual with the assurance and
complete piece of mind that their data is fully protected in the unfortunate event that their
hard drives are stolen or lost.
DCM300 stores the hard drive encryption key in smart cards (two are provided per unit).
Smart card technology is well understood and represents the highest level of security
possible for secure data storage. It is vastly more secure than other solutions that use
hardware tokens, where the encryption key is stored in insecure memory that can be
easily duplicated. In contrast, smart cards store the encryption key securely within, and
can only be accessed upon presentation of a valid PIN. The user will need both the smart
card as well as knowledge of its PIN to be able to access the data in the connected hard
drive. By doing so, DCM300 enforces two-factor authentication, whic h is a higher security
protection by ensuring that the user possesses both the physical Smart Card and the
knowledge of its PIN.
The user is required to authenticate him or herself each time DCM300 is plugged into the
computer. After authentication, the drive present s itself to the operating sys tem and the
user is granted normal drive access.
2