This invention concept pertains to a large capacity hard drive, that stores data using a pentanary storage system, which stores five different individual switches, for solid state drives (SSD), or five different magnetic strengths, for hard drives with magnetic platters on spindles, for each atomic physical data storage location in the non-volatile memory or on the magnetic storage media, that stores exabytes of information. There is hardware that can decrypt data that is stored in the media, as part of the inline hard drive-controlled hardware.
There are various types of data encryption that occur on the hard drives, including a root file system, which is always untouched. In this file system, there are individual storage compartments, which store files and folders, in addition to other types of data organization units, such as artifacts, which are files that have been deleted, previously, or have been modified into newer versions, that the older versions have either been abandoned, or are being stored in the repudiation system, that is in each storage compartment. There are also descriptors, which are descriptions of files, including how the files have been accessed or modified, including descriptions of the file data, in English, and in other language types, as well. There is compartment encryption, which stores everything in the storage compartment with an encryption certificate, that is managed by the drive. There is also file encryption, which can be managed by the hardware in the drive, and then translated, even into another encrypted format, from the drive, into the storage hardware array.
There is continuous power to the hard drive, through a new type of power connector, that provides a continuous 5-volt current wire with its own ground wire, a continuous 12-volt current wire with its own ground wire, in addition to a system power state 5-volt current wire with its own ground wire, in addition to a system power state 12-volt current wire. The continuous voltage is used to power the drive, even when the power is turned off to the system, with different hardware in the system hardware, and to charge the battery backup system that is contained within the hard drive.
The battery backup in the hard drive is for the purpose of powering wireless network hardware, which can be used to deactivate the hard drive, or pull the encryption keys, or to erase the encryption keys, or even to wipe the encryption keys, or even to communicate with the hard drive, remotely, via satellite communications or through wireless radio frequency towers. With the battery backup, especially in the non-volatile memory versions of this technology, it’s even possible to pull data off of the storage technology, remotely, via satellite communications or radio frequency tower communications, that secured communications systems can interface with the hard drive, and access the data on the storage media, without the drive even physically being in a computer system, even without the hard drive being plugged in.
















