US 12,314,407 B2
System and method for facilities access breach detection and information protection
Philip J. Ufkes, Sullivan's Island, SC (US); and Matthew Frank Trapani, Deerfield, IL (US)
Assigned to Security Enhancement Systems, LLC, Northbrook, IL (US)
Filed by Security Enhancement Systems, LLC, Northbrook, IL (US)
Filed on Feb. 25, 2022, as Appl. No. 17/681,579.
Claims priority of provisional application 63/205,652, filed on Feb. 28, 2021.
Prior Publication US 2022/0277087 A1, Sep. 1, 2022
Int. Cl. G06F 21/60 (2013.01); G07C 9/00 (2020.01); G08B 13/02 (2006.01)
CPC G06F 21/60 (2013.01) [G07C 9/00571 (2013.01); G07C 9/00896 (2013.01); G08B 13/02 (2013.01); G06F 2221/2107 (2013.01); G06F 2221/2143 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A data protection system comprising:
at least one breach detection sensor configured to detect a physical access attempt at an access point of a data center facility;
an alarm system communicably engaged with the at least one breach detection sensor to receive at least one sensor input in response to the physical access attempt at the access point of the data center facility;
a controller communicably engaged with the alarm system and one or more electronic access control device,
wherein the controller is configured to command the one or more electronic access control device to selectively grant or restrict access to the access point of the data center facility,
wherein the alarm system is configured to send a notification signal to the controller in response to the at least one sensor input,
wherein the controller is configured to receive and process the notification signal and one or more access credentials for the one or more electronic access control device to determine whether the physical access attempt at the access point of the data center facility is authorized;
one or more server communicably engaged with the controller or the alarm system, wherein the one or more server comprises an erasure software stored thereon that, when executed, is configured to permanently erase all or a portion of data residing on one or more hard drives or memory devices communicably engaged with the one or more server,
wherein one or more operations of the erasure software are executed in response to determining that the physical access attempt at the access point of the data center facility is not authorized.