The method involves integrating data storage peripheral (1) and an input-output controller (2) transforming the peripheral by deriving controls of an input-output interface (13) from a host system (20), in a device. The device is protected against duplication by an internal secret identifier (7) in correspondence with a series of number specially marked and by a perimetric protection enclosure (10). An independent claim is also included for a device for storing computer data.
展开▼