1. Field of the Invention
This invention relates to a security lock slot and more particularly relates to opening a security lock slot of an electronic device.
2. Description of the Related Art
Many modern electronic devices are equipped with a security lock slot, especially smaller, portable devices such as laptops, LCD screens, or even some desktop computers. The slot, usually a three millimeter by seven millimeter opening configured for an external lock, is often located in the case of the electronic device. Although several types of locks exist, Kensington® is the industry standard. Kensington® locks typically include a T-shaped latch which is capable of rotation by inserting a key into the lock head and turning the key or by setting a lock combination in the lock head.
A security lock is usually not intended to provide tight security, but rather to act as a deterrent to someone searching for an easy theft. The lock may be forcibly removed, often damaging the case of the electronic device. Security locks are used by individuals, libraries, schools, electronics retailers, businesses, or anywhere in which electronic devices may be at risk of theft.
A computer program product is presented for opening a security lock slot of an electronic device. The operations of the computer program product may comprise receiving a lock slot command and a user credential by way of a software user interface of an electronic device comprising a security lock slot module configured to disengage a tether anchor in response to an electronic signal, authenticating the user credential, and sending an electronic signal to the security lock slot module such that the security lock slot module opens the security lock slot to disengage the tether anchor in response to a positive authentication and the lock slot command comprising an open instruction. Additionally, the computer program product may engage a tether anchor in response to an electronic signal, the computer program product operations further comprising closing the security lock slot in response to the lock slot command comprising a close instruction. In one embodiment, the user credential comprises a password.
In a further embodiment, the computer program product may be configured such that the user interface comprises a software interface selected from the group consisting of a BIOS user interface, an operating system user interface, an application user interface, and an electronic device configuration user interface. In one embodiment, the security lock slot is configured such that rotation of the latch within the security lock slot permits the latch to disengage with the security lock slot, the tether anchor further comprising a lock connecting the security tether and the latch, the lock configured to retain the latch in a locked position relative to the security lock slot and rotate the latch to an unlocked position relative to the security lock slot. The security lock slot may also comprise an opening having a three millimeter height and a seven millimeter width.
In addition, an apparatus for opening a security lock slot of an electronic device is provided with a plurality of modules configured to functionally execute the necessary steps as described above in relation to the computer program product. These modules in the described embodiments include a software user-interface module, an authentication module, a security lock slot module, and a signal module. The security lock slot module, in one embodiment, may comprise a gate configured to raise and lower, a rack on the inside surface of the gate, and a pinion in contact with the rack, the pinion configured to turn to raise and lower the gate. The apparatus is further configured, in one embodiment, wherein the user credential comprises a user name and a password.
A system of the present invention is also presented for opening a security lock slot of an electronic device. The security lock slot module of the system may also comprise a gate configured to raise and lower, a rack on the inside surface of the gate, and a pinion in contact with the rack, the pinion configured to turn to raise and lower the gate. The lock slot may comprise an opening sized to receive a Kensington® standard cable lock device.
Reference throughout this specification to features or similar language does not imply that all of the features that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features is understood to mean that a specific feature or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussion of the features and similar language, throughout this specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize that the invention may be practiced without one or more of the specific features of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
Understanding that these drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings, in which:
Many of the functional units described in this specification have been labeled as modules, in order to more particularly emphasize their implementation independence. For example, a module may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
Modules may also be implemented in software for execution by various types of processors. An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
Indeed, a module of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices.
Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As will be appreciated by one skilled in the art, the present invention may be embodied as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, the present invention may take the form of a computer program product on a computer-usable storage medium having computer-usable program code embodied in the medium.
Any suitable computer usable or computer readable medium may be utilized. The computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a transmission media such as those supporting the Internet or an intranet, or a magnetic storage device. Note that the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory. In the context of this document, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer usable program code may be transmitted using any appropriate medium, including but not limited to the Internet, wireline, optical fiber cable, RF, etc.
Computer program code for carrying out operations of the present invention may be written in an object oriented programming language such as Java, Smalltalk, C++ or the like. However, the computer program code for carrying out operations of the present invention may also be written in conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
The present invention is described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
Furthermore, the described features, structures, or characteristics of the invention may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided, such as examples of programming, software modules, user selections, network transactions, database queries, database structures, hardware modules, hardware circuits, hardware chips, etc., to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
Other electronic devices which may be configured with a security lock slot include, but are not limited to desktop computers, LCD screens, televisions, Personal Digital Assistants (PDAs), printers, projectors, and docking stations.
The present invention releases a standard cable lock from a security lock slot without a key or combination. Conventional standard cable locks and security lock slots are designed to be broken if needed in case of a lost key or broken lock. However, with the electronic release functionality provided by the present invention, the lock and/or security lock slot 102 may be strengthened.
In the illustrated embodiment, the opening 106 has a width of seven millimeters and a height of three millimeters, or the standard size of a Kensington® style security lock slot opening. Depending on the manufacturer of the electronic device, some lock slot openings 106 may have a width of three millimeters and a height of seven millimeters.
In another embodiment, the security lock slot 102 is sized and shaped such that rotation of the latch 116 within the security lock slot 102 does not permit the latch 116 to disengage with the security lock slot 102. In this embodiment, the opening 106 is smaller than the latch 116, regardless of how the latch 116 is rotated. A library or office may use this embodiment to secure multiple desktop computers without cable locks, keys, or combinations as the latch 116 would not necessarily require the capability to rotate.
The tether anchor 204 may have an attached or built-in key lock 202, a lock with a combination, or no lock. The lock 202 keeps the latch 214 from rotating when the latch 214 is in a locked position relative to the security lock slot 102. Releasing the lock 202 allows the latch 214 to rotate the latch 214 to an unlocked position relative to the security lock slot 102. This embodiment utilizes a standard Kensington® style lock.
The present invention permits the freeing of the Kensington® style lock without releasing the lock itself. This feature is helpful if the key for the lock or combination of the lock is lost or stolen. For example, a user who has released her security lock using the security lock slot module 206 to open the security lock slot 102 of her electronic device 100 may wish to secure her electronic device 100 again with the security lock. The user may insert the security lock tether anchor 204 and close the security lock slot 102 to engage the tether anchor 204. In this manner, a user may secure her electronic device 100 without using the key to the security lock. This procedure may be used by hotels, libraries, convention centers, and similar institutions to supply permanent tether anchors with no locks and non-rotating latches for users to secure their electronic devices. Alternatively, a fake or dummy cable lock made to look like a Kensington® style lock having non-rotating latches may be used to deter theft and still permit the user to free the electronic device 100 or engage the electronic device 100 using the security lock slot module 206.
The tether anchor 204 and lock 202 may have an attached security tether 200. The security tether 200 may be a flexible steel cable with a loop on the end used to secure the electronic device 100 to a desk, the wall, or any immovable object thereby preventing a thief from stealing the electronic device.
The gate 212 is in a lowered or closed position, thereby engaging a latch 214 of the tether anchor 204. If a lock with a rotating latch is used, a tether anchor latch 214 may comprise a standard T-shaped latch similar to the Kensington style latch or an L-shaped latch with a prong on one side. In addition, if the tether anchor 204 does not include a lock and the security lock slot module 206 will be used strictly to engage or disengage the tether anchor, a mushroom shaped latch or latch with a round disk at the end may be used. With a mushroom shaped latch, the security lock slot 102 must be in the open position as pictured in
Inside the security lock slot module 206, the surface of the gate 212, includes a rack 210. A pinion 208 engages the rack 210 and turns to raise or lower the gate 212. The pinion 208 may be driven by an actuator activated by an electronic signal. The signal may cause the actuator to trigger a pin which releases a coil spring. The released coil spring may rotate the pinion 206 to open the gate. In a further embodiment, the actuator may trigger a pin to release the gate 212 which is raised by the force of a pretensioned coil spring. The gate 212 may be lowered, and the security lock slot closed, by a hardware switch that lowers the gate 212 and biases the spring. In one embodiment, the hardware switch may be activated as the user inserts a tether anchor latch 214 into the security lock slot 102. In another embodiment, an electronic controller may receive an electronic signal and drive an electronic motor comprising gears configured to rotate the pinion 208 to open and/or close the gate 212.
The security lock slot 102 may also be configured with two gates, one above the latch 214 as pictured in
The software user-interface module 302 handles the request from the user to initiate operation of the security lock slot module 310 and the software user-interface module 302 also inputs a user credential 306. In one embodiment, the software user-interface module 302 is configured to receive a lock slot command and a user credential 306. The software user-interface module 302 may include a BIOS user interface, an operating system user interface, an application user interface, or an electronic device configuration user interface.
The user credential 306 may include a user name and a password. The user credential 306 may also comprise a password alone, a predetermined series of keystrokes, a thumbprint scan, a retina scan, a biometric or smartcard reading, voice recognition, or any other mode of authentication. In one embodiment, the authentication module 304 authenticates the user credential.
The lock slot command may be implicit in the launching of the software user-interface module 302. Therefore, in one embodiment, the activation of the software user-interface module 302 constitutes the receiving of an open lock slot command. In another embodiment, a lock slot command is selected or inputted by the user and may include an open lock slot command or close lock slot command.
An example of a software user-interface module is an application running on the operating system of a laptop computer, which, when launched, constitutes an open lock slot command and queries the user for a password 306. Certain electronic devices 100 such as an LCD monitor may not have an operating system or BIOS, and may not be capable of running a software application. In such electronic devices 100 a configuration user interface may include the software user-interface 302.
The signal module 308 receives a lock slot command and transmits an electronic signal to open or close the lock slot 102. In one embodiment, the signal module 308 is implemented in software and passes the electronic signal to the security lock slot module 310.
The security lock slot module 310 converts electronic signals from the signal module 308 into mechanical operations to move the gate 212 of the security lock slot 102. The security lock slot module 310 in one embodiment may include a combination of electrical, electromechanical, and/or mechanical components and may comprise the form and function of the security lock slot module 206 illustrated in
In certain embodiments, the security lock slot module 310 may both raise and lower the gate and thereby both open and close the security lock slot 102 in response to an electronic signal from the signal module 308.
The schematic flow chart diagrams that follow are generally set forth as logical flow chart diagrams. As such, the depicted order and labeled steps are indicative of one embodiment of the presented method. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more steps, or portions thereof, of the illustrated method. Additionally, the format and symbols employed are provided to explain the logical steps of the method and are understood not to limit the scope of the method. Although various arrow types and line types may be employed in the flow chart diagrams, they are understood not to limit the scope of the corresponding method. Indeed, some arrows or other connectors may be used to indicate only the logical flow of the method. For instance, an arrow may indicate a waiting or monitoring period of unspecified duration between enumerated steps of the depicted method. Additionally, the order in which a particular method occurs may or may not strictly adhere to the order of the corresponding steps shown.
For example, a user enters a password and user name into the BIOS software user-interface 302 of a laptop computer after, or along with, an open command. The authentication module 304 makes a positive authentication of the user credential. The signal module 308 sends an electronic signal to the security lock slot module 310 and the security lock slot module 310 opens the security lock slot 102 of the laptop computer. The user may then remove the latch 214 from the security lock slot 102.
Alternatively, if the signal module 308 determines 512 that the lock slot command is a close command, the signal module 308 sends 520 a close signal to the security lock slot module 310. Inside the security lock slot module 310, an electronic controller receives the electronic signal and drives an electronic motor which rotates the pinion 208. The rotation of the pinion closes the gate and the security lock slot 102 closes 522. The security lock slot engages 524 the tether anchor 204, and the method ends 526.
For example, suppose a user does not have his security lock key but wishes to remove the lock from his desktop. The user turns on the desktop computer and accesses the software user-interface module 302 which is contained in the operating system of the desktop computer, in one embodiment. The user selects a lock slot open command from the user-interface and enters a password in response to a prompt. The user-interface module 302 receives the lock slot command and user password. Upon a positive authentication of the user password, the signal module 308 determines that the lock slot command is an open command and sends an open signal to the security lock slot module 310. The security lock slot module 310 opens the security lock slot 102, and the user is able to disengage his tether anchor 204 from the desktop without damaging the security lock slot 102 or the housing.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.