Embodiments of the present technology relate to apparatuses that secure laptops to display surfaces.
Laptops are generally displayed in retail stores on display tables in such a way that allows users to inspect and evaluate the laptop, both with respect to its physical look and feel, as well as its operation. Since laptops are costly, it would be preferable if they could be secured to the display surface to prevent theft. While there are currently some security apparatuses available to securely display laptops in retail stores, it would be beneficial to provide an improved laptop security apparatus.
Laptops, as the term is used herein, include notebook computers, and convertible notebook computers. A convertible laptop typically includes a lower body portion (that includes a keyboard) and an upper body portion (that includes a display screen) that are attached to one another by a hinge. The hinge allows the laptop to selectively be put in either a closed position or an open position. In a convertible laptop, the upper portion can rotate about the hinge by nearly 360°, from a closed position (where the display is adjacent to and nearly abutting the keyboard), to a position where the back of the upper body portion abuts the opposite side of the lower body portion. This allows a convertible laptop to “convert” to resemble a tablet computer, along with other configurations.
A security apparatus of the present technology is configured to secure a secured object on a mounting surface. The security apparatus comprises a housing assembly, and a first arm assembly and a second arm assembly extending from and retractable into the housing assembly. The security apparatus also includes a first end assembly mounted to the first arm assembly, and a second end assembly mounted to the second arm assembly, each arm assembly configured to receive a first side and a second side of a lower body portion of a secured object, each end assembly including a channel having an arcuate top portion sized for placement between an upper body portion and the lower body portion of the secured object. The security apparatus includes a support housing supporting the housing assembly, first and second arm assemblies, and first and second end assemblies on the mounting surface. The security apparatus also includes a trapping member positioned in the housing assembly. The security apparatus includes a locking rod having a first end extending outside the support housing and a second end extending into the housing assembly and into engagement with the trapping member, the locking rod configured to move the trapping member into engagement with the first and second arm assemblies.
Embodiments include a security apparatus where the locking rod is configured to move the trapping member into engagement with the first arm assembly and the second arm assembly when the locking rod is rotated. Embodiments include a security apparatus where the locking rod includes a threaded region extending from the second end toward the first end, the threaded region received in a threaded bore in the housing assembly, the threaded bore being adjacent to the trapping member, the second end of the locking rod extending though the threaded bore into a guide tube on the trapping member. Embodiments include a security apparatus where the first end of the locking rod extends below a bottom side of the mounting surface and includes a paddle. Embodiments include a security apparatus where each arm assembly includes an arm channel and a threaded rod associated with the arm channel, and where the housing assembly includes a guide rail, each arm assembly being slidably received into the housing assembly though a hole in the housing assembly and along the guide rail. Embodiments include a security apparatus where the trapping member may include a trapping rail including a first coupling nut and a second coupling nut, the first coupling nut attached to the trapping rail at a first end of the trapping rail and the second coupling nut attached to the trapping rail at a second end of the trapping rail, each coupling nut including a concave threaded region having a pitch matching a pitch of each threaded rod. Embodiments include a security apparatus where each end assembly includes a u-shaped channel member defining the channel and including the arcuate top portion, and a corner member having a u-shaped cross-section oriented 90 degrees relative to the u-shaped channel member and surrounding the channel member, the corner member forming a wall positioned to engage one of the first side or the second side of the lower body region. Embodiments include a security apparatus where the locking rod is positioned within the support housing.
Another aspect includes a security apparatus configured to secure a convertible laptop to a surface. The security apparatus includes a securing assembly may include first and second arm assemblies each having an end assembly configured to receive a first side and a second side of the lower body portion of the laptop, each end assembly including a channel having an arcuate top portion sized for placement within a gap between an upper body portion and the lower body portion of the laptop. The security apparatus includes a locking assembly engaging the securing assembly, the locking assembly may include: a trapping member positioned adjacent to at least a portion of the first and second arm assemblies; and a locking rod having a first end extending below the surface and a second end extending into engagement with the trapping member, the locking rod configured to move the trapping member into engagement with the first and second arm assemblies.
One general aspect includes a security apparatus configured to secure a laptop on a display surface for the laptop The security apparatus includes a housing and a first arm and a second arm extending from and retractable into the housing, the first arm including a first threaded rod, the second arm including a second threaded rod. The apparatus also includes a first end channel mounted to the first arm, and a second end channel mounted to the second arm, the first end channel configured to receive a first side a lower body portion of the laptop, the second end channel configured to receive a second side of the lower body portion of the laptop, each channel an arcuate upper portion sized for placement between and upper body portion of the laptop and the lower body portion of the laptop. The apparatus also includes a base supporting the housing, first and second arms, and first and second end channels on the mounting surface. The apparatus also includes a trapping member positioned in the housing, the trapping member may include a trapping rail including a first coupling nut and a second coupling nut, the first coupling nut attached to the trapping rail at a first end of the trapping rail and the second coupling nut attached to the trapping rail at a second end of the trapping rail, each coupling nut including a concave threaded region having a pitch matching a pitch of each threaded rod. The apparatus also includes a locking rod having a first end extending outside the housing and below the mounting surface and a second end extending into the housing and into engagement with the trapping member, the locking rod configured to move the trapping member into engagement with the first and second arms.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The benefits, features, and advantages of the various embodiments of the present technology will become better understood with regard to the following description and accompanying drawings. The following description is presented to enable one of ordinary skill in the art to make and use embodiments of the present technology as provided within the context of a particular application and its requirements. Various modifications to the embodiments described herein will, however, be apparent to one skilled in the art, and the general principles defined herein may be applied to other embodiments. Therefore, the embodiments of the present invention are not intended to be limited to the particular embodiments shown and described herein, but are to be accorded the widest scope consistent with the principles and novel features herein disclosed.
A security apparatus which may be used to secure and display a laptop computer or other secured body on a surface is described herein. The apparatus is useful in retail displays of laptops, allowing people to view and interact with a laptop while keeping the laptop secure against theft. The apparatus is configured to allow a convertible laptop, in which a top portion of the laptop can be rotated nearly 360 degrees between a closed position adjacent to a keyboard on a lower portion of the laptop, and a position where the top portion is adjacent to a back side of the lower potion so that the laptop resembled a tablet computer, to be so rotated while secured in the apparatus. This allows people viewing the laptop in the security apparatus to have a better viewing experience in a retail environment.
The security apparatus allows locking of the laptop within the apparatus using a locking rod which is controlled from a position below the mounting surface on which the security apparatus is provided. A person mounting the laptop in the security apparatus can secure and remove the lock on the laptop by simply rotating the locking rod which is out of sight from people viewing the laptop.
As illustrated in
Arm assemblies 120, 130 are configured to extend from and retract into housing assembly 110. The extension and retraction of the arm assemblies 120, 130 is illustrated in
One difficulty with prior art laptop display apparatuses is that they do not allow one to view a convertible laptop in this tablet position where the back side of the upper body portion is positioned adjacent to the bottom side of the lower body portion. The present security apparatus 100 solves this problem while providing a secure means for displaying a convertible laptop (or non-convertible laptop or other secured object).
In a unique aspect, the security apparatus 100 described herein allows the upper body portion 510 of a convertible laptop to rotate while secured in the apparatus between the end assemblies 125, 135 such that the upper body portion 510 can be positioned between the “closed” position and a fully rotated position where the back surface of the top portion abuts the bottom side of the lower body portion 520. As illustrated in
Aspects of the securing assembly will be described with reference to
As illustrated in
Housing assembly 110 also includes trapping member including a trapping rail 750 and coupling nuts 810a, 810b. The trap rail 750, as described below, is carried on a securing rod 325 which moves the trap rail 750 up and down in the housing so that two coupling nuts 810a and 810b can engage each of the threaded rods 715a and 715b. The trap rail 750, securing rod 325 and coupling nuts 810a and 810b may comprise a locking assembly. The coupling nuts 810a and 810b may be attached to the trap rail 750 by welding or other means. Each coupling nut 810a and 810b includes a threaded section (812a, 812b shown in
A cover plate 707 is securable to the main body housing 705 to protect the above components. Cover plate 707 may be secured by suitable fasteners (screws) connecting the cover plate to mounting tabs 835a - 835d.
Also illustrated in
To secure the security apparatus 100 to body 190, the components of the security apparatus 100 are first assembled into a completed form, with the exception of rings 322 and 324, and base rotating disc 320. When ready for final mounting to body 190, a hole having a size sufficient to allow the securing rod 315 to pass through body 190 is formed at the location where mounting of the apparatus 100 is to occur. Rings 324 and 322 are next slid onto the post 140, after which base rotating disc 320 is secured to the bottom disc 326 (thus preventing rings 322 and 324 from being removed from post 140). The base rotating disc 320 is attached to the bottom of the apparatus by securing the base rotating disc 320 to the bottom disc 326 using, for example, metal screws or other suitable fasteners. The apparatus 100 is then positioned so that the securing rod 325 passes through the hole formed in the body 190, ensuring that the rod protrudes through the body 190 to a side opposite the side where the apparatus 100 is mounted. Smaller diameter holes are formed in body 190 to accommodate the fasteners associated with bottom ring 322. Bottom ring 322 is then slid adjacent to the base rotating disc 320 and bottom ring 322 secured to body 190 by passing the fasteners associated with bottom ring 322 through the body (from top surface 192 though to bottom surface 194) and securing them on the bottom surface 194 of body 190. A paddle 310 may thereafter be attached to securing rod 325 to provide easier, hand rotation of the rod 325. The paddle 310 may alternatively be attached to the securing rod 325 before installation of the security apparatus. In one embodiment, the fasteners associated with bottom ring 322 may be bolts and pre-drilled holes formed to pass the bolts through the body. In another embodiment, the fasteners may comprise wood or metal self-drilling screws. The top ring 324 can then be slid into abutment with the bottom ring 322 to provide a clean finish to the surface of the security apparatus adjacent to the surface of the body 190.
Once mounted, the security apparatus can rotate about a center axis (formed on the center of the length of the securing rod 325) to allow rotation of the laptop display. In alterative embodiments, other mounting forms may be used. For example, one embodiment may eliminate the use of a top ring 324 and rotating base disc 320, which in turn could eliminate the need for a bottom disc 326.
Each of the components the security apparatus 100 including housing assembly 110, arm assemblies 120 and 130, assemblies 125 and 135, post 140, and mount assembly 180 may be manufactured from stainless steel by, for example, machining the steel to form the components. It should be understood that the technology may be manufactured using other materials which are sufficiently strong to secure the secured object in accordance with the present teachings.
The description of the present disclosure has been presented for purposes of illustration and description but is not intended to be exhaustive or limited to the disclosure in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the disclosure. The aspects of the disclosure herein were chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure with various modifications as are suited to the particular use contemplated.
The disclosure has been described in conjunction with various embodiments. However, other variations and modifications to the disclosed embodiments can be understood and effected from a study of the drawings, the disclosure, and the appended claims, and such variations and modifications are to be interpreted as being encompassed by the appended claims. In the claims, the word “comprising” does not exclude other elements or steps, and the indefinite article “a” or “an” does not exclude a plurality.
The terms “top” and “bottom,” “upper” and “lower” and “vertical” and “horizontal” as may be used herein are by way of example and illustrative purposes only, and are not meant to limit the description of the invention inasmuch as the referenced item can be exchanged in position and orientation. Also, as used herein, the terms “substantially” and/or “about” mean that the specified dimension or parameter may be varied within an acceptable manufacturing tolerance for a given application. In one embodiment, the acceptable manufacturing tolerance is ± 2.5%.
For purposes of this document, it should be noted that the dimensions of the various features depicted in the figures may not necessarily be drawn to scale.
For purposes of this document, reference in the specification to “an embodiment,” “one embodiment,” “some embodiments,” or “another embodiment” may be used to describe different embodiments or the same embodiment.
For purposes of this document, a connection may be a direct connection or an indirect connection (e.g., via one or more other parts). In some cases, when an element is referred to as being connected or coupled to another element, the element may be directly connected to the other element or indirectly connected to the other element via intervening elements. When an element is referred to as being directly connected to another element, then there are no intervening elements between the element and the other element.
For purposes of this document, without additional context, use of numerical terms such as a “first” object, a “second” object, and a “third” object may not imply an ordering of objects, but may instead be used for identification purposes to identify different objects.
The foregoing detailed description has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the subject matter claimed herein to the precise form(s) disclosed. Many modifications and variations are possible in light of the above teachings. The described embodiments were chosen in order to best explain the principles of the disclosed technology and its practical application to thereby enable others skilled in the art to best utilize the technology in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope be defined by the claims appended hereto.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
Number | Name | Date | Kind |
---|---|---|---|
5673628 | Boos | Oct 1997 | A |
6220556 | Sohrt et al. | Apr 2001 | B1 |
6386413 | Twyford | May 2002 | B1 |
6700488 | Leyden et al. | Mar 2004 | B1 |
7187283 | Leyden et al. | Mar 2007 | B2 |
8061164 | Johnston et al. | Nov 2011 | B2 |
8191851 | Crown | Jun 2012 | B2 |
8360373 | Johnson et al. | Jan 2013 | B2 |
8701452 | Foster et al. | Apr 2014 | B2 |
8814128 | Trinh et al. | Aug 2014 | B2 |
8833716 | Funk et al. | Sep 2014 | B2 |
8864089 | Hung | Oct 2014 | B2 |
8925886 | Sears | Jan 2015 | B2 |
8985544 | Gulick, Jr. | Mar 2015 | B1 |
8998048 | Wu | Apr 2015 | B1 |
9022337 | Petruskavich | May 2015 | B2 |
9039785 | Gulick, Jr. | May 2015 | B2 |
9097380 | Wheeler | Aug 2015 | B2 |
9117351 | Gulick, Jr. et al. | Aug 2015 | B2 |
9159309 | Liu et al. | Oct 2015 | B2 |
9161466 | Huang | Oct 2015 | B2 |
9285832 | Galant | Mar 2016 | B2 |
9567776 | Moock et al. | Feb 2017 | B2 |
9568141 | Zaloom | Feb 2017 | B1 |
9714528 | Van Balen | Jul 2017 | B2 |
9936823 | Galant | Apr 2018 | B2 |
9955598 | Wen et al. | Apr 2018 | B1 |
10165873 | Gulick, Jr. et al. | Jan 2019 | B2 |
10323440 | Kelsch et al. | Jun 2019 | B1 |
10378248 | Kelsch et al. | Aug 2019 | B1 |
10448759 | Chapuis et al. | Oct 2019 | B1 |
10646055 | Chapuis et al. | May 2020 | B2 |
11045019 | Chapuis et al. | Jun 2021 | B2 |
11363895 | Schuft et al. | Jun 2022 | B2 |
11412865 | Chapuis et al. | Aug 2022 | B2 |
11432663 | Chapuis et al. | Sep 2022 | B2 |
20070034753 | Lee | Feb 2007 | A1 |
20100079285 | Fawcett et al. | Apr 2010 | A1 |
20100108828 | Yu et al. | May 2010 | A1 |
20100148030 | Lin | Jun 2010 | A1 |
20120037783 | Alexander et al. | Feb 2012 | A1 |
20120234055 | Bland, III et al. | Sep 2012 | A1 |
20130301216 | Trinh et al. | Nov 2013 | A1 |
20130318639 | Gulick, Jr. | Nov 2013 | A1 |
20140060218 | Bisesti et al. | Mar 2014 | A1 |
20150089675 | Gulick, Jr. | Mar 2015 | A1 |
20150108948 | Gulick, Jr. et al. | Apr 2015 | A1 |
20150196140 | Lin | Jul 2015 | A1 |
20150300050 | Van Balen | Oct 2015 | A1 |
20170049251 | Gulick, Jr. et al. | Feb 2017 | A1 |
20170188724 | Lin | Jul 2017 | A1 |
20180058107 | Lucas et al. | Mar 2018 | A1 |
20180279805 | Galant | Oct 2018 | A1 |
20180279809 | Regan et al. | Oct 2018 | A1 |
20190316386 | Gulick, Jr. et al. | Oct 2019 | A1 |
20200008589 | Chapuis et al. | Jan 2020 | A1 |
20200107653 | Leyden et al. | Apr 2020 | A1 |
20200271266 | Gulick, Jr. et al. | Aug 2020 | A1 |
20210015274 | Chapuis et al. | Jan 2021 | A1 |
20210059437 | Chapuis et al. | Mar 2021 | A1 |
20210164603 | Chapuis et al. | Jun 2021 | A1 |
20210307543 | Chapuis et al. | Oct 2021 | A1 |
20210355714 | Chapuis et al. | Nov 2021 | A1 |
20220396976 | Chapuis et al. | Dec 2022 | A1 |
20220412129 | Chapuis et al. | Dec 2022 | A1 |
Number | Date | Country |
---|---|---|
2019213490 | Nov 2019 | WO |
Entry |
---|
DONGGUAN COMER ELECTRONIC TECHNOLOGY CO., LTD., “Comer Anti-Theft Locking Laptop Mechanical Security Display Frame For Mobile Phone Stores”, http://www.comerdisplay.com/sale-8024631-comer-anti-theft-locking-laptop-mechanical-security-display-frame-for-mobile-phone-stores.html, downloaded on Jun. 11, 2018. |
DONGGUAN COMER ELECTRONIC TECHNOLOGY CO., LTD., “COMER Universal Display Mechanical Anti-Theft Security Display Locking System For Tablet Brackets”, http://www.smartcomer.com/sale-8028445-comer-universal-display-mechanical-anti-theft-security-display-locking-system-for-tablet-brackets.html, downloaded on Jun. 11, 2018. |
GRIPZO, “iPad Enclosure”, https://www.gripzo.com/en/products/tablets/ipad-enclosure, downloaded on Jun. 11, 2018. |
GRIPZO, “iPhone”, https://www.gripzo.com/en/products/smartphones/iphone, downloaded on Jun. 11, 2018. |
GRIPZO, “Universal Smartphone Grip/ Universal Tablet Grip”, https://www.gripzo.com/en/products/smartphones/phone, downloaded on Jun. 14, 2018. |
RTF, “Smartphones - Samsung Note 3, LG Flex, HTC One, Apple iPhone 5, Blackberry Z10”, http://www.rtfglobal.com/solutions/by-devices-type/smartphones/#!prettyPhoto, downloaded on Jun. 11, 2018. |
RTF, “Vise- Securely And Attractively Placing Your Product First”, http://www.rtfglobal.com/products/vise-cell-phone-security/, downloaded on Jun. 11, 2018. |
SCORPION SECURITY PRODUCTS, “4-Point ERS Phone Scorpion”, https://www.scorpionsecurityproducts.com/product/4-point-ers-phone-scorpion/, downloaded on Jun. 11, 2018. |
SCORPION SECURITY PRODUCTS, “4-Point ERS Small Tablet Scorpion”, https://www.scorpionsecurityproducts.com/product/4-point-ers-small-tablet-scorpion/, downloaded on Jun. 11, 2018. |
Number | Date | Country | |
---|---|---|---|
20230028193 A1 | Jan 2023 | US |