In computer hardware, a port serves as an interface between the computer and other computers or peripheral devices. Examples of peripheral devices include, but are not limited to, a mouse, keyboard, monitor, webcam, and speakers. A port generally refers to the female part of a connection, to which a plug or cable of a peripheral device connects. Electronically, several conductors where the port and cable contacts connect, provide a method to transfer signals between the devices. Various types of ports are available, to accommodate different capabilities and technologies. As an example, USB ports are used by many peripheral devices.
Consumers appreciate ease of use and reliability in their devices. They also appreciate aesthetically pleasing designs. Businesses may, therefore, endeavor to create and provide devices directed toward one or more of these objectives.
Examples disclosed herein provide a computing device with the ability to securely manage cables, for example, of peripheral devices connected to the computing device, in an aesthetic manner. As cable connections, such as USB connections, can generally be easily disconnected, and are not physically secure by themselves to a computing device, various issues may arise. For one, theft of peripheral devices can take place, such as in a conference room, as such peripheral devices may be easily disconnected. Similarly, as the cable connection for a peripheral device may be easily disconnected, for example, without a user's knowledge, the peripheral device may be left in a non-functional state.
By securing cables of the peripheral devices connected to the computing device, as will be further described, the issues described above may be avoided. In addition, the use of various locking mechanisms or screws may be avoided for securing cable connections to the computing device. Furthermore, the cable connections may be secured to the computing device in such a way to make the cable connections appear much cleaner and more integrated to the computing device, contributing to an aesthetically pleasing design. Such a design may be desirable, for example, in executive conference rooms or customer facing presentation areas.
With reference to the figures,
As will be further described, by moving ports, for example, from outside the computing device 100 to inside the computing device 100, along with providing the ability to route cable connections to the ports inside the computing device 100, and having the cable connections secured by the lid 104, such cable connections appear much cleaner and more integrated to the computing device 100, contributing to an aesthetically pleasing design. By appearing integrated to the computing device 100, any peripheral devices connected, for example, by the cables 110A-C, as a result, appear to be integrated as part of the core product, the computing device 100. By allowing a user to choose which devices (e.g., peripheral devices) to connect to the internal ports 106, many configurations utilizing the cable management of the computing device 100 are possible, all giving the appearance that each configuration permutation is itself a unique and integrated product. As an example, the tray and lid may be external to the computing device 100, such as a docking station for the computing device 100. As a result, cable connections may be routed and secured internally into the docking station, where a computing device, such as a notebook computer, may be docked.
Referring to
As an example, the second end of the cables 110A-C emerges external to the computing device 100 at a 180 degrees from the first end of the cables 110A-C connected to the ports 106, as illustrated. Consequently, pulling on one of the cables 110A-C may no longer disconnect it from the connected port 106. Rather, the manner in which the second end of the cables 110A-C emerge external to the computing device 100 may allow for the connection to the ports 106 to remain completely intact and essentially unpluggable. As an example, in an effort for the second end of cable 110C to emerge external to the computing device 100 at a 180 degrees from the first end of the cable 110C connected to an internal port 106, the tray 102 includes a post 107 disposed within the tray 102, wherein the cable 110C is to be routed around the post 107 prior to being routed through the groove 112. By utilizing the post 107, cable crimping or sheering may be prevented. Similar to the varying number of grooves 112 on each side of the computing device 100, the number of posts 107, if available on a particular side of the computing device 100, may vary as well.
As an example, the grooves 112 may include a pliable material 114 to accommodate cables having varying degrees of thicknesses. As a result, the pliable material 114 may seal up the hole created by a groove 112, to only accommodate the space occupied by cables routed through the groove 112. Examples of the pliable material 114 include, but are not limited to, a pliable rubber or plastic.
Referring to
In order to secure the cable connections made to the ports 106, the lid 104 may be lockable to the tray 102, for example, by a locking mechanism 116. By having a lid 104 that can be secured to the tray 102, all of the cables 110A-C may be made safe from theft, as a person may not be able to pull the cables 110A-C out from the computing device 100 without first unlocking the lid 104.
In addition to the grooves 112 in the tray 102, and corresponding pliable material 114 disposed in the grooves 112, the lid 202 may include grooves 212 to align with the grooves 112 in the tray to accommodate cables emerging external to the computing device 200 (e.g., cables 110A-C from
It is appreciated that examples described may include various components and features. It is also appreciated that numerous specific details are set forth to provide a thorough understanding of the examples. However, it is appreciated that the examples may be practiced without limitations to these specific details. In other instances, well known methods and structures may not be described in detail to avoid unnecessarily obscuring the description of the examples. Also, the examples may be used in combination with each other.
Reference in the specification to “an example” or similar language means that a particular feature, structure, or characteristic described in connection with the example is included in at least one example, but not necessarily in other examples. The various instances of the phrase “in one example” or similar phrases in various places in the specification are not necessarily all referring to the same example.
It is appreciated that the previous description of the disclosed examples is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these examples will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other examples without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the examples shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2016/038325 | 6/20/2016 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2017/222498 | 12/28/2017 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5596479 | Campbell | Jan 1997 | A |
5769646 | Cavello | Jun 1998 | A |
5924892 | Ferracina | Jul 1999 | A |
6017228 | Verbeek | Jan 2000 | A |
6064566 | Agata et al. | May 2000 | A |
6406327 | Soon | Jun 2002 | B1 |
6912132 | Riddiford et al. | Jun 2005 | B2 |
6980422 | Bhogal | Dec 2005 | B2 |
7025627 | Rosenthal | Apr 2006 | B2 |
7484991 | Kelaher | Feb 2009 | B1 |
7781676 | Martin | Aug 2010 | B2 |
8002587 | Fleisig | Aug 2011 | B2 |
8016611 | Fleisig | Sep 2011 | B2 |
8568151 | Cheng | Oct 2013 | B2 |
20070088875 | Martin | Apr 2007 | A1 |
20080236858 | Quijano | Oct 2008 | A1 |
20090310291 | Willburn | Dec 2009 | A1 |
20110058325 | Waryck et al. | Mar 2011 | A1 |
20150220106 | Lai et al. | Aug 2015 | A1 |
20180032112 | Nguyen | Feb 2018 | A1 |
Number | Date | Country |
---|---|---|
2772187 | Apr 2006 | CN |
201936400 | Aug 2011 | CN |
203871595 | Oct 2014 | CN |
204179620 | Feb 2015 | CN |
104717899 | Jun 2015 | CN |
105637720 | Jun 2016 | CN |
20-04351252 | Jan 2007 | KR |
200435152 | Jan 2007 | KR |
10-2010-0037758 | Apr 2010 | KR |
20100037758 | Apr 2010 | KR |
WO-2010-080954 | Jul 2010 | WO |
WO-2010080954 | Jul 2010 | WO |
Entry |
---|
Approaches to USB Security, 2016, http://www.computersecurity.com/white_papers/usb-security.htm. |
Number | Date | Country | |
---|---|---|---|
20200301472 A1 | Sep 2020 | US |