BACKGROUND
The present disclosure relates generally to information handling systems, and more particularly to a security device for such systems and peripherals attached thereto.
As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option is an information handling system (IHS). An IHS generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes. Because technology and information handling needs and requirements may vary between different applications, IHSs may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in IHSs allow for IHSs to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, IHSs may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
The protection of peripheral devices, such as mouses and keyboards, is very important. Theft of such items wastes valuable down time and is also costly. Educational labs and kiosks as well as work stations in offices require a security solution which is low-cost, easy to deploy and not overly complex or costly.
Current solutions typically rely on adhesive anchors and steel cables. Specific to peripherals, the prior solutions focus on securing the actual device.
Accordingly, it would be desirable to provide an improved low-cost, easy to deploy security solution for theft prone environments which secures the peripheral cable rather than the peripheral device, absent the disadvantages discussed above.
SUMMARY
According to one embodiment, a security apparatus includes a cable securing member defining a slot between an open first end and a closed second end. A channel is provided in the slot and a rib adjacent the channel and protruding into the slot. The open first end includes a tab receiver and a lock receiver.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates an embodiment of an information handling system.
FIGS. 2, 2a and 2b are each a perspective view illustrating an embodiment of an IHS chassis used with the security device described herein.
FIGS. 3, 4 and 5 are various views illustrating an embodiment of the security device described herein.
FIG. 6 is a side view illustrating an embodiment of the security device attached to an IHS chassis and secured by a locking device.
FIG. 7 is a perspective view illustrating an embodiment of the security device, chassis, locking device, and a securing cable.
DETAILED DESCRIPTION
For purposes of this disclosure, an IHS may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, entertainment, or other purposes. For example, an IHS may be a personal computer, a PDA, a consumer electronic device, a network server or storage device, a switch router or other network communication device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The IHS may include memory, one or more processing resources such as a central processing unit (CPU) or hardware or software control logic. Additional components of the IHS may include one or more storage devices, one or more communications ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display. The IHS may also include one or more buses operable to transmit communications between the various hardware components.
FIG. 1 is a block diagram of an IHS 100. The IHS 100 includes a processor 102 such as an Intel Pentium™ series processor or any other processor available. A memory I/O hub chipset 104 (comprising one or more integrated circuits) connects to processor 102 over a front-side bus 106. Memory I/O hub 104 provides the processor 102 with access to a variety of resources. Main memory 108 connects to memory I/O hub 104 over a memory or data bus. A graphics processor 110 also connects to memory I/O hub 104, allowing the graphics processor to communicate, e.g., with processor 102 and main memory 108. Graphics processor 110, in turn, provides display signals to a display device 112.
Other resources can also be coupled to the system through the memory I/O hub 104 using a data bus, including an optical drive 114 or other removable-media drive, one or more hard disk drives 116, one or more network interfaces 118, one or more Universal Serial Bus (USB) ports 120, and a super I/O controller 122 to provide access to user input devices 124, etc. The IHS 100 may also include a solid state drive (SSDs) 126 in place of, or in addition to main memory 108, the optical drive 114, and/or a hard disk drive 116. It is understood that any or all of the drive devices 114, 116 and 126 may be located locally with the IHS 100, located remotely from the IHS 100, and/or they may be virtual with respect to the IHS 100.
Not all IHSs 100 include each of the components shown in FIG. 1, and other components not shown may exist. Furthermore, some components shown as separate may exist in an integrated package or be integrated in a common integrated circuit with other components, for example, the processor 102 and the memory I/O hub 104 can be combined together. As can be appreciated, many systems are expandable, and include or can include a variety of components, including redundant or parallel resources.
Portions of the system 100 are provided in an IHS chassis 130, FIGS. 1 and 2. Other parts of the system 100 such as display 112 and input devices 124, such as a mouse and a keyboard for example are peripherally attached to the system 100. In FIG. 2, chassis 130 includes a tab 132 fixedly attached to, and extending from chassis 130. Tab 132 includes a slot or opening 134 formed therein. In FIG. 2, a cable securing member 136 is also shown along with a mouse 138 including a cable 140 and a cable connector 142.
A cable securing member 136, FIGS. 3, 4 and 5, is preferably a cast part formed of a suitable rigid material. The cable securing member 136 is generally a “U” shape and includes a first member 146, a second member 148 opposite the first member 146, a closed end 150, and an open end 152, thus defining a slot 154 between the open end 152 and the closed end 150. The open end 152 defines a cable access slot 144, a tab receiver 156 and a lock receiver 158 including an opening 160 formed in an arcuate recess 162. An arcuate cutout 164 is also formed in the cable securing member 136. More precisely, the tab receiver 156, lock receiver 158, opening 160 and arcuate recess 162 are provided in the first member 146, whereas the cutout 164 is provided in the second member 148. The second member 148 also includes a plurality of channels 166 and each channel has an adjacent rib 168. In FIG. 4, a channel, or a plurality of channels 170 are provided in second member 148, and a rib, or a plurality of ribs, 172 are provided adjacent each channel 170. The cable access slot 144 is of a size sufficient to permit a cable, or a plurality of cables, 140 to pass into slot 154 and seat in a channel 170.
In FIG. 2a and 6, the cable securing member 136 is engaged with tab 132 and one or more cables 140, described above, extend through cable securing member 136. As an example, cable 140 is connected to mouse 138 at one end, and includes connector 142 at an opposite end. In FIGS. 6 and 2b, a well-known Kensington type lock device 174 is secured to cable securing device 136 as will be further described below.
When cable securing device 136 is fully engaged with tab 132, FIGS. 2, 2a and 6, opening 134 of tab 132 is aligned with opening 160 of cable securing device 136. Cable 140 may be passed through slot 144 prior to or after such engagement but before locking device 174 is attached. The locking device 174 is seated in recess 162. A rotatable lock member 176 is aligned with and passes through the aligned slots or openings 134 and 160 and is positioned in arcuate cutout 164 to permit rotation of lock member 176.
A key member 178, FIGS. 6 and 7, is inserted into a key slot 180 in lock 174 and the key 178 is rotated 90° which causes rotatable lock member 176 to also rotate 90° relative to the aligned slots 134, 160. This rotation restricts the lock member from being withdrawn through the aligned slots 134, 160 due to such rotation. Key member 178 is withdrawn from slot 180 and kept secure until unlocking of lock 174 is required. As a result, the cable access slot 144 is blocked by rotatable lock member 176 to restrict cable 140 from being removed from cable securing member 136.
Each cable 140, FIGS. 2, 4 and 6, has a cross-sectional size or a diameter C1, depending on the geometric cross-section. Likewise, the permanently attached connector 142, or overmold, has a greater than C1 cross-sectional size or a diameter C2, also depending on the geometric cross-section. Slot 154, is of a size sufficient for cable 140 to pass through as is cable access slot 144. However, due to the greater size of connector 142, cable 144 may not be longitudinally withdrawn from cable securing member 136, e.g. via channel 170 or slot 154. Thus, only movement of cable 140 through cable access slot 144 will permit cable 140 to be inserted into or withdrawn from cable securing member 136.
A steel cable member 190, FIG. 7, commonly used in combination with a Kensington-type lock 174, extends from lock 174 and is secured around or to a fixed or secure device (not shown). As a result of the above, the cable securing device 136 secures peripheral cable 140 to chassis 130.
Although illustrative embodiments have been shown and described, a wide range of modification, change and substitution is contemplated in the foregoing disclosure and in some instances, some features of the embodiments may be employed without a corresponding use of other features. Accordingly, it is appropriate that the appended claims be construed broadly and in a manner consistent with the scope of the embodiments disclosed herein.