The present invention relates to anti-theft devices, particularly for desk and portable computers.
There has been developed a wide range of security devices to fight against computer thefts. For desk computers, it has been proposed to provide ways of securing the bottom of the computer housing to the working surface—see for example Applicant's U.S. Pat. No. 5,601,273 according to which the housing was arrested against the working surface by screws or strong glue intermediate a set of metal interlinking rails.
Portable computers are mostly protected by a steel cable connected to the computer housing, using an integrated dedicated slot or port therein formed by the manufacturer (see e.g. Applicant's U.S. Pat. No. 6,244,082).
All the prior art cable security devices have in common the use of a key operated lock casing provided with a projecting T-shaped tip or bit. The tip is insertable into the slot and turned by 90° (with the lock casing), so that the two arms of the “T” become placed behind the slot and prevent its retrieval. The lock is provided with a mechanism operative to insert into the slot, alongside the stem portion of the tip, an auxiliary pin which functions to block the rotation of the tip (and lock casing) into the initial insertion and retrieval position. The mechanism is operated by a key to lock or release the pin in and from its extended position, so that the lock casing can no longer be manipulated to rotate the tip.
One end of a steel cable is attached to the lock casing and the other to a stationary object such as around a table leg.
The various security devices offered to the public differ only in the auxiliary pin projecting and withdrawal methods, namely in the locking mechanism, which is the more costly part of the security devices of this type.
It is the prime object of the present invention to dispense altogether with the necessity to employ a pin feeding and/or locking/releasing mechanism of the conventional computer anti-theft devices.
It is a further object of the invention to employ more than one dedicated slots for the purpose in question.
According to the invention there is provided an anti-theft device for computers and the like having a housing with side-walls comprising a block-shaped casing having a front surface; a lock member selectively projectable or withdrawable from the front surface; a key-operated lockable device effective to lock the lock member in the projected position thereof; at least a first hook-shaped projection at the said surface located at one side of the projectable lock member; and a cable fixable to the casing at one end, and to an immovable object at the other end thereof,
wherein the said first hook-shaped projection is adapted to be inserted into a first opening formed in a side-wall of the housing and then displaced so that the locking device becomes hooked to said housing, in which position the said projectable lock member is insertable into an opening formed in the side-wall to prevent the separation of the first projection from the said side-wall.
In a preferred embodiment of the invention there are provided a pair of hook-shaped projections adapted to be inserted into a corresponding pair of openings.
These and additional constructional features and advantages of the invention will be more fully understood in the light of the ensuing description of several preferred embodiments thereof, given by way of example only, with reference to the accompanying drawings wherein:—
a to 5d show the succession of operations performed to secure the lock-casing to the computer casing;
a and 6b illustrate a modified form of the hooks receiving slots;
a and 7b show a variation of the slots configuration;
a and 8b show the use of a single hook projection;
a and 9b relate to the application of the invention to a portable computer; and
As seen in
All walls are shown being formed with two distanced rectangular slots or ports A and B, and a circular hole C. In practice, though, one set of those three openings will suffice as will be understood in view of the description to follow. Anyway, the discussion below will be related to the set of openings made in the back wall 10c but it applies equally to sets placed anywhere else.
As more clearly seen in
The lock device further comprises at-least one (see
The sizes of and the distance between the slots A and B are made such that both hooks 24 and 26 can be freely inserted therethrough; the size and the location of the hole C are designed so that the lock pin 28a can pass therethrough after the insertion of the hooks 24,26 through the slots A and B and movement of the lock casing upwards (in this example) as will be explained below.
While the security cable assembly 14 can be made integral with the casing of the lock casing 12, it is preferably separable. The cable 16 carries a cable-head 30 extended by a neck portion 32 of a reduced diameter (slightly less than the opening of the recess 22), and terminates by a rounded portion 34 of an increase diameter slightly less than the circular portion 22a. In this manner it is more convenient to threaded the cable head through the loop 18 before securing the lock casing to the computer wall.
The operation of the locking device is as depicted in
Pushing the lock pin 28a home prefects the arresting of the lock casing against the computer wall as shown in
For unlocking, the key 30 is used in the conventional manner, the lock pin 28 resumes the retracted position thereof allowing the lock casing to be lowered so that the hooks 24 and 26 can be retrieved.
It will be readily understood that the lock 12 can be equally secured to other of the walls of the desk computer (10a or 10b) as convenient to the user.
a and 6b exemplify a modified configuration of the slots A′, B′ and C′. The locking and unlocking procedure remain substantially the same. Hence, the slots A′ and B′ are L-shaped so that after passing the hooks 124 and 126 through the vertical portion of the slots, the lock casing 112 is moved to the right where the lock pin 128a is insertable into the hole C′ as seen in
The configuration depicted in
The embodiment of
Various other configurations can be contemplated, including the application of arcuate slots based on that the hole C is not at the center but closer to one of the slots A or B so that rotation of the lock casing back after the locking operation is blocked.
An important application of the present invention is the protection of portable computers.
Referring to
The locking arrangement herein proposed is useful for protecting other articles, for example monitors 510 as shown in
Those skilled in the art to which this invention pertains will readily appreciate that numerous changes, variations and modifications can be effectuated without departing from the true spirit and scope of the invention as defined in and by the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
6622532 | Hsu | Sep 2003 | B2 |
D490434 | Meyer et al. | May 2004 | S |
6971255 | Bhogal et al. | Dec 2005 | B2 |
7028513 | Avganim | Apr 2006 | B2 |
20070119219 | DeMartinis et al. | May 2007 | A1 |
Number | Date | Country | |
---|---|---|---|
20070193314 A1 | Aug 2007 | US |