The invention generally relates to a computer lock system, and more particularly to a lock system for locking a foldable (e.g., laptop, notebook, etc.) computer in an open configuration.
Laptop computers (also referred to as notebook computers, notebooks, and laptops) are rapidly becoming one of the most popular styles of computing device for both private and commercial users. As integrated circuit features continue to decrease in size and increase in speed, laptop computers routinely offer users computing power that was previously attainable only with desktop computing systems. Moreover, laptop computers provide users with increased mobility, especially when the laptop computer is coupled with a wireless network connection. These benefits have translated to a recent proliferation of laptop computers.
With this increase in laptop computer use, security for these computing devices is becoming more of a concern. Owners of laptop computers want to prevent their machine from being stolen. Moreover, and perhaps more critical, owners of the various information that may be stored on a laptop computer also want to prevent that information from falling into the wrong hands and being used for nefarious purposes, such as, for example, identity theft.
Conventional security devices and systems for laptop computers include cable locks, lockable docking stations, lid locks, and briefcase locks. Such security devices physically secure the laptop computer to a working surface or another object, and utilize keys or other numeric combination style mechanisms to permit authorized access to (i.e., unlock) the computer. These known security devices, however, can typically be broken or beaten (e.g., circumvented) by brute force techniques. That is, conventional cable-locks and pad-locks can be cut or broken. And once such security devices are compromised, the laptop or notebook computer may be easily stolen because it may be folded into a small, compact size that is easily concealed.
The above-described known security devices fail to address a primary reason why laptop computers are so easily stolen: the relatively small size of the laptop computer. In essence, as the size of mobile computing devices becomes smaller and smaller, their rate of theft tends to increase due to the ease of taking a unit and sliding it unobtrusively into a bag, under a jacket, etc. As a result, most methods to deter theft of these devices known in the art are marginally effective, at best.
Accordingly, there exists a need in the art to overcome the deficiencies and limitations described hereinabove.
In a first aspect of the invention, there is a device comprising a first bar pivotally attached to a first portion of a computer, and a second bar pivotally attached to the first bar and moveable along a track arranged on a second portion of the computer. At least one aperture is arranged in the second bar, and at least one cavity is arranged in the second portion of the computer. The device further comprises a lock that is insertable through the at least one aperture and the at least one cavity when the at least one aperture and the at least one cavity are aligned. The first portion of the computer is rotatable relative to the second portion of the computer when the lock is not inserted through the at least one aperture and the at least one cavity. The first portion of the computer is rotatably locked relative to the second portion of the computer when the lock is inserted through the at least one aperture and the at least one cavity.
In a second aspect of the invention, there is a device comprising a blocking device attached to a first portion of a computer, at least one cavity arranged on a second portion of the computer, and a lock that is insertable into and selectively engageable with the at least one cavity. The first portion of the computer is rotatable relative to the second portion of the computer when the lock is not inserted into the at least one cavity. The first portion of the computer is substantially not rotatable relative to the second portion of the computer beyond a point of the blocking device contacting the lock when the lock is inserted into the at least one cavity.
In a third aspect of the invention, there is a computing device comprising a first computer portion pivotally connected to a second computer portion by a hinge. The computing device further comprises an element moveable between a first position, in which the hinge is free to rotate, and a second position, in which the hinge is substantially prevented from rotating. A lock selectively controls movement of the element between the first and second positions.
The invention is directed to a lock system structured and arranged to lock a foldable (e.g., laptop, notebook, etc.) computer in a particular orientation. Implementations of the invention employ an insertable lock that prevents movement of the foldable portions of a computer. In this manner, the invention provides a theft deterrent by constraining the foldable computer to an open configuration that is difficult to conceal. The invention can also be used to prevent the inadvertent closing of a foldable computer, such as, for example, when a user is using such a computer in a cramped space.
In implementations, the lock system includes a pivot bar 35 having one end pivotally connected to a side of the screen portion 25 via pivot 40. In embodiments, the pivot 40 comprises a pin that extends through a hole in the pivot bar 35 and is connected to an outer side of the screen portion 25 such that a longitudinal axis of the pin acts as an axis of rotation of the pivot bar 35 about the screen portion 25. However, any suitable pivotable connection may be used for pivot 40.
Still referring to
Slide bar 45 is slidingly engaged with a track 55 arranged on a side of the base portion 20 such that the slide bar 45 translates along the track 55 when the screen portion 25 is rotated relative to the base portion 20 (i.e., when the laptop computer is opened or closed). The slide bar 45 further comprises a plurality of apertures 60 spaced along its length. The apertures 60 are shown as substantially circular in
The base portion 20 comprises at least one keyhole (e.g., cavity, etc.) 65 that is adjacent to and accessible via the track 55. In embodiments, plural keyholes 65 are provided, each keyhole 65 having substantially the same shape as the apertures 60. The apertures 60 move relative to the keyholes 65 as the screen portion 25 is rotated relative to the base portion 20 and the slide bar 45 moves within the track 55. When a particular aperture 60 is aligned with the keyhole 65 (as shown at “A”) a lock 70 (described in detail below) may be inserted (as indicated by dashed line “B”) through the particular aperture 60 and the keyhole 65 and engaged with the base portion 20. As is readily apparent from
As described above, any suitable number of apertures 60 may be provided in the slide bar 45, and any suitable spacing may be used between the apertures 60. Moreover, more than one keyhole 65 may be provided. For example, plural substantially identical keyholes 65 may be provided along the length of the track 55 in order to provide numerous possible lockable positions of the screen portion 25 relative to the base portion 20.
Lock 70 may comprise any suitable lock that is capable of extending through the aperture 60 and keyhole 65 and engaging the base portion 20. In embodiments, the lock 70 comprises a conventional cable-type lock that includes a body 75, a shaft 80 extending from the body 75, and an engagement portion 85 on an end of the shaft 80. Also connected to the body 75 is an actuating mechanism 90 that selectively moves the engagement portion 85 between a first contracted position, in which the engagement portion 85 is smaller than the apertures 60 and keyhole 65, and a second expanded position, in which the engagement portion 85 is larger than the apertures 60 and keyhole 65. The actuating mechanism 90 may comprise, for example, a key or a rotary-dial-combination device (e.g., numbered spinwheel), as is known and no further description is believed necessary. The lock 70 may optionally comprise a cable 95 attached to the body 75, and may further optionally comprise a loop 96 at the end of the cable 95. Such locks, having a body 75, shaft 80, engagement portion 85, actuating mechanism 90, and cable 95, are known, and further description is not believed necessary.
In operation, the screen portion 25 is rotated (i.e., folded) to a desired position relative to the base portion 20 such that one of the apertures 60 is aligned with a key hole 65. The actuating mechanism 90 is used to place the engagement portion 85 in the first contracted position (in which the engagement portion 85 is smaller than an aperture 60). The engagement portion 85 is inserted through the aligned aperture 60 and key hole 65, and the actuating mechanism 90 is used to place the engagement portion 85 in the second expanded position (in which the engagement portion 85 is larger than the aperture 60). In this manner, the computer 15 is locked into a configuration such that the screen portion 25 may not be rotated (e.g., is rotatably locked) relative to the base portion. To subsequently move the screen portion 25, a user must apply the appropriate key or combination to the actuating mechanism 90 to contract the engagement portion 85 to its contracted position and remove the engagement portion 85 from the keyhole 65 and aperture 60.
It should be noted that the pivot bar 35, slide bar 45, track 55, and keyhole(s) 65 are not limited to the locations shown in
Moreover, the slide bar 45 and track 55 may be structured and arranged in any suitable fashion that allows the apertures 60 to pass over and align with the keyhole(s) 65. For example, as shown in
Still referring to
The keyhole 200 may comprise any size and shape hole that receives a conventional computer lock. The abutment comprises a structural element that comes into contact with a key that is engaged in the key hole 200. In embodiments, the abutment 205 comprises an integral portion of the screen portion 25. For example, the abutment 205 may be integrally formed with the screen portion 25 during a molding process. However, the abutment can also be connected to the screen portion 25 by fasteners, such as, for example, screws, adhesive, etc. In this manner, the abutment 205 may be added as a kit that is retrofitted to an existing laptop computer. Moreover, the keyhole 200 and abutment 205 may alternatively be arranged on any appropriate surfaces of the computer 15.
In embodiments, indicia are provided for indicating when the element is in either the unlocked position 310 or the locked position 315. For example, first indicia (e.g., a picture of an unlocked padlock) 335 may be provided on the surface of the screen portion 25 at the unlocked position of the slide tab 300. Similarly, second indicia (e.g., a picture of a locked padlock) 340 may be provided on the surface of the screen portion 25 at the locked position of the slide tab 300. It is understood that other indicia may be used within the scope of the invention.
Still referring to the
In operation, a user may open the screen portion 25 to a desired angle relative to the base portion 20, enter the correct combination on the rotary-dial-combination lock 305, move the slide tab 300 to the locked position 315, and scramble the spinwheels (e.g., enter an incorrect combination) of the rotary-dial-combination lock 305. In this manner, the screen portion 25 is locked relative to the base portion 20 such that the angle between the screen portion 25 and base portion 20 substantially cannot be changed. Only a user with knowledge of the correct combination of the rotary-dial-combination lock 305 could unlock the device to allow the screen portion 25 to move relative to the base portion 20.
While the invention has been described in terms of embodiments, those skilled in the art will recognize that the invention can be practiced with modifications and in the spirit and scope of the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
3620558 | MacMillian | Nov 1971 | A |
5088156 | Hosoi | Feb 1992 | A |
5351508 | Kelley | Oct 1994 | A |
5447045 | Cheng | Sep 1995 | A |
5595074 | Munro | Jan 1997 | A |
5608605 | Siow et al. | Mar 1997 | A |
5687592 | Penniman et al. | Nov 1997 | A |
5757616 | May et al. | May 1998 | A |
5787738 | Brandt et al. | Aug 1998 | A |
5836183 | Derman | Nov 1998 | A |
5870281 | Kim | Feb 1999 | A |
5960651 | Tanisawa | Oct 1999 | A |
5988823 | Wong | Nov 1999 | A |
6034867 | Seo | Mar 2000 | A |
6088229 | Seto et al. | Jul 2000 | A |
6094341 | Lin | Jul 2000 | A |
6216499 | Ronberg et al. | Apr 2001 | B1 |
6427499 | Derman | Aug 2002 | B1 |
6477871 | Shaw et al. | Nov 2002 | B1 |
6481681 | Stunkel et al. | Nov 2002 | B1 |
6532147 | Christ, Jr. | Mar 2003 | B1 |
6563699 | Choi | May 2003 | B1 |
6735698 | Callam | May 2004 | B1 |
6779310 | Grover | Aug 2004 | B2 |
6958904 | Chuang et al. | Oct 2005 | B2 |
7028513 | Avganim | Apr 2006 | B2 |
7299668 | Lu | Nov 2007 | B1 |
20040108968 | Finke-Anlauff | Jun 2004 | A1 |
20050028571 | Merrem et al. | Feb 2005 | A1 |
20050039502 | Avganim | Feb 2005 | A1 |
20050097930 | Moore et al. | May 2005 | A1 |
20050149752 | Johnson et al. | Jul 2005 | A1 |
20050155017 | Berstis et al. | Jul 2005 | A1 |
20080013269 | Wong et al. | Jan 2008 | A1 |
20080158806 | Kuo | Jul 2008 | A1 |
20080186665 | Kuo | Aug 2008 | A1 |
20090049876 | White et al. | Feb 2009 | A1 |
Number | Date | Country | |
---|---|---|---|
20090044578 A1 | Feb 2009 | US |