Information
-
Patent Grant
-
6763690
-
Patent Number
6,763,690
-
Date Filed
Monday, March 4, 200223 years ago
-
Date Issued
Tuesday, July 20, 200421 years ago
-
Inventors
-
Original Assignees
-
Examiners
Agents
-
CPC
-
US Classifications
Field of Search
US
- 070 14
- 070 18
- 070 19
- 070 57
- 070 58
- 070 211
-
International Classifications
-
Abstract
A security device for securing an equipment component, such as a laptop computer, having opposite corner portions. The security device includes a first securing member including a first restraining member for engaging a first corner of the component, and an elongate arm extending from the first restraining member, and a second securing member including a second restraining member for engaging a second corner of the component that is diagonal to the first corner, and a releasable locking device for engaging the arm to prevent movement of the first and second restraining members away from each other when in an engagement position. The first and second restraining members each include a first pair of spaced apart opposed engagement members for restraining movement of the component in a first plane, and a second pair of spaced apart opposed engagement members for restraining movement of the component in a second plane that is perpendicular to the first plane.
Description
BACKGROUND OF THE INVENTION
The present invention relates to a security device for securing equipment such as a lap top computer to a structure.
A variety of techniques and apparatus have been developed over the years to prevent the unauthorized removal of computers and other office equipment. A number of anti-theft devices have been developed specifically for tower style and desk top computers, as depicted for example in U.S. Pat. No. 6,138,483 issued Oct. 31, 2000 to Galant. Such devices are not designed to be used with clam shell style lap top computers which are most often the targets of computer theft.
Anti-theft devices have also been developed for securing lap top computers, as depicted for example in U.S. Pat. No. 5,595,074 issued Jan. 21, 1997 to Munroe. Such rigid devices have generally lacked flexibility and adjusting for lap top computers of different sizes, and lacked the ability to secure lap tops both in the opened and closed positions. One example of a useful lap top security device can be seen in U.S. Pat. No. 6,308,928 issued Oct. 30, 2001 to Galant. Although the device disclosed in such patent offers a high degree of security and can also be used to secure lap tops in opened and closed positions, it can be cumbersome to use in some applications.
Accordingly, it is desirable to provide an equipment security device which can easily be adjusted for use with lap top computers or equipment components of different sizes. It is also desirable to provide a security device that can be conveniently used to secure a lap top computer in both the opened and closed positions.
SUMMARY OF THE INVENTION
According to one aspect of the invention, there is provided a security device for securing an equipment component having opposite corner portions, the security device including a first securing member having a first restraining member for engaging a first corner of the component, and an elongate arm extending from the first restraining member, and a second securing member having a second restraining member for engaging a second corner of the component that is diagonal to the first corner. A releasable locking device on the second restraining member is provided for engaging the arm to prevent movement of the first and second restraining members away from each other when in an engagement position. The first and second restraining members each include a first pair of spaced apart opposed engagement members for restraining movement of the component in a first plane, and a second pair of spaced apart opposed engagement members for restraining movement of the component in a second plane that is perpendicular to the first plane.
According to another aspect of the invention, there is provided a security device for securing a substantially rectangular box-shaped component that is defined by spaced-apart cover and base walls with four side-walls extending at least partially between four respective edges of the cover and base walls, pairs of the sidewalls meeting at four corners of the component. The security device includes a first securing member having a first restraining member for engaging a first corner of the component, and an elongate arm extending from the first restraining member, and a second securing member having a second restraining member for engaging a second corner of the component that is diagonal to the first corner. A releasable locking device is provided on the second securing member for engaging the arm to prevent movement of the first and second restraining members away from each other when in an engagement position. The first and second restraining members each include spaced apart cover wall and base wall engagement members, and a pair of spaced apart side-wall engagement members for engaging the cover wall, base wall, and a pair of side-walls, respectively, at the first and second corners, respectively, to restrain movement of the component relative to the security device when in the locked position.
According to another aspect of the invention, there is provided a security device for securing a lap top computer, the lap top computer having a cover and a base pivotally connected together for movement between an open position in which the cover extends at an angle from the base, and a closed position in which the cover and base collectively define a rectangular box-like structure, the device including a first securing member having a first restraining member and an elongate locking arm extending therefrom and a second securing member having a second restraining member connected to a locking device for slidably receiving the arm and engaging the arm at a selected one of at least two possible engagement positions to prevent movement of the first and second securing members away from each other. The first and second restraining members each include restraining means that are opposed when the locking arm is received in the locking device, the restraining means having means for engaging the cover and base of an open lap-top computer to restrain movement of the laptop when the arm is received within the locking device at one of the at least two possible engagement positions, and means for engaging diagonally located corners of a closed lap top computer to restrain movement thereof when the arm is received in the locking device at another one of the at least two possible engagement positions.
According to a further aspect of the invention, there is provided a security device for securing a lap top computer to a support surface of a support member, the lap top computer having a cover and a base pivotally connected together for movement between an open position in which the cover extends at an angle from the base, and a closed position in which the cover and base collectively define a rectangular box-like structure. The device includes first and second securing members each having a restraining member defining an opening for receiving a portion of the lap top cover, the first securing member including an elongate arm extending therefrom, and the second securing member including a locking device for telescopically receiving the elongate arm of the first securing member and for engaging the arm to prevent movement of the first and second securing members away from each other when in an engagement position. At least one of said first and second securing members is adapted to be anchored to the support member. The openings defined by the restraining members of the first and second securing members oppose each other when the arm is telescopically received in the locking device so that when the lap top computer is positioned on the support member in an open position, the cover can be received between and restrained by the restraining members to secure the lap top to the support member when the lock device is in the engagement position and one of the first and second securing members is anchored to the support member.
Other aspects of the present invention will become apparent to those ordinarily skilled in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying figures.
BRIEF DESCRIPTION OF THE DRAWINGS
For a better understanding of the invention, and to show how it may be carried into effect, reference will now be made, by way of example, to the accompanying drawings, like numerals being used to refer to like components throughout, in which:
FIG. 1
is a perspective view of a security device in accordance with a first preferred embodiment of the invention;
FIG. 2
a partial sectional view of a lock assembly of the security device, taken across the lines II—II of
FIG. 1
;
FIG. 3
is a perspective view of the security device of
FIG. 1
shown in use securing a lap top computer in the opened position to a support member;
FIG. 4
is a perspective view of the security device of
FIG. 1
shown in use securing a closed lap top computer to a support member;
FIG. 5
is a perspective view of a security device in accordance with a further preferred embodiment of the invention;
FIG. 6
is a perspective view of the security device of
FIG. 5
shown in use securing a lap top computer in the closed position to a support member;
FIG. 7
is a perspective view of the security device of
FIG. 5
shown in use securing an open lap top computer to a support member;
FIG. 8
is a perspective view of another security device in accordance with a further preferred embodiment of the invention;
FIG. 9
is a perspective view of another security device in accordance with a further preferred embodiment of the invention;
FIG. 10
is a perspective view of a security device in accordance with a further preferred embodiment of the invention;
FIG. 11
is a further perspective view of the security device of
FIG. 10
in use securing a closed lap top computer and docking station; and
FIG. 12
is a perspective view of a security device in accordance with a further preferred embodiment of the invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
With reference to
FIG. 1
, a security device in accordance with preferred embodiments of the invention is indicated by general reference number
10
. The security device
10
includes first and second securing members
12
and
14
which can be telescopically connected together to secure a piece of equipment such as a lap top computer therebetween, as will be explained in greater detail below. The first securing member
12
includes a first hook-like restraining member
16
, and the second securing member
14
includes a second hook-like restraining member
18
for restraining movement of a secured lap top computer. An elongate cylindrical rod or arm
20
extends from the first securing member
12
in the same direction that the first hook member
16
opens towards. The second securing member
14
includes a lock device
22
which is configured to telescopically receive the locking arm
20
of the first securing member
12
. In the illustrated embodiment, the lock device
22
includes a tubular sleeve
24
which has a lock assembly
26
mounted thereon for engaging ratchet teeth
28
that are provided along the length of an extending portion of the arm
20
.
In the illustrated embodiment, the first hook member
16
includes a base plate
30
to which the locking arm
20
is rigidly attached. First and second base members
32
,
34
, are rigidly secured to the base plate
30
and run substantially parallel to a portion of the arm
20
. First and second sidewall engagement members
36
and
38
extend orthogonally in spaced-apart, parallel fashion from the first and second base members
32
and
34
respectively. A reinforcing member
40
, which is spaced-apart from the base plate
30
, extends between the first sidewall and second sidewall engagement members
36
and
38
. A front cover restraining member
42
extends orthogonally from an upper end of the first sidewall engagement member
36
, and additionally a back cover restraining member
44
extends orthogonally from the second sidewall engagement member
38
. The front cover restraining member
42
and back cover restraining member
44
, which are spaced-apart from each other, extend inwardly, that is in substantially the same direction as the arm
20
. Thus, the first hook-like restraining member
16
includes two inwardly opening spaced apart hook structures (namely the first sidewall engagement member
36
and front cover restraining member
42
as one hook structure, and the second sidewall engagement member
38
and the back cover restraining member
44
as a second hook structure).
The second hook restraining member
18
has a similar configuration to the first hook restraining member, and in this regard includes a base plate
46
having first and second spaced-apart base members
48
,
50
affixed thereto. First and second sidewall engagement members
52
and
54
extend upwardly in spaced-apart parallel fashion from the elongate base members
48
and
50
, respectively. A reinforcing member
60
extends between upper ends of the first and second sidewall engagement members
52
and
54
. Spaced-apart, front cover restraining member
56
and a back cover restraining member
58
extend inwardly from the first and second sidewall engagement members
52
,
54
, respectively. A portion of the tubular sleeve
24
is rigidly connected to the base plate
30
for receiving the locking arm
20
.
As can be appreciated from the illustration of
FIG. 1
, when the locking arm
20
is received within the tubular sleeve
24
of the lock device
22
, the first and second hook restraining members,
16
,
18
have opposing openings. In use, a lap top computer can be engaged between these opposed openings.
In one preferred embodiment, a through-hole
62
is provided through the base plate
46
in order to permit the security device
10
to be anchored to a support member
64
. By way of example, a bolt
66
and nut
68
combination could be used in combination with the through hole
62
to secure the second securing member
14
to an upper surface
70
of the support member
64
. Preferably, the bolt
68
would be received in a recessed hole on the underside of the support member
64
in order to prevent its unauthorized removal, or alternatively the nut
68
could be located in an area of the underside support member
64
which is protected by a locked drawer or the like.
The locking assembly
26
will now be described with reference to FIG.
2
. In a preferred embodiment of the invention, the security device uses a locking assembly
26
having a similar configuration and construction as the locking assembly described in U.S. Pat. No. 6,308,928 issued Oct. 30, 2001, to the inventor of the present invention. In this regard, the locking assembly
26
has a hardened steel housing
70
having a blind hole
72
in which is situated a spring loaded pawl
74
. The spring loaded pawl
74
is normally biased into a locked position (shown in
FIG. 2
) under the influence of a spring
76
. In this position, the spring
76
biases the pawl
74
part way into a passage way
78
of the lock assembly
26
for receiving the arm
20
therethrough.
The pawl
74
presents an inclined surface
80
for meeting a frustial conical surface
82
of the ratchet teeth
28
that are provided along the arm
20
. This configuration allows the arm
20
be advanced within the passage way
78
relative to the locking device
26
in the direction of arrow
84
shown in FIG.
2
. When moved in the direction of arrow
84
, the pawl
74
is pushed into the blind hole
72
by each ratchet tooth
28
passing the pawl
74
. As each ratchet tooth
28
passes the pawl
74
, the spring
76
urges the pawl
74
back into an annular space
86
between adjacent ratchet teeth
28
. When the pawl is positioned in an annual space
86
, movement of the arm
20
in a direction opposite to the direction shown by arrow
84
is blocked by the engagement of transversely-extending planar surface
88
of the pawl
74
with a portion of a planar angular surface
90
of a subject ratchet tooth
28
. Thus, the spring-loaded pawl
74
permits the arm
20
to be telescoped into the locking device
22
while preventing the arm
20
from being separated from the locking device
22
when it is in its locked position. In one embodiment, the lock assembly
26
is actuated by a removable key
92
. In a manner known in the art, rotation of the key
92
will rotate a torque blade and displace the pawl
74
into the blind hole
72
to compress the spring
76
, and away from the passage way
78
, thereby unlocking the lock assembly
26
to permit withdrawal of the arm
20
from the lock device
22
.
An overview of the security device
10
having been provided, an explanation of the operation of the device to secure an open lap top computer will now be explained with reference to
FIGS. 1-3
. With reference to
FIG. 3
, a lap top computer
100
is shown secured in an opened position to the support member
64
. The lap top computer
100
includes a cover
102
and a base
104
pivotally connected together for movement between an open position in which the cover extends at an angle from the base, and a closed position in which the cover and base collectively define a rectangular box-like structure. In the example illustrated in
FIG. 3
, the second securing member
14
has been anchored to an upper surface
70
of the support member
64
by means of a bolt
66
. As can be appreciated from
FIG. 3
, the through hole
62
(see
FIG. 1
) passes through the base plate
46
of the securing member
14
in a location that is located underneath base
104
of the lap top computer when the computer is secured by the securing device
10
, thus preventing access to the securing bolt
66
.
As will be understood from
FIGS. 1 and 3
, when securing the lap top
100
, the locking arm
20
extends underneath the base
104
of the lap top with its extending end is received within the sleeve
24
of lock device
22
. The first securing member
12
is telescoped towards the second securing member
14
until the lap top is restrained between the first hook restraining member
16
and second hook restraining member
18
as shown in FIG.
3
. In the engagement position as shown in
FIG. 3
, upward movement of the lap top computer is prevented by front cover restraining members
42
and
56
which engage an upper surface of the base
104
if the lap top
104
is moved in an upward direction. Front cover restraining members
42
and
56
also restrain forward movement of the lap top computer
100
by engaging a front portion of the cover
102
when the lap top is moved in a forward manner. Backward movement of the lap top computer is restrained by back cover restraining members
44
and
58
which engage back portions of the cover
102
when the lap top computer
100
is moved in a rearward direction. Sideways movement of the lap top computer is restrained by first sidewall engagement members
36
and
52
and, in the embodiment of
FIG. 3
, also by reinforcing members
40
and
60
.
Thus, in the engagement position, the first and second opposed hook restraining members
16
and
18
prevent unauthorized removal of the lap top computer. For each of the restraining members, the respective front cover restraining members
42
and
56
and elongate base members
32
and
48
are preferably spaced far enough apart to accommodate a wide range of different lap top thicknesses (and also to accommodate closed lap tops as explained in greater detail below), while at the same time not being spaced so far apart so as to allow the lap top computer to be rotated out of the security device
10
. Similarly, the front cover restraining members
42
,
56
are preferably spaced sufficiently far from their corresponding back cover restraining members
44
,
58
to accommodate a range of lap top covers of varying thickness, and also to permit the lap top screen to be angled according to the preference of the user, while at the same time not being spaced-apart so far as to permit the lap top computer
100
to be rotated out of the security device. Rotation of the key
92
to unlock the lock assembly
26
will release the pawl
74
from the ratchet teeth
28
to permit separation of the first and second securing members in order to release the lap top computer
100
.
With reference to
FIG. 4
, the heretofore described embodiment offers a great degree of a flexibility in that the adjustability permitted by telescopic locking arm
20
, and the configuration of the first and second hook members
16
and
18
, permit the security device
10
to also be used to secure a closed lap top computer
100
to the support surface of the support member
64
. In
FIG. 4
, the first securing member
14
has been anchored to the support member
64
. In the engagement position, a pair of diagonally located corners of the lap top computer
100
are secured between the opposed first and second hook members
16
and
18
. With respect to first hook restraining member
16
, opposed first and second sidewall engagement members
36
,
38
restrain movement of the lap top computer
100
in a horizontal plane parallel to the upper surface of support member
64
by engaging a pair of the sidewalls of the closed lap top computer
100
. Front cover restraining member
42
, back cover restraining member
44
and reinforcing member
40
collectively function as an engagement member to prevent any substantial upward movement of the lap top computer
100
, and the baseplate
30
and members
32
,
34
(which are in opposed relation to the restraining member
42
, back cover restraining member
44
and reinforcing member
40
) function as a further engagement member to prevent movement in a downward direction. Similarly, with respect to the second hook restraining member
18
, first sidewall and second sidewall engagement members
52
,
54
engage another pair of sidewalls of the lap top computer
100
to prevent sideways movement of the lap top, and the front cover restraining member
56
, back restraining member
58
and reinforcing members
60
are located over the cover
102
to prevent upward movement of the lap top
100
.
It will be appreciated that when the security device
10
is in its engagement position securing a closed lap top computer, even if a potential thief manages to pry the security device
10
from the support member
64
, the lap top computer
100
will still effectively be locked in the closed position. In some environments, the security device may be used to maintain a lap top computer in a closed position without anchoring the device to a support member
64
by means of bolt
66
.
It will thus be appreciated that the present invention provides a flexible security device which can conveniently and easily be used to lock clam-shell style lap top computers, both in an opened and closed position, and of varying sizes and styles, to a support member. It will be appreciated that the device could also be configured to be used to secure other equipment components that have diagonally opposed corners, such as a tool box for example.
Many variations and different embodiments of the present invention are possible. For example, in some applications the reinforcing members
40
and
60
may not be required. A non-exclusive list of examples of other possible modifications is as follows. Although bolt
66
passing through a through hole
62
has been described as one means for securing the security device
10
to a support member
64
, other anchoring methods could be used. For example the through hole
62
could pass through the base plate
30
(or be provided in some other manner) of the first securing member
12
, rather than the base plate
46
of the second securing member
14
. In some embodiments, an adhesive may be used to secure the security device to a support member. In some embodiments a cable may be used. In other embodiments, the bolt
66
could be replaced with a shaft that could receive some sort of locking device, for example a pad lock on a lower end thereof. One of the first or second securing members
12
,
14
could include a downwardly extending shaft with ratchet teeth on it for mounting to a desk top in a manner similar to that shown in aforementioned U.S. Pat. No. 6,308,928 to Galant. Accordingly, it will be appreciated that numerous different anchoring systems can be used to anchor the device of the present invention to a support member
64
or other structures.
Although a key actuated lock assembly
26
has been shown in the Figures, different types of lock assemblies could be used such as a combination actuated lock in place of a key actuated lock. Furthermore, a number of different types of pawl and ratchet configurations could be used, and in some embodiments a less sophisticated locking methods could be used, for example through holes could be provided along the length of the arm
20
for receiving a pad lock passed through corresponding locking holes provided in the sleeve
24
. Although the locking arm
20
and sleeve
24
have been shown as cylindrical, different telescoping configurations could be used.
With reference to
FIG. 5
, a security device in accordance with further preferred embodiments of the invention is indicated by general reference number
200
. The security device
200
, although similar to the security device
10
, differs from the security device
10
in respects that will be apparent from the drawings of the respective devices and the following description. As with device
10
, the security device
200
includes first and second securing members
12
and
14
which can be telescopically connected together to secure a piece of equipment such as a lap top computer therebetween, the first securing member
12
including a first hook-like restraining member
16
, and the second securing member
14
including a second hook-like restraining member
18
in opposed relationship with the first restraining member
16
.
In the illustrated embodiment, the first hook member
16
is made up of a base plate
30
. A U-shaped tubular base member
202
is rigidly secured to the base plate
30
. Spaced-apart first and second sidewall engagement members
204
and
206
extend upward from the ends of base member
202
, and first and second spaced-apart arms
208
,
210
extend inwardly from upper ends of the engagement members
204
and
206
, respectively. A U-shaped plate
212
is positioned between members
208
and
210
. The U-shaped plate
212
includes spaced apart front and back restraining members
214
,
216
that are joined at their outer ends by a side restraining member
218
, the members
214
,
216
and
218
collectively defining an inward opening
220
in which the edge of a lap-top computer cover
102
can be received.
The second hook restraining member
18
has a similar configuration to the first hook restraining member, and in this regard includes a base plate
46
having secured thereto a U-shaped tubular base member
222
. Spaced-apart first and second sidewall engagement members
224
and
226
extend upward from the ends of base member
222
, and first and second spaced-apart arms
228
,
230
extend inwardly from upper ends of the engagement members
224
and
226
, respectively. A U-shaped plate
232
is positioned between members
228
and
230
. The U-shaped plate
232
includes spaced apart front and back restraining members
234
,
236
that are joined at their outer ends by a side restraining member
238
, the members
234
,
236
and
238
collectively defining an inward opening
240
, in opposed relation to opening
220
, in which a further edge of a lap-top computer cover
102
can be received.
As with security device
10
, the security device
200
includes an elongate cylindrical rod or arm
20
that extends from the first securing member
12
in the same direction that the first hook member
16
opens towards. Unlike device
10
, the arm
20
of device
200
is spaced apart from the base-plate
30
, and is secured to the arm
210
.
The second securing member
14
includes a lock device
22
which is configured to telescopically receive the locking arm
20
of the first securing member
12
. As with security device
10
, the lock device
22
includes a tubular sleeve
24
which has a lock assembly
26
mounted thereon for engaging ratchet teeth
28
that are provided along the length of an extending portion of the arm
20
. The tubular sleeve
24
of the security device
200
is spaced apart from the base plate
46
and is rigidly secured to the arm
230
of the restraining member
18
.
When the locking arm
20
of the security device
200
is received within the tubular sleeve
24
of the lock device
22
, the first and second hook restraining members,
16
,
18
have opposing openings. In use, a lap top computer can be received between these opposed openings. Similar to security device
10
, the security device
200
can be anchored to a support member
64
by means of bolt
66
passing through hole
62
that is provided through the base plate
46
.
In addition to or in place of a bolt passing through hole
62
, a cable
242
could be used to secure the security device
200
(or security device
10
or any of the other embodiments of the security device that are described further below) to a structure. In the embodiment illustrated in
FIG. 5
, the cable
242
is secured at one end to the security device
200
by means of a loop
244
through which the arm
20
or sleeve
24
is threaded through. The loop
244
is small enough so that it can not be slipped over the opposed restraining members
16
or
18
. An eye bolt and nut combination
246
can be used to secure the other end of the cable
242
to a structure to prevent unauthorized removal of the security device and the piece of equipment that is engaged by the security device. A second loop
248
on the cable
242
can also be threaded through the arm
20
or sleeve
24
so that security device
200
can be secured in place by passing the cable
242
through a hole or opening in a structure and inserting the arm
20
or sleeve
24
through both loops
244
,
248
. Such a cable configuration could conveniently be used to secure a lap top computer (or other rectangular-type equipment) to a car part within the car cabin or a car trunk, for example.
FIG. 6
shows the security device
200
securing closed laptop computer
100
by engaging the diagonally opposite corner portions
250
and
252
of the laptop computer
100
. The first restraining member
16
includes portions that engage all four walls that meet at one corner portion
250
of the laptop computer. In particular, sidewall engagement members
204
and
206
function as opposing members and each engage one of the sidewalls that meet at 90 degrees at the corner
250
. The base plate
30
is in opposed relation to the arms
208
,
210
and U-shaped plate
212
with the base plate engaging the bottom wall of the laptop at corner
250
, and the arms
208
,
210
and U-shaped plate
212
engaging the top cover wall of the laptop at corner
250
. Depending on the computer height, the space between the base pate
16
and the U-shaped plate
212
may be larger than the height of the closed laptop, and accordingly there may be some limited movement of the laptop possible relative to the security device
200
. The second restraining member
18
engages the diagonally opposite corner
252
in a similar manner. In
FIG. 6
, the arm
20
and sleeve
24
pass over the top of the lap top cover rather than under it as shown in the embodiment of FIG.
4
.
FIG. 7
shows the security device
200
securing laptop computer
100
in an open position. Opposite side edge portions of the open cover
102
are received and restrained within the opposed openings
220
and
240
that are defined by U-shaped plates
212
and
232
, respectively, and opposite side edge portions of the base
104
are received within the opposed openings defined by baseplate
46
, sidewall engagement member
234
and arm
228
of the restraining member
18
and baseplate
30
, sidewall engagement member
204
and arm
208
of the restraining member
16
. As can be appreciated from
FIG. 7
, the locking arm
20
and sleeve
24
are located behind the open cover
102
, rather than under the computer as in the embodiment of
FIG. 3
, and thus the security device
200
does not require that the computer base
204
sit at an angle relative to the support surface
70
. Furthermore, as the locking arm
20
does not pass under the laptop, the lock assembly
26
can be positioned between the first and second restraining members
16
and
18
, thus making the security device
200
have an overall relative length that is shorter than that of device
10
in which the lock assembly is located outside of the second restraining member
18
.
With reference to
FIG. 8
, another security device in accordance with further preferred embodiments of the invention is indicated by general reference number
260
. The security device
260
, although similar to the security device
10
, differs from the security device
10
in respects that will be apparent from the drawings of the respective devices and the following description. As with device
10
, the security device
260
includes first and second securing members
12
and
14
which can be telescopically connected together to secure a piece of equipment such as a lap top computer therebetween, the first securing member
12
including first restraining member
16
, and the second securing member
14
including second restraining member
18
in opposed relationship with the first restraining member
16
.
In the illustrated embodiment, the first hook member
16
of device
260
is made up of a base plate
262
, from which locking arm
20
extends. An optional shim plate
264
is positioned on the base plate
262
. An inwardly opening (ie. towards a center of the security device
260
) U-shaped wall
266
extends upward from the baseplate
262
having opposed wall portions
268
,
270
. A U-shaped plate
272
defining an inward facing opening
274
is located at an upper end of U-shaped wall
266
in spaced apart and opposed relation to the shim plate
264
.
The second hook restraining member
18
of device
260
has a similar configuration to the first hook restraining member, and in this regard includes a base plate
282
, to which locking device
22
(including sleeve
24
) is attached for receiving the locking arm
20
. An optional shim plate
284
is positioned on the base plate
282
. An inwardly opening (ie. towards a center of the security device
260
) U-shaped wall
286
extends upward from the baseplate
282
having opposed wall portions
288
,
290
. A U-shaped plate
292
defining an inward facing opening
294
is located at an upper end of U-shaped wall
266
in spaced apart and opposed relation to the shim plate
264
.
In a manner similar to security devices
10
and
200
, the device
260
can secure a lap-top computer in both the open and shut positions. In the shut position, diagonally opposite corner portions of the laptop computer are received within and restrained by the restraining members
16
and
18
. In particular, the laptop computer sidewalls meeting at one corner are engaged by the opposed sidewall portions
268
and
270
of restraining member
16
, with the upper cover and bottom base walls at such corner portion being located between and restrained by the opposed shim plate
264
and U-shaped plate
272
. The retraining member
18
engages the diagonally opposed corner in a similar manner.
In the laptop open position, the device
260
receives opposite side edges of the laptop cover within openings
274
and
294
, and opposite side edges of the laptop base within the space between the shim plate
264
and U-shaped plate
272
at one edge and the shim plate
284
and U-shaped plate
292
at the opposite edge.
With reference to
FIG. 9
, yet another security device in accordance with further preferred embodiments of the invention is indicated by general reference number
300
. The security device
300
operates in a manner similar to the security devices
10
and
260
, and in particular security device
200
, described above
260
, except for differences, that in view of the above description, will be apparent from the respective Figures.
In some embodiments, the security device may be configured to permit only closed equipment components to be secured, and may be configured to secure equipment components that have opposite corner portions, but which are not perfectly square or rectangular in shape. In this regard,
FIGS. 10 and 11
show an example of a further security device, indicated generally by reference
330
, in accordance with preferred embodiments of the present invention. The security device
330
operates in a similar to the devices described above, having first and second securing members
12
and
14
that can be telescopically locked together, with opposed restraining members
332
and
334
for engaging opposite corners on a component. As will be apparent from the drawings, the security device
330
, however, is not configured for use with an open laptop computer, but is configured to be used to secure a closed laptop computer
100
that is attached to a docking station
336
.
As shown in
FIG. 12
, the security device
330
may be provided with adjustable shim plates for adjusting for computer components of different thicknesses or heights. In this respect, each of the restraining members
332
,
334
has a base shim plate
336
to which can be added one or more additional shim plates
338
. In the illustrated embodiment, threaded holes are provided on the base shim plates
336
for receiving screws
340
that secure the additional shim plates
338
in place. Such adjustable shim plates could also be used on the other embodiments of the security device described above to provide adjustability for a range of computer sizes.
FIG. 12
shows yet a further security device, indicated generally by reference
350
, for securing a closed docked lap-top in accordance with the present invention. The device
350
is similar to device
330
, except that the locking arm and corresponding sleeve are located to pass over the top of the computer and docking station, rather than under it, which permits the device
350
to have a shorter overall profile as locking assembly
26
can be located between the opposed restraining members.
As will be apparent to those skilled in the art in the light of the foregoing disclosure, many alterations and modifications are possible in the practice of this invention without departing from the sprit or scope thereof. The foregoing description is of the preferred embodiments and is by way of example, and is not to limit the scope of the invention as set forth in the following claims.
Claims
- 1. A security device for securing a substantially rectangular box-shaped component that is defined by spaced-apart cover and base walls with four side-walls extending at least partially between four respective edges of the cover and base walls, pairs of the sidewalls meeting at four corners of the component, the security device comprising:a first securing member including a first restraining member for engaging a first corner of the component, and an elongate arm extending from the first restraining member; and a second securing member including a second restraining member for engaging a second corner of the component that is diagonal to the first corner, and a releasable locking device for engaging the arm to prevent movement of the first and second restraining members away from each other when in an engagement position; the first and second restraining members each including spaced apart cover wall and base wall engagement members, and a pair of spaced apart side-wall engagement members for engaging the cover wall, base wall, and a pair of side-walls, respectively, at the first and second corners, respectively, to restrain movement of the component relative to the security device when in the locked position.
- 2. The security device of claim 1 wherein the spaced apart side-wall engagement members of the first restraining member extend substantially parallel to each other from the base wall engagement member thereof, and the elongate arm extends from the base wall engagement member of the first restraining member substantially transverse to the side-wall engagement member thereof; and wherein the spaced apart side-wall engagement members of the second restraining member extend substantially parallel to each other from the base wall engagement member thereof.
- 3. The security device of claim 1 wherein the locking device telescopically engages the elongate arm and is securable to the arm at a selected one of a plurality of locations along the length of the arm when in the engagement position, the arm including a plurality of ratchet teeth spaced along a length thereof, and said locking device has a pawl movable between a locked position in which the pawl engages a selected one of the ratchet teeth thereby preventing movement of the first and second restraining members away from each other, and an unlocked position in which the pawl is disengaged from the ratchet teeth such that the first and second restraining members can be moved away from each other, the pawl being spring loaded to permit the locking device to be telescoped onto the arm while preventing it to be removed therefrom when the locking device is in the locked position.
- 4. A security device for securing a laptop computer having a cover and a base pivotally connected together for movement between an open position in which the cover extends at an angle from the base, and a closed position in which the cover and base collectively define a rectangular box-like structure, the device comprising:first and second securing members each having: (i) a generally U-shaped member defining an opening for receiving a portion of the laptop cover when in an open position, (ii) a rigid base member spaced apart from the U-shaped member for extending under a portion of the laptop base, and (iii) a joining member joining the rigid base member and the U-shaped member; the first securing member including an elongate arm extending therefrom; and the second securing member including a locking device for telescopically receiving the elongate arm of the first securing member and for engaging the arm to prevent movement of the first and second securing members away from each other when in an engagement position, the openings defined by the U-shaped members of the first and second securing members opposing each other when the arm is telescopically received in the locking device so that when the laptop computer is in an open position, the cover and base can be received between and restrained by the securing members to secure the laptop when the locking device is in the engagement position.
- 5. The security device of claim 4 wherein the locking device can be selectively secured at a plurality of locations along the arm and the U-shaped member, joining member and base member of the first securing member are configured to engage four sides of a first corner of a closed laptop computer, and the U-shaped member, joining member and base member of the second securing member are configured to engage four sides of a second corner of the laptop computer that is diagonal from the first when the laptop computer is in its closed position.
- 6. The security device of claim 5 wherein the locking arm is positioned to extend behind the cover when the security device is used to secure the laptop computer in an open position.
- 7. The security device of claim 4 including a cable attached to one of the securing members for connecting the security device to a structure.
- 8. A security device for securing an equipment component, the security device comprising:a first securing member including a first restraining member for engaging a first portion of the component, and an elongate arm extending from the first restraining member; and a second securing member including a second restraining member opposing the first restraining member for engaging a further portion of the component that is spaced apart from the first portion, and a releasable locking device for engaging the arm to prevent movement of the first and second restraining members away from each other when in an engagement position; the first and second restraining members each including a first pair of spaced apart opposed engagement members for restraining movement of the component in a first plane, and a second pair of spaced apart opposed engagement members for restraining movement of the component in a second plane, wherein a hole is defined through a portion of one of said first and second securing members for receiving a shaft to secure the first or second member to a support surface, the hole being positioned so that it is located between the component and the support surface when the security device is used to secure the component to the support surface.
- 9. The security device of claim 8 including a cable attached to one of the securing members for connecting the security device to a structure.
- 10. The security device of claim 8 wherein the locking device telescopically engages the elongate arm and is securable to the arm at a selected one of a plurality of locations along the length of the arm when in the engagement position.
- 11. The security device of claim 10 wherein the arm includes a plurality of ratchet teeth spaced along a length thereof, and said locking device has a pawl movable between a locked position in which the pawl engages a selected one of the ratchet teeth thereby preventing movement of the first and second restraining members away from each other, and an unlocked position in which the pawl is disengaged from the ratchet teeth such that the first and second restraining members can be moved away from each other, the pawl being spring loaded to permit the locking device to be telescoped onto the arm while preventing it to be removed therefrom when the locking device is in the locked position.
- 12. A security device for securing a laptop computer, the laptop computer having a cover and a base pivotally connected together for movement between an open position in which the cover extends at an angle from the base, and a closed position in which the cover and base collectively define a rectangular box-like structure, the device comprising:a first securing member including a first restraining member and an elongate locking arm extending therefrom; and a second securing member including a second restraining member connected to a locking device for slidably receiving the arm and engaging the arm at a selected one of at least two possible engagement positions to prevent movement of the first and second securing members away from each other; the first and second restraining members each including restraining means that are opposed when the locking arm is received in the locking device, the restraining means having means for engaging the cover and base of an open laptop computer to restrain movement of the laptop when the arm is received within the locking device at one of the at least two possible engagement positions, and means for engaging diagonally located corners of a closed laptop computer to restrain movement thereof when the arm is received in the locking device at another one of the at least two possible engagement positions, wherein a hole is defined through a portion of one of said first and second securing members for receiving a shaft to secure the first or second member to a support surface, the hole being positioned so that it is located between the computer and the support surface when the security device is used to secure the computer to the support surface.
- 13. A security device for securing a laptop computer having a cover and a base pivotally connected together for movement between an open position in which the cover extends at an angle from the base, and a closed position in which the cover and base are parallel to each other, the security device comprising:a first securing member including a first restraining member for engaging a first portion of the laptop computer, and an elongate arm extending from the first restraining member; and a second securing member including a second restraining member opposing the first restraining member for engaging a further portion of the laptop computer that is spaced apart from the first portion, and a releasable locking device for engaging the arm to prevent movement of the first and second restraining members away from each other when in an engagement position; the first and second restraining members each including a first pair of spaced apart opposed engagement members for restraining movement of the laptop computer in a first plane, a further engagement member in spaced apart opposition to at least one of the opposed engagement members for restraining movement of the laptop computer in a second plane, and a joining member connecting the further engagement member to at least one of the opposed engagement members; wherein, for each restraining member, the first pair of opposed engagement members are positioned to, when the device secures the laptop computer in the open position, receive there between a side edge portion of the cover and the further engagement member is positioned to, when the first pair of engagement members are receiving the side edge portion, extend under a portion of the base; the joining members of the first and second restraining members each including a further pair of opposed engagement members for engaging a pair of orthogonal sidewalls at diagonally opposed corners of the laptop computer when the laptop computer is in a closed position.
- 14. The security device of claim 13 wherein a hole is defined through a portion of one of said first and second securing members for receiving a shaft to secure the first or second member to a support surface, the hole being positioned so that it is located between the component and the support surface when the security device is used to secure the component to the support surface.
US Referenced Citations (20)
Foreign Referenced Citations (1)
| Number |
Date |
Country |
| 1 130 204 |
Sep 2001 |
EP |