This invention pertains to portable computing devices, such as a tablet computer and ways of securing and preventing unauthorized access to such devices and, more particularly, to a method and system for controllably and selectively securing a portable computing device to a physical holding device.
For many applications, tablet computers and other portable computing devices significantly facilitate the recording of and access to personal data, proprietary algorithms, and other forms of sensitive or highly valued data and programs. As a result, such computing devices are of significant value, not only because of the processes that they enable, but also because of the data that they may hold. Moreover, many devices such as tablet computers provide secure wireless access to many networks or on-line systems. To protect this access tablet computers and similar devices must be secured from unauthorized use and access.
Known security measures for tablet computers provide security against unauthorized access to the various programs and data that the tablet computer holds using standard password software and similar authentication programs that use software to assure that only authorized users have access to the tablet computers contents. Unfortunately, the only known method or system assures that the tablet computer will not be stolen or otherwise physically removed from its location of use is a physical lock that is not user specific. In the event of unauthorized use, theft or removal seriously damaging circumstances may follow from unauthorized persons seeking or accessing such data or programs. In addition, the replacement costs following theft are simply not desirable or acceptable, if some alternative way of securing a protecting these devices could be provided.
There is a need, therefore, for a tablet computer holding device or docking station stand that prevents an unauthorized person from using, stealing or removing the tablet computer.
There is a need for a method and system that permits a user to control the time or circumstances at which a tablet computer may be physically removed from a secure location.
The present invention provides a method and system for controllably and selectively securing a portable computing device to a physical holding device which substantially eliminates or reduces the disadvantages and problems associated with prior methods and systems for preventing unauthorized use of and access to a tablet computer and similar devices.
According to one aspect of the present invention, there is provided a method and system for a method and system for controllably and selectively securing a portable computing device to a physical holding device which includes a physical holding device for receiving a portable computing device. A locking mechanism locks the portable computing device to the physical holding device. A security application associates with the portable computing device for responding to an authorization input for generating an electronic locking mechanism control signal. An actuator mechanism responds to the electronic locking mechanism control signal to actuate the locking mechanism in locking the portable computing device to the physical holding device.
A technical advantage of the present invention includes the use of the same or similar security applications as may be used to provide controlled access to software and data to also provide controllable and selectable physical access. As a result of the control that the present invention provides, a user may control not only who, but also how a person may physically access the tablet computer.
A further technical advantage of the present invention includes the ability to employ the physical security application of the present invention in many different environments and applications. As a result of the present invention, there are many more business and professional environments in which a tablet computer or similar device may find extremely valuable service.
Other technical advantages are readily apparent to one skilled in the art from the following FIGUREs, description, and claims.
For a more complete understanding of the present method and system for controllably and selectively securing a portable computing device to a physical holding device, reference is now made to the following description which is to be taken in conjunction with the accompanying drawings and in which like reference numbers indicate like features, and further wherein:
Preferred embodiments of this invention are described herein, including the best mode known to the inventor for carrying out the invention. Variations of those preferred embodiments may become apparent to those of ordinary skill in the art upon reading the following description. The features and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.
To illustrate the preferred embodiment of the present invention,
Along side 32 of casing 12, appears LED row 34, which includes power LED 36 for displaying power status, battery LED 38 for displaying battery status, hard disk drive LED 40 for displaying hard disk drive activity, and wireless LED 42 for displaying wireless activity and on/off status.
Tablet computer 10 also includes a number of function buttons 43, including escape button 44, function button 46, five-way directional control button 48, Hot Key #1 button 50, and Hot Key #2 button 52, all of which are described in detail and function in the Motion Computing Corporation publication, Motion Computing M1400 Tablet Computer User Guide, which publication is here incorporated by reference. Microphones 54 and 56 work at a natural distance to receive audio signals and are disabled when an external microphone is plugged in. Pen Post 58 receives the digitizer pen, which is a sensitive, electronic data-entry device designed in conjunction with the tablet computer display to which you can secure the pen with a plastic pen tether.
A PC card slot 60, along the side of casing 12 holds one Type-II PCMCIA card for memory expansion, an external Bluetooth cards, or other type of electronics card. Speakers 62 and 64 are integrated into casing 12 and may be muted upon connecting a headset or external speakers. Tablet computer 10 also includes an antenna cover for an 802.11 wireless networking antenna cover, a power switch for turning the tablet computer on and off, and AC power jack AC power connector for the tablet computer, an RJ-11 modem port Connector for a 56.6K V.90 modem, and RJ-45/LAN Standard RJ-45 connector for a 10/100 Mbps network, RJ-45 LEDs, a display LAN connection status a VGA connector, a standard DB-15 monitor connector for an external monitor, a docking connector for connecting the tablet computer securing docking station (
The present invention, therefore, makes effective use of the security software and the electronics circuitry of tablet computer 10, the rigid, yet multi-functional structure of docking station 100, together with a security device such as, security device 106 (including a Kensington or similar lock 110) for physically securing tablet computer 10 in an electronically controllable manner. For example, by combining the biometric technologies of fingerprint reading of finger print sensor 24 or voice recognition using microphones 28 and 30, tablet computer 10 may specifically identify one or more specific users according to their individual fingerprints or voice signature. Using such a method for identity verification and validation, the user will receive the authorized physical release or securing of tablet computer 10 in a docking station or similarly strong holder or station. By associating one or more locking mechanisms 110 of a docking station 100 with a tablet computer 10, the present invention may determine whether a potential user has the necessary authorization to use the secured tablet computer. If the potential user does not possess or use the correct authentication input, security device 104 will neither allow access or use of the tablet computer, nor will it make possible the use of the tablet computer within the docking station.
Although not explicitly needed for the present invention, a lock that may be used in security device 104 may a tubular lock 110 according to
As shown, the preferred embodiment of cable means 114 for use in the present invention includes an internal core 116 formed from stainless steel aircraft cable and an external sleeve 118 formed from PVC or a like material. The internal core extends beyond the end of the sleeve 118. As illustrated, the distal end of the cable 114 is formed into a loop 120 in a manner well known to those skilled in the art. In operation of the lock 110, the loop 120 may be either connected to a stationary body by means of a second locking device (not shown) or passed over the rear end 112 of the tubular lock prior to insertion of the spindle into an appropriate locking port, thereby creating a locked circuit between spindle 122 of tubular lock 110 and the attached cable means 114. Thus, as spindle 122 moves from one position to another in security lock slot 72 of table computer 10, the locked circuit physically secures the tablet computer 10 in position.
As will be appreciated by those skilled in the art, the use of PVC sleeve 118 to cover the cable means 116 permits the cable means to be wrapped around stationary objects prior to the loop 120 being disposed over the lock 110 of the present invention without damaging the surface of the stationary object. Presently, the tablet computer 10 provides input via a fingerprint sensor 24, a password using login template 16, and a PCMCIA card input using a smartcard or other authorization electronics reader. There may be other ways to provide the needed authorization for actuation security device 104 of the present invention. The present invention may incorporate a password management system in association with security device which includes a fingerprint reader built into the tablet computer lets which permits scan the user's fingerprint to log onto the tablet computer and perform other functions such as accessing email, e-banking, paying bills online, or accessing network resources. The password management system provides a secure and convenient system for managing passwords. When implemented within the security policies of your work environment, the password management system authentication tools add another layer of security for passwords, files, and other logons. The following section provides basic information about setting up and using the management system.
The present invention also provides an actuation mechanism for associating a number of tablet computers 10 together to permit the physical removal of more than one tablet computer 10 upon the receipt of an actuation signal from a master or controlling tablet computer. Thus, for example, in a class room using a set of tablet computers 10, the present invention would permit the physical of the tablet computers via central network control signal (such a control signal may, for example, come through wireless network) to release the classroom's tablet computer, using a single “release” command.
The present invention, in the situation of
The biometric security processes that the present invention enable may determine authorized users who may remove tablet computer 10 from the docking station of holding device 142. As such, with the physical security features of security device 104, for example, a tablet computer 10 can be specified to be accessible to only a physician or, alternatively, to clinical staff of a hospital. Likewise, tablet computer 10 may be accessible to only those individuals associated with a particular patient or specific function. Thus, using biometric algorithms, it is possible to set parameters for the use and removal of tablet computer 10 according to differing needs.
The present invention may also accommodate the use of a wireless signals, such as Blue Tooth, the IEEE 802.11 series of signals or other wireless signal. Such signals may be used to both upload user data, as well as to download lists of authorized users. As such, those individuals authorized to remove table computer from docking station 100 or holding device 142 may change dynamically, given the correct algorithms and security procedures to accomplish them.
A technical advantage of the present invention includes allowing multiple levels of authorization. Thus, although a user may be allowed to use a given tablet computer, depending on the user, there may be limitations on the data or applications to user-specific access to data and user-specific access to the tablet computer. Security device 106 may also be set to activate if the authorized user does not input data for a specified amount of time, e.g., 10 seconds. Such a feature could be programmed into a dashboard or other system utility, such as the Motion Computing Dashboard utility.
The present invention also makes possible the tracking of resources such as tablet computer 10. By providing a log of who has received access to the device, the electronic proof of which doctors or other health care providers have accessed specific information, as the tablet computer to moves about a hospital ward, becomes recorded. For regulatory requirements such those of the U.S. Health Insurance Portability Protection Act (HIPPA), such information may become exceedingly important.
The healthcare environment is not the only environment in which the physical security aspects of the present invention may be applied.
Another example use of the present invention may be that of healthcare facility or large retail establishment, wherein many tablet computers may be user in a coordinated manner. In such an enterprise or facility, a number of tablet computers could be placed in a clipboard or other arrangement. Then, on a daily basis there could be an accounting of all such tablet computers. Such tablet computers could, for example be collected or checked end of the day in. Then, at the start of a new day, the tablet computers could be singly secured using security device 104, only later to be centrally authorized for removal from the docking station 100 at days end.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.