The present invention relates to devices for hindering the theft of relatively small, but expensive pieces of equipment.
Computers have evolved from large, expensive machines used only by a few, to relatively small, portable, handheld machines which are usable by many. Nowadays, more and more of the computers and portable devices are in the form of laptops, tablets, mobile telephones and the like, all of which pack significant processing power and are capable of performing tasks and store information which, decades ago, required a roomful of computers. At the same time, these highly portable electronic devices carry a steep price tag, on the order of several hundreds of dollars for a device such as the Apple iPhone™ smartphone and similar devices.
A variety of devices have been developed to inhibit the theft of these portable devices and the common expedient has been to provide these devices with a security slot through which a locking element of a lock can be passed and which lock is also provided with a long cable of a few feet that has a loop at the end and which enables the highly portable mobile devices to be tethered to an immovable object.
The art of computer security has improved tremendously over the years and a large body of prior art documents including issued patents have become available. Representative prior art includes U.S. Pat. Nos. 8,820,127; 8,739,583; 8,307,675; 7,562,547; 7,549,308; 7,441,426; 7,249,474; 7,201,029; 7,028,513; and 6,244,082. The entire contents of the aforementioned list of patents are incorporated by reference herein.
The instant inventor has come to the realization that further improvements can be obtained to solve a remaining, vexing, unsolved problem. The sizes of computing have become ever smaller. Mobile phones are on the order of about 10 millimeters thick and just a few centimeters in width and length. Consequently, the locks have become smaller and the cables by which these devices are tethered to immovable objects have become thinner. The ever continuing quest to reduce the sizes has also resulted the walls of these portable devices becoming quite thin. Therefore, the security slots which are defined in very thin walls, often made of plastic, have been weakened and this has enabled removing the lock with a strong hand pull or by twisting it, breaking the outer wall of the computing device without undermining its functionality.
It is an object of the present invention to provide improved security devices, systems and methods for mobile devices.
It is a further of object of the invention to provide a locking system for highly mobile and extremely compact communication and computing devices that provide protection against the cable of the lock being cut.
It is yet another object of the invention to provide security slots in computing devices that provide very strong and sturdy and not easily broken security slot.
The foregoing and other objects of the invention are realized by a portable electronic device with a locking system, comprising: a printed circuit board securely anchored to a housing of said electronic device; a security locking component in the form of a lock opening defined in a material slab, said lock opening being configured to receive a locking head of a lock system; and wherein said locking component is physically anchored to the printed circuit board in the housing of the electronic device.
The housing may comprise an access opening that is registered with the lock opening, so as to enable passage of the locking head to the lock opening. The material slab may be in the shape of a metal flange in which said lock opening is defined. The lock opening may be formed as a cavity in said material slab. The cavity may be a dead ended cavity. The cavity may be trapezoid shaped within. The lock opening may be formed as a through going opening is said material slab. The lock opening may be rectangular and measures about 3×7 mm in width and length, respectively.
The material slab may be configured to damage said printed circuit board when a pulling force of greater than a predetermined value is exerted on said locking head. The portable electronic device may include at least one electrical node on the printed circuit board which is electrically coupled to and associated with said lock system. The lock system may include a lock cable with an electrical wire extending in said cable and the electrical node is electrically coupled to the electrical wire in a manner that enables circuitry located on said printed circuit board to determine whether said electrical wire has been severed based on a state of an electrical property at said electrical mode.
The electronic device may be one of a mobile smart phone, a laptop computer, a desktop computer and a tablet computer. The electrical wire preferably forms a continuous closed circuit when the locking head is in a locking position within the lock opening, and the electrical property at the electrical node is configured such that unauthorized disruption of the closed circuit effects at least one of triggering of an alarm and disabling of the electronic device. An application program (AP) may be installed in the electronic device that runs in a background mode, wherein upon insertion of the locking head in the lock opening a request is presented to the user on a screen of the electronic device to enter a password that the computer device is to be operationally locked, whereby with such locking initiation cutting of the cable is immediately detected by the AP and a prompt appears on the screen that a password be entered to enable continued operation of the electronic device and if such password is not entered the electronic device remains inoperable. AP allows the otherwise inoperable electronic device to connect to a central controlling server, to prove ownership of the electronic device, with proper ownership being shown enabling the electronic device to resume its normal operation.
Other features and advantages of the present invention will become apparent from the following description of the invention which refers to the accompanying drawings.
Prior art
Most importantly, at the front face 28 is provided a locking element which comprises a T-bar style locking element that has a cross locking tab or head 30 attached to a shaft 31, rotatable by means of a key (to be described) and including anti-rotation pins 29a, 29b, all in well known manner. The security slot 40 (
In another prior art construction (
In
Inside the computer device 4 there is typically to be found a bottom wall or base 60 on which are placed or to which are connected one or more printed circuit boards (PCBs), for example, a circuit board 62 and another circuit board 64. The circuit board 70 has a plurality of integrated circuits (ICs), for example, 62a and 62b, and the circuit board itself is connected by means of screws or other hardware 66 very firmly to the base or bottom wall below, providing a very strong, sturdy connection. Similarly, the second circuit board 64 may have integrated circuits 64a, 64b. Most significantly, these ICs are connected by pins 70 which are either soldered or otherwise very firmly attached to the circuit board. The circuit boards 62, 64 will not budge and any attempt to move them will destroy the entire device. The circuit board 64 is shown in perspective, including the connection hardware 66 in
In accordance with the present invention,
It is not necessary to have the precise security slot shape, as in
Referring to
Referring to
The AP (application program) 150 is a simple program that runs in the background of the computing device which may have the following features that are easily programmable therein. When a person's computing device is on, and the AP 150 is launched, nothing will happen initially. However, when the lock 100 is inserted, the user is prompted to enter a password (or press an icon button) that the computer device is to be locked. At the same time, a software flag is set, indicating this condition. If someone cuts the cable 12, this is immediately detected by the AP and the operator is prompted to enter a password to enable continued operation at the computing device. If that person is unable to enter that code, the internal registers of the computer are reset, rendering the computer device entirely inoperable. The AP may allow the computer to connect to a central server, to prove ownership of the device, enabling one to reset the machine to allow its normal operation. Many other ways of controlling the device to prevent tampering therewith can be realized by one of ordinary skill in the art, based on the instant disclosure.
In addition to rendering the device inoperable or alternatively the AP may be configured to utilize audio elements of the computing device to trigger an alarm of timed duration which can only be shut off with the entry of a predetermined password (as used herein all passwords to provide enumerated functions are predetermined). In a further embodiment, particularly if the computing device embodies a transmitting function (e.g., a smart phone), the AP may be configured to utilize the transmitting element of the computing device to transmit a notification, ideally in real time, to the owner/user (having a separate receiver or to any other designated receiver) that the device is being compromised.
Although the present invention has been described in relation to particular embodiments thereof, many other variations and modifications and other uses will become apparent to those skilled in the art. It is preferred, therefore, that the present invention be limited not by the specific disclosure herein, but only by the appended claims.
The present application claims benefit of and priority to U.S. Provisional Application Ser. No. 62/049,414 filed Sep. 12, 2014 entitled PCB MOUNTED SECURITY SLOT, the contents of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5059948 | Desmeules | Oct 1991 | A |
5452983 | Parmley, Sr. | Sep 1995 | A |
6265091 | Pierson et al. | Jul 2001 | B1 |
6389853 | Pate | May 2002 | B1 |
6459374 | Rand et al. | Oct 2002 | B1 |
8230707 | Hung | Jul 2012 | B2 |
8842422 | Hung | Sep 2014 | B2 |
9152826 | Zhang | Oct 2015 | B2 |
9624697 | Avganim | Apr 2017 | B1 |
20020003052 | Hayashi | Jan 2002 | A1 |
20040074264 | Kung et al. | Apr 2004 | A1 |
20060036781 | Thacker | Feb 2006 | A1 |
20070192640 | Fukuchi | Aug 2007 | A1 |
20090158423 | Orlassino et al. | Jun 2009 | A1 |
20100136425 | Gau et al. | Jun 2010 | A1 |
20100147041 | Teicher | Jun 2010 | A1 |
20100251391 | Adrangi | Sep 2010 | A1 |
20110187532 | Edelstein et al. | Aug 2011 | A1 |
20140326027 | Avganim | Nov 2014 | A1 |
Number | Date | Country |
---|---|---|
2180736 | Oct 1994 | CN |
201274049 | Jul 2009 | CN |
201433622 | Mar 2010 | CN |
201810076 | Apr 2011 | CN |
202736209 | Feb 2013 | CN |
203321130 | Dec 2013 | CN |
10 2006 032 733 | Jan 2008 | DE |
0 747 555 | Dec 1996 | EP |
Entry |
---|
International Search Report dated Jan. 18, 2016 issued in connection with corresponding PCT/IB2015/001949. |
Notification Concerning Transmittal of International Preliminary Report on Patentability, dated May 12, 2016 with accompanying Written Opinion of the International Searching Authority. |
Number | Date | Country | |
---|---|---|---|
20160081212 A1 | Mar 2016 | US |
Number | Date | Country | |
---|---|---|---|
62049414 | Sep 2014 | US |