The present invention will be more fully understood, and further features will become apparent, when reference is made to the following detailed description and the accompanying drawings. The drawings are merely representative and are not intended to limit the scope of the claims. Like parts depicted in the drawings are referred to by the same reference numerals.
The following detailed description references the accompanying drawings which show some example embodiments of the invention. These example embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that other embodiments may be utilized, or structural changes made, such that the detailed description should not be considered as limiting the scope of the claims.
An example integrated circuit 11 is shown in
The portable computer security device 10 further includes a closing member 14 (see
In some embodiments, the flat spring 16, the closing member 14 and the housing 12 form a carbineer style clip so that the portable computer security device 10 may be readily attached to an object. In addition, the flat spring 16 may be embedded in the housing 12 and/or the closing member 14.
In the example embodiment that is illustrated in
In some embodiments, the flat spring 16 may be ultrasonically inserted into the housing 12 and/or the closing member 14. It should be noted that the flat spring 16 may be attached to the housing 12 and/or the closing member 14 in any manner that promotes biasing the closing member 14 against the housing 12.
In other example embodiments, the flat spring 16, the closing member 14 and/or the housing 12 may be formed as part of the same mold such that the flat spring 16, the closing member 14 and/or the housing 12 are integral with one another. The method of attachment between the flat spring 16 and the housing 12 or closing member 14 will depend in large part on the materials that are used to form the flat spring 16, the closing member 14 and the housing 12.
As an example, the flat spring 16 may be formed of tempered spring steel. However, the type of material that is chosen for the flat spring 16 will depend on the size and shape of the housing 12 and the closing member 14 as well as the amount of biasing force that is desired to maintain the closing member 14 against the housing 12.
In the example embodiment that is illustrated in
In some embodiments, the housing 12 includes a cover 24 and a base 26 (only partially visible in
The cover 24 may be attached to the base 26 in any manner that is known now or discovered in the future. As an example, the cover 24 may be secured to the base 26 using an adhesive.
The type of attachment between the cover 24 and the base 26 will depend in part on the structural design of the cover 24 and the base 26 (among other factors). In the example embodiment that is illustrated in
In some embodiments, the lateral edge 22 of the housing 12 may extend into the first surface 20 and the second surface of the housing 12 to form an indentation 28 in the housing 12. It should be noted that the size and shape of the indentation 28 will depend in part on the size and shape of the closing member 14 and the overall shape of the portable computer security device 10.
As shown most clearly in
The portable computer security device 10 is attached to an object (not shown) by depressing the closing member 14 into the indentation 28. Once the object is inserted into the indentation 28, the closing member 14 is released and the flat spring 16 biases the closing member 14 back into engagement with the lateral edge 22 of the housing 12. The object is then secured within the indentation 28 by the lateral edge 22 of the housing 12 and the closing member 14.
In some embodiments, the closing member 14 includes a planar surface 30 (see
The portable computer security devices 10 described herein are readily attached to another object. The ability of the portable computer security devices 10 to be readily attached to another object makes it is easier to keep track of the portable computer security devices.
While the invention has been described in detail with respect to the specific aspects thereof, it will be appreciated that those skilled in the art, upon attaining an understanding of the foregoing, may readily conceive of alterations to, variations of, and equivalents to these aspects which fall within the spirit and scope of the present invention, which should be assessed accordingly to that of the appended claims.