Embodiments relate generally to portable apparatus for deterring removal of an object to be protected and more specifically to a portable security device adapted to be firmly attached to a smooth surface and further adapted to send and receive alarm messages over a wireless communications network.
Laptop computers, smart phones, tablet computers, and other valuable objects may be misplaced or lost to theft. Or, portable equipment intended for use at a job site or workstation may be moved and may not be available when and where needed. Various restraint and security devices have been offered to deter theft, prevent loss, or keep equipment close to a preferred location. For example, some laptop computers, tablet computers, and other equipment are provided with a security slot adapted to receive a security connector attached to a flexible steel security cable. A pin or post extending from the security connector may be engaged with the security slot and the security cable attached to a table leg, armrest, railing, or other strong structure to deter removal of the object to be protected. Alternatively, a pin or post may be attached to the object to be protected and a receiver for the pin or post provided in the security connector on the security cable. However, a security cable may be ineffective when there is no nearby structure to which the security cable can be looped around, locked, or otherwise secured. For example, modular workstations found in some offices, libraries and airports lack legs or other structures or apertures which might be used for attachment of a security cable.
Some security cables include an audible alarm system that sounds when an attempt is made to detach the security connector from a security slot without first disarming the alarm system, possibly with a key or by entering a combination on a keypad or combination lock. Some security cables with a security connector have another connector that attaches to an alarm box secured to a wall or other fixed structure. Detaching the cable from the protected object or the connector from the alarm box may cause an audible, and possibly a visual, alarm indication from the alarm box. Such alarm indications are most useful for deterring unauthorized removal of a protected object when someone is close enough to perceive the alarm indication and takes action to prevent removal of the protected object. Security systems that depend on a stationary alarm box may not be suitable for protecting laptops and other objects that may be used or stored in locations where an alarm box is not available, for example an airport or library, and may interfere with the portability of a laptop or other personal electronic device.
An example of an apparatus embodiment includes a security module having a guard frame; a dome slidably engaged with the guard frame; and an alarm system coupled to the dome. The alarm system includes a controller and a radio frequency transceiver connected for data communication with the controller. The security module further includes a suction cup coupled to the dome; a valve in fluid communication with the suction cup and electrically connected to the controller; and a suction cup in fluid communication with the valve. The example of an apparatus embodiment further includes a client application comprising software instructions for arming the alarm system, disarming the alarm system, and opening the valve. The security module may autonomously seek and/or link with another security module, optionally forming an ad hoc communications network when communication between security modules is established.
A displacement of the dome toward a bottom surface of the guard frame extends a bottom edge of the suction cup outward from the bottom surface of the guard frame. A displacement of the dome away from the bottom surface of the guard frame retracts the suction cup into the guard frame. The valve closes when the suction cup seals against a smooth surface. The valve opens when the suction cup releases a suction grip against a smooth surface.
The controller transmits an alarm message over the transceiver when the alarm system is armed and the valve opens. The alarm system further includes a visual alarm indicator electrically connected to the controller; and an audible alarm transducer electrically connected to the controller. The controller activates the visual alarm indicator and/or the audible alarm indicator when the alarm system is armed and the valve opens. The controller may also activate the visual alarm indicator and/or the audible alarm indicator when the controller receives an alarm message from the transceiver. The alarm message received by the transceiver may have been sent by another security module, by a client application running on a client system communicating with the security module, or possibly from another communications-enabled device.
The security module further includes a voltage conversion and regulation circuit electrically connected to the controller. The voltage conversion and regulation circuit includes a secondary coil adapted to receive inductively coupled power from an inductive charger. An embodiment optionally further includes an inductive charger.
The security module may further include an optical isolator electrically connected to the controller and a solenoid driver electrically connected to the optical isolator and to the valve. The valve may open and close in response to signals sent from the controller through the optical isolator and the solenoid driver.
The controller in the security module may transmit over the transceiver an alarm message received from another security module.
The client application may include a connect activator for establishing secure communications with a selected one of the security module. The client application may include an alarm system activator for arming the alarm system and an activator for silencing an alarm. The client application may further include a local alarm message indication and a remote alarm message indication.
The security module may include a flexible security cable attached to the guard frame. The security cable may further include a security connector adapted to couple to a corresponding security slot on an object to be secured. An apparatus embodiment with a security cable may further include an adapter plate having an adhesive pad for attaching the adapter plate to an object to be protected. The adapter plate is preferably formed with a security slot adapted to receive the security connector. A security cable may include a cradle adapted for securely holding a portable electronic device such as a tablet computer or smart phone.
An apparatus in accord with an embodiment includes a security module having an alarm system, a bidirectional wireless communication interface for communicating with other security modules and with an optional client device, and an optional security cable with an optional security connector for removable attachment to an object to be protected. The security module includes a suction cup capable of holding very firmly to a smooth surface such as a table top, window, cabinet, door, or other surface capable of sustaining an airtight seal against the suction cup. The suction cup is well protected within a guard frame to discourage unauthorized removal of the security module from the surface gripped by the suction cup. The security module may activate audible and visible alarm indicators and transmit an alarm message over a wireless communications network when the security module is detached from the surface gripped by the suction cup while the alarm system is enabled. The security module may activate an alarm indicator when a wireless communications link between the security module and an object to be protected is interrupted.
A security module may exchange alarm messages and other information with a paired client device and with other security modules. The security module may establish communications with a client device over a wireless communications link, enabling operational control and monitoring of the security module from the client device, for example arming and disarming the alarm system in the security module, activating audible and visual alarm indicators, monitoring alarm system and battery status, and so on. The security module may further establish bidirectional wireless communications with other security modules operating within communication range, forming an ad hoc communication network of security modules able to exchange operational commands and status messages with each other. The ad hoc wireless communications network may optionally be implemented as a peer-to-peer network.
An alarm message generated by a security module preferably propagates to all other security modules and client devices participating in an ad hoc communications network. A security module receiving a message from the network may retransmit the message to other security modules in the network. A security module may communicate alarm and status messages, including messages originating in the security module and messages received from other security modules, with a client application on a client device paired with the security module. A security module receiving an alarm message from the network or from the client device paired with the security module may activate its own audible and visible alarm indicators. For example, the controller may activate the visual alarm indicator and/or the audible alarm indicator when the alarm system is armed and the valve coupled to the suction cup opens in response to the suction grip of the suction cup being interrupted.
The suction cup for attaching a security module to a smooth surface is coupled for fluid communication with a latching solenoid valve monitored and controlled by a controller in the security module. The controller includes a central processing unit (CPU) in data communication with a solenoid driver for selectively opening and closing the latching solenoid valve. The controller may autonomously arm the alarm system in the security module when the suction cup is compressed against a smooth surface, then inform the client device and other security modules in the network that the security system is active. Alternatively, the client application may arm the alarm system when the client device receives a status message from the security module indicating that the suction cup has been attached to a smooth surface. An armed security module is ready to indicate an alarm condition and may transmit an alarm message if the security module is removed from the surface to which it is attached. For example, an alarm message may be transmitted by the controller over the wireless communications link when the valve opens after the alarm system is armed, the open valve indicating the suction cup is not holding against a surface with a suction grip.
Alarm messages may be transmitted by an armed security module for other reasons including, but not limited to, interruption of a wireless communications link between the security module and an object being protected, an alarm message originating from a paired client device, and an alarm message received from the network and originating from a client device paired with another security module in the ad hoc network. The CPU in the security module may disarm the alarm system and open the valve to release the suction cup's grip from a smooth surface in response to a message sent over the wireless communication link from the client device paired with the security module. Embodiments preferably resist attempts from any unpaired device to disarm the alarm system, inactivate the wireless link to the protected device, and/or release the suction cup's grip on a surface.
A security system in accord with an embodiment provides a means for social cooperation in deterring theft or loss of protected objects in places such as airports, restaurants, convention facilities, hospitals, classrooms, factories, office buildings, and other places where there may be a risk of theft or loss of a valuable object. When a security module issues an alarm message and generates audible and visible alarm indicators that are repeated by other security modules within communication range, persons nearby may naturally look around to locate the source of the alarm and may inform others of an attempt to remove a protected object, query persons near a source of a visible and/or audible alarm indication, contact security or law enforcement personnel, or take other action to prevent theft or loss of a protected object. Safety and security may be enhanced without any person interacting with any other nearby person until an alarm message is generated by a security system embodiment, possibly preventing loss, removal, misplacement, or theft of objects protected by a security system embodiment.
In the example of
In
The optional security cable 104 in the example of
A security module 102 may pair with a designated client device 212 over the wireless communications link 106. As used herein, a paired connection is a communications channel between two authorized devices. A paired connection preferably resists communications from unpaired devices. Wireless communication links (106A, 106B, 106C) are preferably encrypted and may not be responsive to signals from unpaired devices. In the example of
The security module 102A may autonomously seek other security modules within communication range of the transceiver to form an ad hoc communications network 230 between security modules 102. Alternatively, the client device 212A paired with the security module 102A may command the security module to initiate a search for other security modules, or the client device 212A may instead prevent its paired security module 102A from seeking other security modules if so desired by a person using the client device and protected device. Some functions performed by a security module, for example arming and disarming an alarm system in the module, modifying a pairing relationship, and possibly other actions and operations, are preferably directed from a paired client device or may be initiated by a controller within a selected security module, but not by other unauthorized and/or unpaired devices.
An ad hoc network 230 may be established by the security module 102A with another security module 102B. The second security module 102B may optionally be paired with another client device 212B represented in the example of
The example of an optional security cable 104 in
An aperture 124 formed in the suction cup 118 aligns with a corresponding aperture formed in the retaining plate 126, providing a fluid path for air to vent in and out of the suction cup when the suction cup is compressed against a smooth surface, for example by pressing a hand against the exterior surface of the dome with the bottom plate 112 resting against the surface. A latching valve inside the dome closes the fluid path between the suction cup and the atmosphere after the suction cup is compressed against the smooth surface, preventing air from leaking into a space formed between the compressed suction cup and smooth surface and enabling the suction cup to grip the smooth surface. Opening the valve exposes the fluid path to atmospheric pressure, allowing air to enter the space between the compressed suction cup and the smooth surface and releasing the suction cup's grip on the surface.
More details of an example of a security module 102 are visible in the cross-sectional view A-A in
The suction cup and other moving parts of the security module are preferably made from materials capable of withstanding many hundreds of cycles of attachment to and detachment from smooth surfaces. The suction cup 118 may be formed with a diameter across its outer edge 120 large enough to hold the security module against a smooth surface with sufficient force to deter efforts by an adult male with average hand grip strength to detach the security module from the surface without the use of a lever or other tool. For example, a suction cup with an outer edge 120 diameter of about 1.5 inches may be calculated to withstand a pull normal to a smooth surface to which the suction cup is attached of about 25 pounds force before the suction cup releases from the surface. Doubling the outer edge diameter 120 from 1.5 inches to 3 inches raises the force needed to overcome the suction cup's grip by the square of the increase in radius, to over 100 pounds force. As suggested by these calculated force values, even a relatively small suction cup may be very effective in deterring removal of a security module from a smooth surface, especially when the dome and guard ring of the security module are smooth and slippery to interfere with a firm hand grip on the dome. In some embodiments, the outer edge diameter 120 of the suction cup is about 3 inches, although alternative embodiments may be made with a suction cup outer edge diameter value in a range from about 1 inch to about 6 inches.
Returning to the example of
In some embodiments, a secondary coil 128 for an optional inductive charger may be attached to the dome near the dome's bottom edge 150, moving up and down with the dome relative to the dome ring and bottom plate. As suggested in
The dome 108 may optionally be formed from a material that is partially transparent to visible light frequencies, permitting light emitted from the visual alarm indicator 138 to illuminate the interior surface of the dome and to be visible from outside the dome. Examples of a visual alarm indicator include, but are not limited to, an incandescent lamp, a fluorescent lamp, a light emitting diode (LED), and an electroluminescent (EL) panel. The visual alarm indicator may optionally emit pulses of light, with different pulse patterns corresponding to different alarm conditions, or alternatively different colors of light, with a selected color assigned to each alarm or other status condition. For example, a dome illuminated by a flashing red light may indicate an alarm condition corresponding to a security module having been pulled from a smooth surface after the suction cup established a suction grip against the surface and the security system was armed. A different red flashing pattern may indicated an alarm message for another security module in the vicinity has been received. A green-illuminated dome may indicate an armed or standby state. Different combinations of color and flashing pattern may optionally be used to represent different status and alarm conditions and may further distinguish a security module originating an alarm signal from a security module repeating an alarm signal received from another security module.
An optional pressure sensor in fluid communication with the suction cup may detect when the suction cup has established a suction grip against a smooth surface. The controller may receive an electrical signal from the pressure sensor to determine when the suction cup has established a suction grip against a surface and to determine when the suction cup has released its suction grip.
Some embodiments 100 include an inductive charger 154. The secondary coil 128 for receiving energy from the charger may be coupled to the dome, for example near the interior surface of the dome and above an inner bottom surface 210 of the bottom plate 114 as suggested in
The optional inductive charger couples electrical power into the controller power supply 144 and the solenoid power supply 146. An example of an inductive charger is shown in a view toward a top surface of the charger 154 in
The controller 142 is a combination of hardware devices performing monitoring and control functions related to operation and status of the latching valve 134. The controller 142 is part of the circuit card assembly 132 shown in the examples of
The controller 142 sends and receives alarm messages and other data and commands representative of status of the security module 102 and possibly other security modules within communication range of a radio frequency transceiver 190 in the security module 102. The radio frequency transceiver 190 is electrically connected to an antenna 192 for sending and receiving radio frequency signals from transceivers in other devices
The controller 142 may receive a valve status signal 216 following an interrupt signal from the solenoid driver 184. For example, the latching valve 134 may close automatically when the suction cup 118 is compressed against a smooth surface, and the solenoid driver may signal the closed status of the valve to the controller. Or, the controller 142 may poll the solenoid driver 184 to request the status of the latching valve 134 after the controller commands the latching valve to either close or open. The controller may optionally command the latching valve to either close or open by transmitting a corresponding valve command 216 to the solenoid driver 184 in response to a related command received through the radio frequency transceiver 190 from a client device paired with the security module 102.
The controller 142 may receive electrical power from a power distribution bus 170 electrically connected to a controller power supply 174. The controller power supply 174 receives electrical power from a voltage conversion and regulation circuit 172 over a charging line 176. The voltage conversion and regulation circuit 172 may optionally be electrically connected to the secondary coil 128 in the security module 102. The secondary coil 128 may receive inductively coupled electrical energy from a primary coil 156 in the inductive charger 154 when the security module 102 and inductive charger 156 are in close physical proximity to one another. The voltage conversion and regulation circuit 172 also provides electrical power to the optional solenoid power supply 178 over another charging line 180. The voltage conversion and regulation circuit may be electrically connected to a charging connector 236 for receiving electrical power over at least two electrical conductors 238 from an external electrical power source. Examples of a charging connector include, but are not limited to, a USB-A connector, a USB-B connector, a micro USB-A connector, a micro USB-B connector, a USB mini connector, or another electrical connector having at least two conductors for carrying electrical power. When an embodiment is used to protect a device with USB ports such as a laptop computer, the charging connector may be connected by an electrical cable to a USB port to provide electrical power to the security module 102.
An embodiment of a security system 100 optionally includes a client application comprising software instructions and data stored in a nonvolatile memory in a client device. Examples of features and operations performed by a client application are shown in the examples of a client application for a smart phone 300 in
As used herein, an activator refers to a device for producing a selection indication when the activator is selected by a person. Examples of an activator include, but are not limited to, a keypad on a keyboard, smart phone, or similar device, a touch target on a touch-active display, for example a liquid crystal display with a capacitive touch overlay, a resistive touch overlay, a surface acoustic wave sensor, or an infrared touch input system, a re-assignable or “special function” key on a keypad, keyboard, or computer display, or a designated alphanumeric key on a keypad or keyboard.
Continuing with
After a client device and a security module are paired with one another, the client application 232 may optionally present a choice to arm or disarm an alarm system in a security module to establish protection of a tethered object. The alarm system may be turned on or off at the discretion of a person using the client device 212 by selecting one or more activators 200, as in
Some examples of a security module may include an optional security cable 104 attached to a cradle 214 for securely holding a personal electronic device such as a smart phone 300 or a tablet computer. Alternatively, the cradle 214 may be provided with a security slot like those found on many laptop computers, and the cradle connected to a security module by a cable with a security connector, for example the security connector from the example of
Some objects to be protected by tethering to a security module may not include a security slot for receiving a security connector on a security cable.
Unless expressly stated otherwise herein, ordinary terms have their corresponding ordinary meanings within the respective contexts of their presentations, and ordinary terms of art have their corresponding regular meanings.
This application claims the benefit of U.S. Provisional Patent Application No. 62/133,980, filed Mar. 16, 2015, incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
62133980 | Mar 2015 | US |