Not Applicable.
Not Applicable.
Not Applicable.
The present invention relates to security systems for portable electronic devices. More particularly, the present invention relates to prevention of unauthorized physical and electrical access to portable communication devices such as cell phones and tablets.
Recent discoveries relating to the scope of electronic surveillance by the National Security Agency have given rise to growing concern for privacy especially in communication via personal electronics. Many people believe that technologies exist to enable remote activation of a cell phone without the user's knowledge or permission. As a result, an unauthorized party might intercept data streams or gain access to private and personal data stored on the phone. These concerns raise issues surrounding each individual's right to privacy and potential violation of the Fourth Amendment dealing with search and seizure. In particular, there have been several recent investigations into the use of a controversial electronic surveillance device, generally known as a STINGRAY. The STINGRAY is used for remotely capturing data from mobile telephones. It mimics a cell tower so all mobile phones in the area communicate with it and provide information, including location data. Purportedly, the STINGRAY is capable of obtaining this data even when the mobile phone is not being used to make a call.
In addition to public concerns, the judicial system, law enforcement and various government agencies, including the U.S. Department of Homeland Security, would benefit from an apparatus capable of enabling secure transportation of a cell phone for maintenance of forensic evidence. For example, if a police officer seizes a cell phone during a traffic stop or other action, it is in the interest of the judicial system to prevent data alteration or deletion from the cell phone. If the cell phone is not segregated from cell phone communications signals, the owner of the cell phone can remotely lock or remotely delete data from the cell phone. To lock a cell phone, delete data, alter data or wipe data, a user causes a command to be sent to the cell phone from another connected device or computer.
Law enforcement must deal with ensuring that proper procedures are followed whenever acquiring any evidence, including cell phones, which can have large amounts of data stored on the phone. Clearly, a law enforcement officer is motivated to ensure that he or she is not accused of improper handling or tampering of a seized cell phone. Likewise, law enforcement's forensic examiners prefer that a seized cell phone be delivered in its original state. Hence, such examiners would benefit from a solution to mitigate data deletion, tampering, and corruption while a cell phone is in custody of law enforcement.
Consequently, a need exists for an apparatus to secure electronic devices to both maintain a device's original state and to prevent data deletion, tampering, or corruption, particularly when the device has been acquired or seized during the course of a law enforcement or other government action.
In view of the foregoing described needs, an embodiment of the present invention is an apparatus comprising a portable, lockable enclosure that prevents physical and electrical signal access to an electronic device, such as a cell phone. Although illustrated herein as providing physical and electronic security of a typical cell phone, such as an iPhone, the apparatus is scalable to accommodate other electronic devices, including laptops, tablets, hard drives, Global Positioning System (GPS) location devices, and music players, among others. For simplicity and clarity, we herein refer to the above-described types of devices as simply “electronic devices” or “devices”.
The apparatus, hereinafter a secure shell, comprises a case and lid which, when closed, serves as a physical enclosure and Faraday cage to prevent both physical and electronic signal access to a device. In various embodiments, the secure shell includes other features to support cooling and charging of an enclosed device.
When a communication device such as a cell phone is radio-isolated, the device will consume battery life more quickly while repeatedly attempting to acquire a signal. In a second embodiment, the apparatus includes means for charging a device to ensure that the device maintain its original power and data state without compromising Faraday cage protection. Means for charging include an inductive charging mat, a separate power connector deployed within the case, and a supplemental battery incorporated as a module within the case. Where a power cord is required, Faraday cage protection is maintained by use of a signal-resistant port. The signal-resistant port is configured such that electrical power is transmitted internally but external electromagnetic and radio frequency signals are blocked from reaching the antenna of the enclosed device. Either a power outlet or an external battery may be used to provide power to the device from an external source.
In another version, means for dissipating heat is provided as a feature of the apparatus. Heat dissipation ensures that the temperature of an enclosed device is maintained in a desired operational range. Heat may be generated either via the device itself, or, for example, by leaving the secure shell with the device in a hot environment such as the interior of a car. Heat dissipation is important to avoid higher temperatures that might cause the device to be permanently damaged or data on the device to be corrupted.
In one configuration, heat dissipation is provided via heat conductive heat transfer from the interior of the case to a heat sink, where the heat is radiated out of the interior of the case. In another configuration, heat dissipation occurs via the use of a phase change pad located in the interior of the case or adjacent the exterior of the case. The phase change pad reduces temperature by conversion of a solid cooling material in the pad to a gel or liquid. In another configuration, the phase change pad and heat sink may be used cooperatively to dissipate heat.
For physical security, the case includes a lock. In one configuration, the lock is a combination lock. Additionally, other access barriers, such as biometric identification, e.g., a fingerprint, may be incorporated as a requirement for unlocking and opening the shell.
These and other features, aspects and advantages of various embodiments of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where:
One object is to provide a physical security system for portable communication devices such as cell phones, smart phones, and other handheld or portable data devices.
Another object is to provide a secure enclosure to prevent electronic tampering with a device caused by application of an external electrical field or signal.
Another object is to provide a secure enclosure having an integral charging system to allow a device to maintain its original state while in the enclosure.
Another object is to provide a secure enclosure that prevents overheating of a device while the device is within the enclosure.
Another object is to provide a secure enclosure having an environmental barrier and internal cushioning to minimize damage to a device enclosed in the case while in transit or exposed to the environment.
The following description is merely exemplary in nature and is in no way intended to limit the invention, its application, or its uses. Before the inventive subject matter is described in further detail, it is to be understood that the invention is not limited to the particular aspects described, as such may, of course, vary. It is also to be understood that the terminology used herein is for describing particular aspects only, and is not intended to be limiting, since the scope of the present invention will be limited only by the appended claims.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this inventive subject matter belongs. Although any methods and materials similar or equivalent to those described herein can also be used in the practice or testing of the inventive subject matter, a limited number of the exemplary methods and materials are described herein.
It must be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise.
The case 20 in combination with lid 30 provides a complete Faraday cage and physical barrier to prevent physical and wireless signal access to the device C when the lid 30 of the shell 10 is closed. The case 20 and lid 30 of the shell 10 are sized to enclose an entire device C.
In use, the device C sits inside the shell 10. For exemplary purposes, the invention described herein is shown as housing an APPLE IPHONE, a well-known cell phone. However, the secure shell 10 is scalable in size and adaptable in shape to support any phone capable of wireless communication. In addition, the secure shell 10 may be adapted to house any electronic device capable of wireless communication, such as a tablet computer, GPS device, or laptop computer.
Now referring to
Now referring to
The locking mechanism 40 is a combination lock having rotatable discs 42 and a sliding release button 43 to release the latch 50. Cover plate 53 provides access to internal components of the latch 50. The cover plate 53 is attached to front face 22 via four lock screws 12.
When the secure shell 10 is closed, the case 20 in conjunction with lid 30 provide a physical access barrier and electronic and radio frequency signal barrier. To ensure appropriate Faraday properties, the case 20 and lid 30 are made of appropriate conductive materials to provide the Faraday effect when the secure shell 10 is closed. Appropriate conductive materials include, among others, conductive metals such as nickel, copper, gold, silver, titanium and aluminum; conductive fibers impregnated with any of the conductive metals or carbon.
A Faraday cage, also known as a Faraday shield, is an enclosure that prevents external electromagnetic and radio frequency interference with any object placed inside the enclosure. A Faraday cage may be formed from a conductive material, a mesh of conductive material, a foundational mesh impregnated with conductive material, or a combination of these. The
Faraday cage construct ensures that electrical charges applied to the secure shell 10 remain on the exterior of the secure shell 10 and do not create an electric field within the interior cavity 23 of the secure shell 10.
In one version, the Faraday cage effect is produced by using appropriate conductive material to form the case 20 and lid 30. In another version, the Faraday cage is produced by embedding or layering a conductive mesh within or outside the case 20 and lid 30. The grid spacing of the mesh is such that it produces the effect of a Faraday cage and blocks all external electrical fields.
In another version, the case 20 and lid 30 are made of transparent material, such as plastic or glass, wherein a conductive mesh is sandwiched within the plastic or glass. In another configuration, the lid 30 is made from toughened glass, such as CORNING GORILLA GLASS, wherein the toughened glass has been modified to include a sandwiched conductive layer with contact points to provide a complete Faraday cage effect.
Where transparent material is used for the case 20 or lid 30, a user may visually confirm the contents of the secure shell 10 without opening the lid 30, thereby avoiding exposure of the device C to external electromagnetic signals.
Referring to
In another version, (not shown herein) the locking mechanism 40 may include an electronic biometric lock, able to recognize certain unique physical characteristics of a user, such as a fingerprint, hand print, retina pattern, or voice. When there is a match between the data entered by the user and the stored data on the secure shell 10, the locking mechanism 40 releases the latch 50 to open the lid 30.
Now referring to
Now referring to
Referring to
Now referring to
Secure shell 10 is shaped as an essentially rectangular box wherein the case 20 is comprised of a front face 22, a rear face 24, and two sides 26, all of which extend vertically from the bottom face 27 to form an interior cavity 23. The interior cavity 23 is bounded about its perimeter by an upper surface 21 having an outer perimeter edge 25. The interior cavity 23 is sized to receive and engulf a device C. In other embodiments, the secure shell 10 may be shaped and sized differently to fit various other types of devices.
Lid 30 is sized to fit within the outer perimeter edge 25 of the upper surface 21 when the secure shell 10 is closed. Lid 30 includes hinge pins 32 that extend from a rear edge 33 to be slidably and rotatably received in receptor channels 36. Receptor channels 36 are secured to the case 20 using lock screws 12. Lid 30 includes a tongue 38 located at a front edge 39 of the lid 30 for locking engagement with a lip 54 of the latch 50.
With the lid 30 open, hinge pins 32 engaged within the receptor channels 36 allow the back edge 33 of the lid 30 to slide down adjacent the bottom face 27 of the secure shell 10. The receptor channels 36 are secured to the rear face 24 of the case 20 by lock screws 12. The lock screws 12 used throughout the case 20 are preferably threadably engaged along with the application of a film that prevents the lock screws 12 from being removed once the case 20 is assembled.
When the lid 30 is moved fully through the receptor channels 36, the lid 30 is rotatable on the hinge pins 32 such that the lid 30 may be swung about and under the bottom face 27 to be tucked away against the bottom face 27, thereby providing access to the interior cavity 23 of the secure shell 10.
When the lid 30 is in a closed position, the lid 30 compresses the O-ring gasket 60 to create a tight seal while the under face 35 of the lid 30 creates a conductive contact with upper surface 21 of the case 20, thus enabling the Faraday cage properties. In various configurations, the under face 35 of the lid 30 can include a contact ridge whose height is lower than the extended height of the O-ring gasket 60 before compression during closing. Thus, the O-ring gasket 60 is compressed until the contact ridge touches the outer perimeter edge 25. To ensure adequate sealing and sufficient surface contact, proper tolerance is required between the tongue 38 of the lid 30 and the lip 54 of the latch 50 when closed.
Now referring to
Now referring to
Referring now to
Referring now to
Now, still referring to
In another version, not shown herein, a supplemental battery is placed inside the shell 10 to extend the battery life of the device C while enclosed in the secure shell 100. In one version, the supplemental battery is placed in the same location as the inductive charging mat 200. The supplemental battery delivers its power to the device C via the same power connector 174 used to provide external power via the power cord 170.
Now, means for dissipating heat from the secure shell 100 and enclosed device C is described. In one version, shown in
In another version, shown in
In other versions, both a phase change layer 300 and a conductive heat transfer layer 400 may be used in combination to enhance cooling of the secure shell 100 and its enclosed device C.
The present invention has been particularly shown and described with respect to certain preferred embodiments and features thereof. However, it should be readily apparent to those of ordinary skill in the art that various changes and modifications in form and detail may be made without departing from the spirit and scope of the inventions as set forth in the appended claims. The inventions illustratively disclosed herein may be practiced without any element which is not specifically disclosed herein.
This application claims the benefit of U.S. Provisional Application No. 62/034,719, filed Aug. 7, 2014.
Number | Date | Country | |
---|---|---|---|
62034719 | Aug 2014 | US |