The present invention relates generally to security systems, security systems for small electronic equipment or systems, and in particular to security systems for computers.
The present invention relates to anti-theft devices for deterring the theft of smaller, yet expensive pieces of equipment, particularly electronic systems. Numerous devices have been developed to assist in preventing the theft of computers and other smaller electronic equipment. Since many systems requiring security measures comprise several items, i.e. a CPU, a monitor and a printer, etc., needed security devices often utilize a cable which connects each of the components to each other and/or to a relatively immovable object such as a desk.
In recent years, most computer manufacturers regularly incorporate some attachment method for security devices. This practice began on some of the earliest computer models, wherein several different sized security slots (not shown as these slots are regularly known in the art) were designed to accept “snap-in” security attachments that would then allow a security cable to pass through that attachment. Additionally, some manufacturers have provided reversible brackets disposed within the computer chassis in order to allow the user to remove the computer cover and turn the bracket around for use with a security cable.
Moreover, other systems possess regular chassis screws that were secured by use of “screw-on” fasteners which in turn security cables were passed through, in order to prevent unscrewing the fastener and thus secure the equipment. Over years of ever evolving design changes, presently, most manufacturers of computer equipment provide a bracket designed to protrude from the chassis of the computer with a hole that a security cable can pass through, or they provide a small security slot in the exterior wall.
Many different security devices have been developed over the years to fit into this security slot. The majority of the manufacturers of these security devices for the last two decades have made a 3-piece security kit containing a scissor clip which has two opposing hooks that attach into the security slot, a security cable to attach the equipment to a desk or table, and a lock to secure them together.
Therefore, for many years there have been two main systems existing for securing computers and laptops. Specifically, there exist three piece kits (a scissor-clip, a steel cable, and a locking mechanism) and one piece kits (a steel cable with a permanently attached lock and locking method). Customers had to choose between the drawbacks of a one piece security kit (not very secure with a far weaker attachment method that can be broken off by hand, and only has the ability to secure one piece of equipment with one lock) and the drawbacks of a 3-piece kit (far more of a hassle to install, and too easy to lose the small scissor clip when not locked onto the equipment).
The instant invention, as described further herein, imparts a security system for small electronic equipment or systems. As illustrated herein, the introduced system is neither anticipated, nor rendered obvious or present in any of the prior art methods, neither alone nor in any combination thereof. A primary object of the instant invention is to provide a security system for computers.
The current system illustrates a security system for computers that seamlessly incorporates a scissor clip mechanism, a locking mechanism and joining mechanism in a manner such that the scissor clip mechanism remains attached to the cable mechanism, yet allows the joining mechanism, such as a cable or linkage as known in the art, to be user detached, in order to run the cable mechanism through other equipment or security fasteners. Therefore for the first time a customer can get the strength of the steel scissor clip, the convenience of a 1-piece kit, the versatility and economy of being able to secure multiple pieces of technology equipment with one lock, the universality of one kit to secure either a laptop or a desktop and monitor as needs change, and the ability to latch into multiple sizes and shapes of security slots and holes.
It is understood that existing security kits utilizing scissor clips, cables, and locking mechanisms can be connected together by utilizing the locking mechanisms. Normally, however, in that scenario the scissor clip must be removed from the connection in order to be inserted into the security slot of the equipment. Conversely, the instant apparatus allows for connection of the scissor clip to the cable and the locking mechanism in a way that does not require it to be disconnected to insert it into the security slot.
The scissor clip is attached to the lock in a way that will prevent it from falling off of the lock and getting lost. The scissor clip has an open position and a closed position. When the scissor clip is in the open position, it can be inserted and removed from the security slot. When the scissor clip is in the closed position it cannot be removed from the security slot. The scissor clip is attached to the lock in a way that does not prevent the scissor clip from opening or closing when the first lock action is in the unlocked position, and does prevent the scissor clip from opening when the first lock action is in the locked position. The scissor clip is also attached to the lock in a way that it cannot be removed from the lock while the first lock action is in the locked position. The cable is attached to the lock in a way that it cannot be removed when the second lock action is in the locked position, and can be removed when the second lock action is in the unlocked position.
There has thus been outlined, rather broadly, the more important features of the security device for electronic components in order that the detailed description thereof that follows may be better understood, and in order that the present contribution to the art may be better appreciated. There are additional features of the invention that will be described hereinafter and which will form the subject matter of the claims appended hereto.
In this respect, before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are used for descriptive purposes, and should not be regarded as limiting.
The following drawings are for the purpose of illustration only and are not intended to define the limits of the invention.
As illustrated in
One critical element of the present system comprises the removably attachable nature of the security cable 12 from the lock 13. This can be accomplished-by use of a key mechanism (not shown) 4-4. This is a significant improvement of the invention over existing cable locks, as it is the only “single-piece” computer lock that can also detach the security cable 12 from the lock 13 so that the security cable 12 can be used to secure multiple pieces of equipment, whether the pieces of equipment have built-in or add-on security fasteners, apertures, or slots, and then the security cable 12 can be locked back into the lock 13 by inserting it into the aperture 10 of the cable trap section 9 of the lock 13.
In general, the security cable 12 is attached at the other end to an immovable object such as a desk, beam, or pole. This attachment is accomplished by means well known in the art such as a loop on the other end of the cable, or by the use of fasteners. The lock cylinder 6 part of the lock 13 is a dual-action lock cylinder 6 so that activating the first action will release the scissor clip 7 and allow it to open and be removed from the security slot of the protected computer equipment. In this embodiment the first action is accomplished by turning the key (not shown) in one direction. The second action of the lock cylinder 6 will release the security cable 12 from the cable trap section 9 of the lock 13. In this embodiment the second action is accomplished by turning the key in the other direction.
The scissor clip mechanism 1 or 7 may be permanently or removably attached to the lock 13 as long as the scissor clip mechanism 1 or 7 cannot be moved from the closed position of
In this embodiment, the scissor clip mechanism 7 is permanently attached to the lock 13 by being installed inside of the lock 13 between the top cover 5 and the bottom cover 11. In this embodiment, the scissor clip mechanism 7 is installed beneath the lock cylinder 6 so that the cylinder can hold the scissor clip mechanism 7 in one of several ratcheting positions via a pawl 16 on the bottom of the lock cylinder 6. The preferred embodiment of the scissor clip mechanism 7 can ratchet lock into multiple positions between the fully open position of
While one embodiment of the present invention has been illustrated by way of example, it is apparent that further embodiments could be developed within the spirit and scope of the present invention. It is to be expressly understood that such modifications and adaptations are within the spirit and scope of the present invention, as set forth in the following claims.
This application takes priority from and claims the benefit of Provisional Application Ser. No. 61/204,291 filed on Jan. 6, 2009, the contents of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
3206959 | Best | Sep 1965 | A |
3643810 | Highberger | Feb 1972 | A |
3859826 | Singer et al. | Jan 1975 | A |
4003228 | Lievens et al. | Jan 1977 | A |
4004440 | Dreyer | Jan 1977 | A |
4055973 | Best | Nov 1977 | A |
4527405 | Renick et al. | Jul 1985 | A |
4680949 | Stewart | Jul 1987 | A |
4924683 | Derman | May 1990 | A |
4964286 | Poyer | Oct 1990 | A |
5502989 | Murray et al. | Apr 1996 | A |
5832754 | McKenzie | Nov 1998 | A |
5875657 | Kelley | Mar 1999 | A |
5907962 | Smithson et al. | Jun 1999 | A |
6058744 | Ling | May 2000 | A |
6105922 | Derman | Aug 2000 | A |
6257029 | Liao | Jul 2001 | B1 |
6349575 | Bentley | Feb 2002 | B1 |
6601416 | Sanders | Aug 2003 | B1 |
6918272 | Sanders | Jul 2005 | B1 |
7234326 | Lu | Jun 2007 | B1 |
7249474 | Avganim | Jul 2007 | B2 |
7302816 | Lu | Dec 2007 | B1 |
7308809 | Lu | Dec 2007 | B2 |
7549308 | Avganim | Jun 2009 | B2 |
7565824 | Gleason | Jul 2009 | B1 |
7614264 | McGettrick | Nov 2009 | B2 |
20020056295 | Huang | May 2002 | A1 |
20050178172 | McGettrick | Aug 2005 | A1 |
20050204786 | Meyer et al. | Sep 2005 | A1 |
20070271971 | Johnson | Nov 2007 | A1 |
20100180648 | Knox | Jul 2010 | A1 |
Number | Date | Country | |
---|---|---|---|
20100170304 A1 | Jul 2010 | US |
Number | Date | Country | |
---|---|---|---|
61204291 | Jan 2009 | US |