EP3243160A1 - Privatsphären- und sicherheitssysteme und verfahren zur verwendung - Google Patents
Privatsphären- und sicherheitssysteme und verfahren zur verwendungInfo
- Publication number
- EP3243160A1 EP3243160A1 EP15877281.4A EP15877281A EP3243160A1 EP 3243160 A1 EP3243160 A1 EP 3243160A1 EP 15877281 A EP15877281 A EP 15877281A EP 3243160 A1 EP3243160 A1 EP 3243160A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- privacy
- security enclosure
- security
- enclosure
- illustrates
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2200/00—Indexing scheme relating to G06F1/04 - G06F1/32
- G06F2200/16—Indexing scheme relating to G06F1/16 - G06F1/18
- G06F2200/163—Indexing scheme relating to constructional details of the computer
- G06F2200/1633—Protecting arrangement for the entire housing of the computer
Definitions
- devices can record audio and visual information from their environment, process the data either locally or remotely (e.g., "cloud” storage and/or processing) for audio and video transfer directly to a user, or to virtually anywhere in the world capable of receiving a wireless and/or intemet service.
- Some embodiments include a privacy/security apparatus for a portable communication device comprising a housing assembly configured to at least partially attenuate at least one of sound energy, acoustic energy, and electromagnetic energy including light, optical, and IR energy and RF radiation from passing through the housing assembly.
- the housing assembly comprises a Faraday cage comprising two or more portions, and at least one protective shell coupled to or forming at least one aperture.
- the at least one aperture is configured and arranged to at least partially enclose the portable communication device so that at least a portion of the portable communication device is positioned within at least one portion of the Faraday cage, and the at least one seal coupled or integrated with the protective shell.
- Some embodiments include a privacy/security apparatus where the housing assembly includes an articulating assembly configured and arranged to articulate a portion of the housing assembly to one or more positions to enable a user to insert or enclose and remove the portable communication device.
- the housing assembly includes a sliding assembly configured and arranged to slide a portion of the housing assembly to one or more positions to enable a user to insert, enclose or remove the portable communication device.
- the housing assembly includes at least one active acoustic jamming or passive acoustic attenuation element.
- housing assembly is configured and arranged to be movable between an open and a closed position to enable a user to insert or enclose and remove the portable communication device.
- the housing assembly comprises a sheath.
- the housing assembly comprises a hood assembly and a base assembly.
- the base assembly includes a Faraday base assembly forming at least one of the portions of the Faraday cage.
- the at least one seal comprises an environmental seal. In some further embodiments, the at least one seal comprises an RF seal. In some embodiments, the at least one seal comprises at least one of a magnetic seal, an electromagnetic seal, an acoustic seal, and an optical seal. In some embodiments, the at least one seal comprises a fingerstock element. In some further embodiments, the seal includes at least one elastomeric element positioned adjacent to the fingerstock. In some embodiments of the invention, the at least one elastomeric element is positioned within at least a portion of the fingerstock.
- Some embodiments of the invention include a housing assembly that includes at least one port configured to couple with the portable communication device.
- the at least one port comprises at least one of a sound transfer port, an RF transfer port, a data transfer port, a power transfer port, and an optical port.
- the at least one protective shell includes a decorative layer or region.
- the decorative layer or region comprises at least one of a patterned surface, a window, a display, an emblem, and a logo.
- the housing assembly includes at least one controller configured and arranged to modulate at least one privacy/security setting.
- the at least one privacy/security setting includes a setting that alters the magnitude of energy reaching the portable communication device through the housing assembly.
- the energy comprises at least one of sound energy, RF energy, electrical energy, electromagnetic energy, and optical and/or IR energy.
- the housing assembly includes at least one microphone.
- the housing assembly includes at least one speaker or sound generator.
- the housing assembly includes at least one compression seal configured and arranged to couple with at least one of a microphone, a speaker, a camera, a display, a sensor, and an RF antenna of the portable communication device.
- Some embodiments of the invention include a housing assembly that includes active acoustic protection.
- the active acoustic protection comprises a random noise generator generating a signal which is acoustically delivered to at least one microphone of the portable communication device.
- the housing assembly includes at least one DC pass- through configured and arranged to pass direct current through the Faraday cage. In some further embodiments, the housing assembly includes an onboard power supply.
- Some embodiments of the invention include a privacy/security apparatus where the movement of the hood assembly results in the covering of all of the portable communications device's microphones and cameras in a closed position, and the uncovering of all of the portable communications device's microphones and cameras in an open position.
- FIG. 1 is a perspective view of a partially open privacy/security enclosure according to one embodiment of the invention.
- FIG. 2 is a perspective view of an open privacy/security enclosure according to one embodiment of the invention.
- FIG. 3 is a partial cross-sectional view of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 4 shows a cross-sectional view of passive acoustical attenuation technology according to at least one embodiment of the invention.
- FIG. 5 shows an assembly view of passive acoustical attenuation technology according to at least one embodiment of the invention.
- FIGS. 6A and 6C shows an assembly view of passive acoustical attenuation technology according to at least one embodiment of the invention.
- FIGS. 6B, 7A, 7B, 7C, and 7D show perspective views of passive acoustical attenuation technology according to at least one embodiment of the invention.
- FIGS. 8A, 8B, 9A, 9B, and 9C show perspective views of active acoustical attenuation technology according to at least one embodiment of the invention.
- FIG. 10 illustrates a perspective view of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 1 1 illustrates a perspective view of a privacy/security enclosure according to another embodiment of the invention.
- FIG. 12 illustrates a perspective view of a privacy/security enclosure according to a further embodiment of the invention.
- FIG. 13 illustrates a perspective view of a privacy/security enclosure adjacent to smart phone according to one embodiment of the invention.
- FIG. 14 illustrates a perspective view of a privacy/security enclosure adjacent to smart phone according to one embodiment of the invention.
- FIG. 15 illustrates a perspective view of a privacy/security enclosure adjacent to smart phone according to one embodiment of the invention.
- FIG. 16 is a perspective view of an open privacy/security enclosure according to one embodiment of the invention.
- FIG. 17 is a cross-sectional view of a privacy/security enclosure lid portion of FIG. 16 according to one embodiment of the invention.
- FIG. 18 is a perspective view of an open privacy/security enclosure according to another embodiment of the invention.
- FIG. 19 is a cross-sectional view of a privacy/security enclosure lid portion of FIG. 18 according to one embodiment of the invention
- FIG. 20A is a cross-section view through region A of the privacy/security enclosure of FIG. 2 according to one embodiment of the invention.
- FIG. 20B is a perspective view of ring seal for use in a privacy/security enclosure according to one embodiment of the invention.
- FIG. 21 is a perspective view of a privacy/security enclosure according to another embodiment of the invention.
- FIG. 22 is a perspective view of a privacy/security enclosure according to another embodiment of the invention.
- FIGS. 23A, 23B, 23C, 24A, 24B, 25A, 25B, 25C, 25D, 26A, 26B, 27A, 27B, 28A, and 28B illustrate active RF attenuating privacy/security enclosure devices in accordance with some embodiments of the invention.
- FIGS. 29, 30A-30B, 31, and 33A-33B illustrate active acoustical attenuating privacy/security enclosure devices in accordance with some embodiments of the invention.
- FIGS. 34A-34D depict assembly and perspective views of a sock assembly and components for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 35 depicts the sock assembly of FIGS. 34A-34C within a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 36 depicts another embodiment of a sock assembly within a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 37A-37C depicts a gel-piston assembly for acoustical control within a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 38A-38C depict a cover actuated acoustical control assembly in accordance with some embodiments of the invention.
- FIGS. 39A-C show different views of a mechanized foldable sock assembly for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 40A-40C depict a mechanized foldable sock assembly for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 41 illustrates an internal/external antenna design for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 42 illustrates an internal/external antenna design for a privacy/security enclosure including an internal antenna ground plane connected to the shield box in accordance with some embodiments of the invention.
- FIG. 43 illustrates an internal/external antenna design for a privacy/security enclosure including an internal and external antenna ground plane connected to the shield box in accordance with some embodiments of the invention.
- FIG. 44 illustrates a front perspective view of a privacy/security enclosure in a closed position in accordance with some embodiments of the invention.
- FIG. 45 illustrates a rear perspective view of a privacy/security enclosure in a closed position in accordance with some embodiments of the invention.
- FIG. 46 illustrates a front perspective view of a privacy/security enclosure in a partially open position in accordance with some embodiments of the invention.
- FIG. 47 illustrates a rear perspective view of a privacy/security enclosure in an open position in accordance with some embodiments of the invention.
- FIG. 48 illustrates a perspective view of a sock assembly for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 49 illustrates a perspective view of a sock assembly for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 50 illustrates a rear perspective view of a sock assembly for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 51 illustrates a top view of a sock assembly for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 52 illustrates a cross-sectional view of a sock assembly for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 53 illustrates an exploded assembly view of a sock assembly for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 54 illustrates a cross-sectional view of a privacy/security enclosure showing gasket seals according to one embodiment of the invention.
- FIGS 55A-55C illustrate views of a privacy/security enclosure lid with a U- channel gasket according to another embodiment of the invention.
- FIG. 56 illustrates a perspective view of a privacy/security enclosure with mesh fabric gaskets according to a further embodiment of the invention.
- FIGS. 57A-57B illustrate a perspective view of a privacy/security enclosure with mesh fabric gaskets according to a further embodiment of the invention.
- FIG. 58 illustrates a cross-sectional view of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 59 illustrates a cross-sectional view of an edge of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 60A shows a perspective view of a portion of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 60B shows a cross-sectional view of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 60C shows a cross-sectional view of an edge of the privacy/security enclosure shown in FIGS. 60A-60B according to one embodiment of the invention.
- FIG. 61A illustrates a cross-sectional view of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 6 IB illustrates a cross-sectional perspective view of a privacy/security enclosure according to one embodiment of the invention.
- FIGS. 61C-61F illustrate various alternative embodiments of gasket seals for a privacy/security enclosure according to one embodiment of the invention.
- FIGS. 62A-62F illustrate various views of a privacy/security enclosure in progressive stages of opening and device insertion or removal according to one embodiment of the invention.
- FIG. 63A illustrates a perspective view of a closed privacy/security enclosure according to one embodiment of the invention.
- FIG. 63B illustrates a cross-sectional view of the privacy/security enclosure of FIG. 63 A according to one embodiment of the invention.
- FIG. 63C illustrates the privacy/security enclosure of FIG. 63A in an open configuration according to one embodiment of the invention.
- FIG. 63D illustrates a cross-sectional view of the privacy/security enclosure of FIG. 63 C according to one embodiment of the invention.
- FIGS. 64A illustrates an assembly view of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 64B illustrates a base shell assembly view of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 64C illustrates a hood sub-assembly view of a privacy/security enclosure according to one embodiment of the invention.
- FIGS. 65A-65E depict various views of a privacy/security enclosure in use according to one embodiment of the invention.
- FIGS. 66A-66C depict various views of a privacy/security enclosure in use according to one embodiment of the invention.
- FIGS. 67A-67F depict various views of a privacy/security enclosure in use according to one embodiment of the invention.
- FIG. 68 shows a privacy/security enclosure according to another embodiment of the invention.
- FIG. 69 shows a privacy/security enclosure according to another embodiment of the invention.
- FIG. 70 shows a privacy/security enclosure according to another embodiment of the invention.
- FIGS. 71A-71D show privacy/security enclosures according to various embodiments of the invention.
- FIGS. 72A-72D depict a privacy/security enclosure in use in accordance with some embodiments of the invention.
- FIGS. 73A-73C depict a privacy/security enclosure in use in accordance with some embodiments of the invention.
- FIGS. 74A-74D depict a privacy/security enclosure in use in accordance with some embodiments of the invention.
- FIGS. 75A-75F depict a privacy/security enclosure in use in accordance with some embodiments of the invention.
- FIGS. 76A-76D depict a privacy/security enclosure in use in accordance with some embodiments of the invention.
- FIGS. 77A-77C depict a privacy/security enclosure in use in accordance with some embodiments of the invention.
- FIGS. 78A-78C depict a privacy/security enclosure in use in accordance with some embodiments of the invention.
- FIGS. 79A-79C depict a privacy/security enclosure in use in accordance with some embodiments of the invention.
- FIGS. 80A-80F illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIG. 81A-81D illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 82A-82D illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 83A-83D illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 84A-84D illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 85A-85C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 86A-86D illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 87A-87E illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 88A-88C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 89A-89E illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 90A-90F illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 91A-91C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 92A-92E illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 93A-93C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 94A-94D illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 95A-95C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 96A-96B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 97A-97C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 98A-98B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 99A-99C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. lOOA-lOOC illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 101A-101C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 102A-102C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 103A-103B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 104A-104B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 105A-105C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 106A-106C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 107A-107D illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 108A-108C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 109A-109C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 1 10A-110C illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 1 11A-11 1B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 1 12A-112B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 1 13A-113B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 1 14A-114B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 1 15A-115B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 1 16A-116B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIGS. 1 17A-117B illustrate various views of a privacy/security enclosure according to at least one embodiment of the invention.
- FIG. 1 18 depicts a microphone blocking assembly according to one embodiment of the invention.
- FIG. 1 19 depicts a microphone blocking assembly according to one embodiment of the invention.
- FIG. 120 depicts a microphone blocking assembly according to one embodiment of the invention.
- FIG. 121 depicts a microphone blocking assembly according to one embodiment of the invention.
- FIG. 122 depicts a microphone blocking assembly according to one embodiment of the invention.
- FIGS. 123A-123C depict views of a microphone blocking assembly according to one embodiment of the invention.
- FIGS. 124A-124B depict views of a microphone blocking assembly according to one embodiment of the invention.
- FIGS. 125A-125G depict privacy/security enclosure housing cross-sections according to one embodiment of the invention.
- FIGS. 126A-126C depict various views of a privacy/security enclosure housing according to one embodiment of the invention.
- FIGS. 127A-127D illustrate user device insertion and positioning into a privacy/security enclosure according to one embodiment of the invention.
- FIGS. 128A-128H illustrate cross-sectional detail views of privacy/security enclosure housing gasket seals according to one embodiment of the invention.
- FIG. 129 illustrates a perspective view of a privacy/security enclosure including a partial cutaway interior view showing RF gaskets according to some embodiments of the invention.
- FIG. 130 illustrates an interior view from line 2 of FIG. 129 according to some embodiments of the invention.
- FIG. 131 illustrates a cross-sectional view of the privacy/security enclosure of FIG. 129 through cut line 3 of FIG. 130 according to some embodiments of the invention.
- FIG. 132 illustrates a fingerstock according to some embodiments of the invention.
- FIG. 133 illustrates a close up cross-sectional view of the privacy/security enclosure of FIG. 129 through cut line 5 of FIG. 131 showing a dual fingerstock and base gasket according to some embodiments of the invention.
- FIG. 134 illustrates an example of the view of FIG. 133 including a single fingerstock and base gasket according to some embodiments of the invention.
- FIG. 135 illustrates an assembly view of FIG. 133 depicting insertion of a lid insertion onto the base of a privacy/security enclosure with the lid comprising fingerstock grooves according to some embodiments of the invention.
- FIG. 136 illustrates the assembled view of FIG. 135 according to some embodiments of the invention.
- FIG. 137 illustrates a compound gasket assembly according to some embodiments of the invention.
- FIG. 138 illustrates a cross sectional view of a compound gasket assembly according to some embodiments of the invention.
- FIG. 139 illustrates a rear view of a compound gasket assembly according to one embodiment of the invention.
- FIG. 140 illustrates a front view of a compound gasket assembly according to one embodiment of the invention.
- FIG. 141 illustrates an example of the view of FIG. 133 including a dual fingerstocks (of FIG. 138) and base gasket according to some embodiments of the invention.
- FIG. 142 illustrates an example of the view of FIG. 133 including a dual fingerstocks and base gasket according to some embodiments of the invention.
- FIG. 143 illustrates an example of the view of FIG. 133 including dual fingerstocks of FIG. 138 according to some embodiments of the invention.
- FIG. 144 illustrates an example of the view of FIG. 133 including dual fingerstocks of FIG. 138 according to some embodiments of the invention.
- FIG. 145 illustrates an example of the view of FIG. 133 including a single fingerstock of FIG. 138 according to some embodiments of the invention.
- FIG. 146 illustrates an example of the view of FIG. 133 including a single fingerstock of FIG. 138 according to some embodiments of the invention.
- FIG. 147 illustrates a compound gasket assembly according to some further embodiments of the invention.
- FIG. 148 illustrates a cross sectional view of a compound gasket assembly according to some further embodiments of the invention.
- FIG. 149 illustrates a rear view of a compound gasket assembly according to further embodiments of the invention.
- FIG. 150 illustrates a front view of a compound gasket assembly according to further embodiments of the invention.
- FIG. 151 illustrates an example of the view of FIG. 133 including a dual fingerstocks and base gasket according to some embodiments of the invention.
- FIG. 152 illustrates an example of the view of FIG. 133 including a dual fingerstocks and base gasket according to some embodiments of the invention.
- FIG. 153 illustrates an example of the view of FIG. 133 including a dual fingerstocks and base gasket according to some embodiments of the invention.
- FIG. 154 illustrates an example of the view of FIG. 133 including a dual fingerstocks and base gasket according to some embodiments of the invention.
- FIG. 155 illustrates an example of the view of FIG. 133 including a single fingerstock according to some embodiments of the invention.
- FIG. 156 illustrates an example of the view of FIG. 133 including a single fingerstock according to some embodiments of the invention.
- FIG. 157A-C illustrate custom fingerstocks according to some embodiments of the invention.
- FIG. 158A-C illustrate custom fingerstocks according to some embodiments of the invention.
- FIG. 159A-159C illustrates custom fingerstocks integrated with a privacy/security enclosure according to some embodiments of the invention.
- FIG. 160 illustrates RF attenuation behavior of various embodiments of the invention.
- FIGS. 161A-161C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 162A-162C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 163A-163C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 164A-164C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 165A-165C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 166A-166C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 167A-167C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 168A-168C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 169A-169B illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 166A-166C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 167A-167C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 168A-168C illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 169A-169B illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 170A-170B illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 171A-171B illustrate perspective views of various embodiments of a privacy/security enclosure.
- FIGS. 171C-171D illustrate user interfaces and uses of user interfaces of a privacy/security enclosure according to some embodiments of the invention.
- FIGS. 172A-172C, and 173-187 illustrate detailed perspective views of various embodiments of a privacy/security enclosure according to some embodiments of the invention.
- FIGS. 188-189, and 190A-190D illustrates icon displays of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 191A-191F illustrates an overview of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 192 illustrates a circuit system layout of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 193 illustrates an operational state diagram of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 194 illustrates a state cycle diagram of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 195A-195B illustrates partial interior perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 196 illustrates a partial cut-away view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 197A-197B illustrates a close-up view of the partial cut-away view in FIG. 196 in accordance with some embodiments of the invention.
- FIGS. 198A-198D illustrates partial interior views of portions of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 199A-199E illustrates exterior views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 200A-200D illustrates exterior views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 201A-201E illustrates exterior views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 202A illustrates a privacy/security enclosure including removable Faraday enclosure in accordance with some embodiments of the invention
- FIG. 202B depicts a removable Faraday enclosure in accordance with some embodiments of the invention
- FIG. 203 depicts an assembly view of a privacy/security enclosure including removable Faraday enclosure in accordance with some embodiments of the invention
- FIGS. 204A-204C, and 205A-205F illustrate privacy/security enclosures including removable Faraday enclosures and privacy/security enclosures that can be used with removable Faraday enclosures in accordance with some embodiments of the invention.
- FIG. 206 illustrates a frequency profile of pink noise in accordance with some embodiments of the invention.
- FIG. 207 illustrates a frequency profile of human voice in accordance with some embodiments of the invention.
- FIG. 208 illustrates front view of a computer or display monitor including a mounted privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 209 illustrates a close up view of the privacy/security enclosure of FIG. 208 in accordance with some embodiments of the invention.
- FIG. 210 illustrates a close up front perspective view of a privacy/security enclosure in a covered and protected configuration in accordance with some embodiments of the invention.
- FIG. 21 1 illustrates a close up front perspective view of a privacy/security enclosure in an uncovered and unprotected configuration in accordance with some embodiments of the invention.
- FIGS. 212A-212C illustrate an internal architecture view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 213A-213B illustrates a front and rear perspective view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 214 depicts a reconfiguration of a mounted privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 215 depicts a reconfiguration of a mounted privacy/security enclosure in accordance with another embodiment of the invention.
- FIG. 216 illustrates architecture views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 217A-217C illustrates views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 218A-218C illustrates views of a privacy/security enclosure in accordance with some further embodiments of the invention.
- FIG. 219 illustrates an operational view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 220 illustrates an operational view of a privacy/security enclosure in accordance with some further embodiments of the invention.
- FIG. 221 illustrates an operational view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 222 illustrates an operational view of a privacy/security enclosure in accordance with some further embodiments of the invention.
- FIG. 223 illustrates an operational view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 224 illustrates an operational view of a privacy/security enclosure in accordance with some further embodiments of the invention.
- FIG. 225 illustrates an operational view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 226 illustrates an operational view of a privacy/security enclosure in accordance with some further embodiments of the invention.
- FIG. 227 illustrates a rear view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 228 illustrates a rear view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 229 illustrates a front view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 230 illustrates a side view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 231 illustrates a side internal view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 232A-232C illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 233A-233C illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 234A-234C illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 235A-235C illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 236A-236C illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 237A-237C illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 238A-238D illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 239A-239C illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 240A-240C illustrates perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 241A-241C illustrates perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 242A-242C illustrates perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 243A-243D illustrates perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 244A-244C illustrates perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 245A-245C illustrates perspective views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 246A-246D illustrate perspective views of a privacy/security enclosure in accordance with some embodiments of the invention in accordance with some embodiments of the invention
- FIG. 247 illustrates a privacy/security enclosure mounting assembly view in accordance with some embodiments of the invention.
- FIG. 248 illustrates a front perspective view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 249 illustrates a rear perspective view of the privacy/security enclosure of FIG. 248 mounted to a display device in accordance with some embodiments of the invention.
- FIG. 250 illustrates a front perspective view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 251 illustrates a rear perspective view of the privacy/security enclosure of FIG. 250 mounted to a computer or display device in accordance with some embodiments of the invention.
- FIG. 252 illustrates a front perspective view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 253 illustrates a rear perspective view of the privacy/security enclosure of FIG. 248 mounted to a computer or display device in accordance with some embodiments of the invention.
- FIG. 254 illustrates a front perspective view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 255 illustrates a rear perspective view of the privacy/security enclosure of FIG. 250 mounted to a computer or display device in accordance with some embodiments of the invention.
- FIG. 256 illustrates a perspective view of a computer or display mounted privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 257 illustrates a perspective view of a computer or display mounted privacy/security enclosure including a partial internal component view in accordance with some embodiments of the invention.
- FIG. 258 illustrates a side view of a computer or display mounted privacy/security enclosure including a partial internal component view in accordance with some embodiments of the invention.
- FIGS. 259, 259A, 259B, 260, 260A, 260B, 261, 261A illustrates internal release mechanisms in accordance with some embodiments of the invention.
- FIGS. 262-263 illustrate rear perspective views of computer or display mounted privacy/security enclosures in accordance with some embodiments of the invention.
- FIGS. 264A-264B illustrates rear perspective views of privacy/security enclosures including textures in accordance with some embodiments of the invention.
- FIGS. 265A-265B illustrate rear perspective views of computer or display mounted privacy/security enclosure with cable management in accordance with some embodiments of the invention.
- FIG. 266 illustrates a front perspective view of a privacy/security enclosure according to some embodiments of the invention.
- FIG. 267 illustrates a front perspective view of a privacy/security enclosure with a hood or cover portion removed according to some embodiments of the invention.
- FIG. 268 illustrates an exploded assembly view of portions of the privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 269 illustrates components of the Faraday base assembly of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 270 illustrates an exploded assembly view of portions of the Faraday base assembly in accordance with some embodiments of the invention.
- FIG. 271 illustrates an exploded assembly view of portions of the privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 272 illustrates an exploded assembly view of portions of the privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 273-276 illustrate perspective views of privacy/security enclosures including mechanical isolation in accordance with some embodiments of the invention.
- FIG. 277 illustrates an end view of a privacy/security enclosure including broadband vibration in accordance with some embodiments of the invention.
- FIG. 278 illustrates an end view of a privacy/security enclosure including active vibration cancellation in accordance with some embodiments of the invention.
- FIGS. 279 and 280 illustrate internal cross-sectional views of a privacy/security enclosure with in accordance with some embodiments of the invention.
- FIGS. 281-282, and 283-284 illustrate light transmission within a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 285A-285E illustrate privacy/security enclosures for device cameras in accordance with some embodiments of the invention.
- FIG. 286 illustrates a privacy/security enclosure including a Faraday sleeve in accordance with some embodiments of the invention.
- FIGS. 287A-287B illustrate privacy/security enclosures for use with device cases in accordance with some embodiments of the invention.
- FIG. 288 illustrates a USB-powered active portion of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 289A-289C illustrate tethered privacy/security enclosures in accordance with some embodiments of the invention.
- FIG. 290 illustrates an ultrasonic clip-on privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 291 illustrates a vacuum seal over microphone in accordance with some embodiments of the invention.
- FIG. 292 illustrates internal air flow acoustic muffling in accordance with some embodiments of the invention.
- FIGS. 293A-293B illustrate perspective views of a privacy/security enclosure and method of use in accordance with some embodiments of the invention.
- FIGS. 294A-294B illustrate privacy/security enclosures for docked devices in accordance with some embodiments of the invention.
- FIGS. 295A-295D illustrate privacy/security enclosures for partial cases in accordance with some embodiments of the invention.
- FIG. 296 illustrates a tethered privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 297 illustrates a noise emitter in accordance with some embodiments of the invention.
- FIG. 298 illustrates a cover add-on privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 299A-299D illustrate privacy/security enclosures for a Microsoft KinectTM system in accordance with some embodiments of the invention.
- FIGS. 300A-300B illustrate a fold-down cover privacy/security enclosure for a Microsoft KinectTM system in accordance with some embodiments of the invention.
- FIG. 301 illustrates a remote cover privacy/security enclosure for a Microsoft KinectTM system in accordance with some embodiments of the invention.
- FIGS. 302A-302B illustrate an elevator recess cover privacy/security enclosure for a Microsoft KinectTM system in accordance with some embodiments of the invention.
- FIG. 303 illustrates an attachable cover privacy/security enclosure for a Microsoft KinectTM system in accordance with some embodiments of the invention.
- FIG. 304 illustrates a power interruption privacy/security device in accordance with some embodiments of the invention.
- FIGS. 305A-305B illustrate a Faraday cylinder privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 306 illustrates a privacy/security enclosure including optical blinding in accordance with some embodiments of the invention.
- FIG. 307 illustrates a Microsoft KinectTM system audio interference system in accordance with some embodiments of the invention.
- FIG. 308 illustrates an IR sticker privacy/security system in accordance with some embodiments of the invention.
- FIGS. 309A-309B illustrate manually operated privacy/security enclosures in accordance with some embodiments of the invention.
- FIGS. 310A-310B illustrate privacy/security protection of a remote control in accordance with some embodiments of the invention.
- FIGS. 31 1A-31 IB illustrate a remote controlled cove privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 312 illustrates a smart glass privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 313 illustrates an on-off remote battery circuit breaker in accordance with some embodiments of the invention.
- FIGS. 314-315, 316A-316B, and 317A illustrate an automobile privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 317B illustrates a privacy/security system in accordance with some embodiments of the invention.
- FIGS. 317C and 317D illustrate mechanical, electrical, and electromechanical systems of a vehicle that can be controlled by the privacy/security system of FIG. 317B in accordance with some embodiments of the invention.
- FIGS. 318A-318C illustrates a travel case privacy/security system in accordance with some embodiments of the invention.
- FIGS. 319A-319B illustrate a protective suitcase privacy/security system in accordance with some embodiments of the invention.
- FIG. 320 illustrates a Faraday cage in bag privacy/security system in accordance with some embodiments of the invention.
- FIG. 321 illustrates a Faraday sleeve privacy/security system in accordance with some embodiments of the invention.
- FIG. 322 illustrates a lockbox privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 323 illustrates a safe-type privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 324 illustrates a tackle box privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 325 illustrates a letter box privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 326 illustrates a roundabout cage-type privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 327 illustrates a built-in type privacy/security enclosure in accordance with some embodiments of the invention.
- FIGS. 328A-328F illustrate seals and seal structures in accordance with some embodiments of the invention.
- FIG. 329 illustrates privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 330 illustrates a schematic of a privacy/security system in accordance with some embodiments of the invention.
- FIG. 331 illustrates a system schematic of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 332 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 333 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 334 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 335 illustrates a cross-sectional view of a privacy/security system in accordance with some embodiments of the invention.
- FIG. 336 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 337 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 338 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 339 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 340 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 341 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 342 illustrates a cross-sectional view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 343 illustrates a perspective view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 344 illustrates a perspective view of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 345 illustrates a circuit diagram for a DC pass-through in accordance with some embodiments of the invention.
- FIG. 346 illustrates a front view of a DC pass-through assembly implementing the circuit of FIG. 345 in accordance with some embodiments of the invention.
- FIG. 347 illustrates a rear view of the DC pass-through assembly of FIG. 346 in accordance with some embodiments of the invention.
- FIG. 348 illustrates secure/private communication between user devices secured and protected in privacy/security enclosures in accordance with some embodiments of the invention.
- the terms “mounted,” “connected,” “supported,” and “coupled” and variations thereof are used broadly and encompass both direct and indirect mountings, connections, supports, and couplings. Further, “connected” and “coupled” are not restricted to physical or mechanical connections or couplings. Unless specified or limited otherwise, the terms “seal,” “seals,” and “sealed” and variations thereof are used to broadly encompass a range of levels of sealing, from at least some or partial sealing, to substantially complete or full sealing with substantially no leakage through the seal.
- the term “phone(s),” “smartphone(s),” “tablet(s),” “computer(s),” and figures depicting such devices are intended to be used generically and interchangeably with each other and for any other such device(s) with one or more microphones and/or camera(s) and/or RF transceiver(s) and/or optical transceivers and/or infrared transceivers and/or wired networking capability and/or other sensor(s).
- the terms “USB,” and “micro-USB” refer to all standard charging interfaces for consumer electronic devices, including proprietary connectors such as Apple's LightningTM connector.
- Embodiments of the invention described herein include privacy/security devices, privacy/security systems and methods of use of these devices and systems for providing or facilitating a user's privacy/security.
- the term "privacy/security enclosure” can be used throughout to describe embodiments of a structure forming at least a partial enclosure, chamber, cover, case, sleeve, channel, conduit, window, and variations thereof to broadly encompass rendering a range of levels of privacy/security to a user, from at least some or partial privacy/security, to substantially complete or complete privacy/security with substantially no private information leakage through the privacy/security enclosure.
- the term “privacy/security enclosure” can be used throughout to describe embodiments of a system providing privacy/security control to a user.
- FIG. 1 is a perspective view of a partially open privacy/security enclosure 100 according to at least one embodiment of the invention.
- the privacy/security enclosure 100 includes structure and functions as described below that can apply to at least one other privacy/security enclosure described herein, including some or all of the privacy/security enclosures disclosed and described and shown the related figures.
- the privacy/security enclosure can comprise a structure that can least partially envelop at least one device comprising an RF transceiver and/or an audio device, and/or a video device, and/or an audio/video/RF protection device(s), and/or a near- field communication (hereinafter "NFC”) device, and/or a device comprising a radio-frequency identification (hereinafter "RFID”) device.
- RFID radio-frequency identification
- the privacy/security enclosure can include a structure that can least partially envelop, wrap, or cover at least a portion of a user device.
- the privacy/security enclosure can be used to temporarily, semi-permanently, or permanently block or at least partially attenuate audio or video transmission when positioned adjacent to, proximate to, or coupled to at least a portion of a user device.
- the devices protected by the privacy/security enclosure can comprise a mobile or stationary communication device, including, but not limited to, a cellular phone, a smart phone, a car microphone, a paging device, a wearable device such as a smartwatch and/or a wearable phone, a computing device such as a computer, tablet or laptop, a portable or stationary gaming device, a portable or stationary video or audio device, and/or a combination of two or more of the devices described.
- a mobile or stationary communication device including, but not limited to, a cellular phone, a smart phone, a car microphone, a paging device, a wearable device such as a smartwatch and/or a wearable phone, a computing device such as a computer, tablet or laptop, a portable or stationary gaming device, a portable or stationary video or audio device, and/or a combination of two or more of the devices described.
- the privacy/security enclosure can comprise a device including a housing assembly that can comprise a rigid or semi-rigid, structurally self- supporting privacy/security enclosure that can be at least partially opened or closed by a user, and/or can include a portion that can be moved, adjusted, opened or closed by a user to adjust a level of privacy/security. In some embodiments, at least a portion of the housing assembly can be moved with respect to another portion of the housing assembly.
- the privacy/security enclosure can include a structure that can least partially envelop at least one user device comprising an RF transceiver and/or an audio device, and/or a video device, and/or an audio/video/RF protection device(s), and/or a near-field communication (hereinafter "NFC") device, and/or a radio-frequency identification (hereinafter "RFID”) device.
- the privacy/security enclosure can be used to cradle, and temporarily or permanently store at least one user device such as a smart phone, or other communication device.
- the privacy/security enclosure can include at least one gasket or O-ring (hereinafter referred to as an "RF gasket”) that is capable of at least partially attenuating or blocking at least one transmission or signal comprising radio frequency radiation (hereinafter referred to as "RF").
- RF gasket gasket or O-ring
- the privacy/security enclosure can be formed of a material capable of at least partially attenuating RF radiation emitted to or from any RF antennas or transceivers positioned inside the privacy/security enclosure (e.g., such as those forming part of the user's smart phone).
- the privacy/security enclosure can comprise a protective enclosure (or shield in other embodiments) that can selectively at least partially block one or more monitoring, sensing and/or surveillance capabilities of the various devices.
- the privacy/security enclosure only covers the audio portion of a desktop computer (or other device with a microphone such as an Xbox Kinect®).
- the privacy/security enclosure does not provide RF protection, but reduces or limits the microphone's ability to capture audio content.
- a microphone security portion of the shield can be activated using a button.
- the activation of another button can direct an opaque shield to cover the front of a device's camera (such as a camera on the Xbox Kinect®).
- the invention minimizes or prevents scanning, information insertion, manipulation or retrieval, code insertion, manipulation or retrieval or hacking of protected devices via RF technologies.
- the privacy/security enclosure can suppress the ability of various other sensors when enclosed within the privacy/security enclosure.
- the privacy/security enclosure can substantially block and/or damp the signals reaching other sensors such as accelerometers, gyroscopes, magnetometers to name a few.
- the enclosure can include materials, structures and/or approaches (for example, foams, fabrics, springs, specific shapes and/or materials, suspension and/or isolation systems, vibration dampening techniques etc.), configured to at least partially mask, block, attenuate, distort, confuse and/or otherwise reduce and/or eliminate the ability of any sensor to perform its primary and/or any other function of which it is capable (for example a gyroscope or accelerometer used to record and/or detect/decipher audio communication).
- materials, structures and/or approaches for example, foams, fabrics, springs, specific shapes and/or materials, suspension and/or isolation systems, vibration dampening techniques etc.
- the enclosure can include active/powered components to at least partially mask, block, attenuate, distort, confuse and/or otherwise reduce and/or eliminate the ability of any sensor to perform its primary and/or any other function of which it is capable (for example, a gyroscope or accelerometer could otherwise be used to record and/or detect/decipher audio communication).
- active/powered components to at least partially mask, block, attenuate, distort, confuse and/or otherwise reduce and/or eliminate the ability of any sensor to perform its primary and/or any other function of which it is capable (for example, a gyroscope or accelerometer could otherwise be used to record and/or detect/decipher audio communication).
- the privacy/security enclosure can include RF gaskets extending around at least a portion of an interface or housing of the privacy/security enclosure. In some embodiments, the privacy/security enclosure can include RF gaskets extending completely around a region of an upper and/or lower portion of the privacy/security enclosure. In some embodiments, the privacy/security enclosure can comprise a Faraday cage configured to attenuate, or at least partially block, reception or transmission of RF radiation. In some embodiments, the Faraday cage includes and/or is formed by the one or more RF gaskets.
- the combination of the privacy/security seal formed by the one or more of the aforementioned RF gaskets and one or more RF shield layers can form a Faraday cage.
- the Faraday cage can substantially attenuate or at least partially block RF transmission into and/or out of the privacy/security enclosure.
- the term RF shield is intended to mean a barrier that is able to partially or substantially attenuate, at least partially prevent transmission through, or at least partially block transmission of RF.
- the privacy/security enclosure can include at least one RF gasket positioned within, coupled to, or integrated with the base portion and/or the lid portion of the privacy/security enclosure.
- the privacy/security enclosure can include an RF gasket that can attenuate or at least partially block some or all RF transmission including, but not limited to, zero generation wireless signals, first generation wireless signals, second generation wireless signals, third generation wireless signals, fourth generation wireless signals, fifth generation wireless signals, any global positioning satellite signal (such as "GPS" or "GLONASS”), Bluetooth® wireless signals, RFID electromagnetic radiation, WiFi wireless signals, two-way radio RF signals, UHF or VHF signals (such as a citizen's band radio signal or other radio signal emitted from a 'walkie-talkie' type device), high-speed and millimeter wave signals, and/or near- field wireless signals.
- Bluetooth® is a registered trademark of Bluetooth SIG, Inc.
- the privacy/security enclosure can at least partially attenuate or blocking at least one transmission or signal comprising an optical signal, infrared signal, ultraviolet signal, image or video, and/or acoustic signal.
- the privacy/security enclosure can include at least one seal or gasket extending around at least a portion of an interface between the privacy/security enclosure and the user's device that can at least partially block or attenuate an optical signal, image or video, and/or acoustic signal, and/or an RF signal.
- a combination of one or more grooves within a portion of the privacy/security enclosure can be used with one or more o-rings or gaskets to provide various levels of sealing of the privacy/security enclosure.
- a dual groove structure or a single groove can be implemented with a tongue structure that can be used with or without an o-ring.
- any of the o-rings or gaskets can comprise an RF shield (i.e., can function as an RF attenuating gasket) and therefore can enable a ring seal for use in a privacy/security enclosure.
- any o-ring or gasket can comprise a polymer-based matrix material including metal filaments dispersed in a matrix to form a polymer composite material.
- the polymer matrix can comprise a homopolymer and/or copolymer, and can comprise an elastomeric polymer such as rubber.
- the o-ring or gasket can comprise a carbon fiber-filled matrix material including metal filaments dispersed in a matrix to form a carbon fiber composite material.
- any o-ring or gasket can be capable of forming a compliant privacy seal between portions of the privacy/security enclosure (e.g., between an upper and a lower portion and/or between two halves of the privacy/security enclosure). Further, in some embodiments, the formed seal can be capable of functioning as an environmental barrier in addition to functioning as an RF shield. For example, in some embodiments, the formed seal can be capable of providing a water and/or moisture barrier in addition to functioning as an RF shield.
- the combination of the privacy seal and the one or more RF shield layers can form a Faraday cage to substantially attenuate or at least partially block substantially all RF transmission into the privacy/security enclosure and/or substantially attenuate or at least partially block substantially all RF transmission out from the privacy/security enclosure.
- each o-ring or gasket type can be optimized for a specific function (either to at least partially block or attenuate RF, sound, light, moisture, etc.).
- any one o-ring or gasket can function to attenuate or at least partially block a combination of RF, sound, light, etc.
- one or more o-rings or gaskets can function to attenuate RF, and one or more o-rings or gaskets can function to attenuate sound, and one or more o-rings or gaskets can function as an environmental barrier.
- one or more of the o-rings or gaskets can be larger or smaller than one or more other o-rings or gaskets.
- one or more of the grooves can be larger or smaller than one or more other groove so as to be capable of cradling a complementarily-sized o-ring.
- RF protection can be accomplished using a labyrinth and one or more gaskets.
- a variety of other options can be deployed to improve manufacturability, space consumption etc., without reducing our performance.
- Some factors impacting gasket and labyrinth design in some embodiments include the use of gaskets that can be compressed by at least 20% to about 50% of their height in order to provide suitable attenuation.
- a double labyrinth around the entire diameter of the privacy/security enclosure may be required depending on the physical architecture of the privacy/security enclosure (e.g., size and/or geometry matched to one or more devices).
- some embodiments may require significant force to compress the gaskets.
- some embodiments may require latches with mechanical advantage that can help the user close the case and hold the lid in position, as well as hinges that can support the force constantly being created by the compressed gaskets.
- Some further embodiments can deploy architectures that enable the labyrinth and gasket to be shorted.
- Other embodiments can deploy gaskets that are positioned at the bottom of the labyrinth.
- any of the aforementioned RF gaskets can be configured to form a compliant privacy/security seal between any number of portions of the privacy/security enclosure (e.g., between an upper and a lower portion and/or between two halves of the privacy/security enclosure). Further, in some embodiments, the formed seal can be capable of functioning as an environmental barrier in addition to functioning as an RF shield. For example, in some embodiments of the invention, one or more RF gaskets can provide the secondary benefit of minimizing the transmission of air, water, dust and other such substances from passing into the interior of the privacy/security enclosure when it is closed. In some embodiments, other or additional environmental or sealing gaskets can be included that are more specifically designed for this purpose.
- the environmental or sealing gaskets can be used with one or more RF gaskets as required.
- a combination of one or more grooves within a portion of the privacy/security enclosure can be used with one or more RF gaskets to provide various levels of coupling, seating, and sealing of the privacy/security enclosure.
- at least some portion of the upper and/or lower portions of the privacy/security enclosure can comprise at least one form, cavity, or depression (i.e. forming a groove) for coupling to at least one RF gasket.
- the privacy/security enclosure can comprise a metal or metal alloy.
- the privacy/security enclosure can comprise a metal core structure.
- Some embodiments include a metal or metal alloy that can comprise stainless steel, magnesium, aluminum, titanium, or a titanium-magnesium alloy.
- one or more components of the enclosed chamber can comprise a metal or metal alloy that is milled from a solid block.
- one or more components of the enclosed chamber can be stamped from raw sheet stock.
- components of the enclosed chamber such as a privacy/security enclosure base and/or a privacy/security enclosure lid can comprise stamped aluminum or magnesium alloy.
- the lid can be formed by other conventional manufacturing processes such as molding (e.g. injection molding or thermoforming), die- cutting, laser cutting, or printed using a three dimensional printer, etc.
- the lid can be formed by other conventional manufacturing processes such as molding (e.g. injection molding or thermoforming), die- cutting, machining, laser cutting, printed using a three dimensional printer, thixo-forming, impact extruded or deep drawn, etc.
- the Faraday enclosure can be formed from conductive fabric or plastic infused with conductive elements or plastic coated or plated with conductive elements.
- the Faraday enclosure and/or any portion of the privacy/security enclosure can be anodized and/or can comprise a polymer.
- any of the components, or subassemblies, housings and/or interconnects of the privacy/security enclosures herein can comprise a metal or a metal alloy substrate or coating.
- the substrate or coating can comprise a base metal (e.g., such as nickel) with varying thicknesses of plated metals, including, but not limited to gold, palladium nickel, and titanium blend plating options.
- the substrate or coating can comprise a metal or metal alloy (e.g., such as beryllium copper) that can electrically couple the cover to the base, and when closing the case.
- at least a portion of the substrate or coating can comprise copper or a copper alloy.
- At least a portion of the substrate or coating can comprise nickel or a nickel alloy (e.g., a nickel-copper alloy), or an alloy of copper and tin.
- a nickel layer can be used as a diffusion barrier for a contact outer layer or surface that comprises gold.
- at least a portion of the substrate or coating can comprise iron or steel.
- at least a portion of the substrate or coating can comprise aluminum, magnesium, or mixtures or alloys thereof.
- Other useful coatings or layers can include silver, tin, or palladium.
- any of the aforementioned metals or metal alloy can be selected and used to form one or more electrical contacts of the privacy/security enclosure depending on the required function and/or performance.
- Examples of such contacts can include electrical contacts for RF shielding such as a rim or other electrical contact of the Faraday cage of the privacy/security enclosure.
- one or more contacts can comprise a gold or gold alloy material.
- the contacts can comprise titanium nitride.
- the contacts can comprise palladium, palladium nickel, or some other pure or blended form of noble metal, which at least partially resists corrosion and oxidation.
- various mated surfaces can use the same or different metals or metal alloy combinations for their contact surfaces, to improve or manage characteristics including, but not limited to, RF shielding performance, durability, longevity, mating sound and/or tactile feel/impression, frictional polymerization, contact resistance, conductivity, appearance, strength, fretting, hardness, and/or cost.
- formation or deposition can proceed by any conventional technique including plating, cladding, electrolytic deposition, electro-less deposition, or vapor deposition among others.
- the privacy/security enclosure can comprise a metal core structure.
- Some embodiments include a metal or metal alloy that comprises stainless steel, magnesium, aluminum, titanium, or a titanium-magnesium alloy, or combinations thereof.
- one or more components of the chamber can comprise a metal or metal alloy that is milled from a solid block.
- one or more components of the cover can be stamped from raw sheet stock.
- portions of the privacy/security enclosure can comprise stamped aluminum or magnesium alloy.
- the cover can be formed by other conventional manufacturing processes such as molding (e.g. injection molding or thermoforming), die-cutting, machining, laser cutting, printed using a three dimensional printer, etc.
- At least a portion of one or more of the privacy/security enclosures described herein can comprise a material such as a polymer, or polymer composite.
- a material such as a polymer, or polymer composite.
- at least a portion of one or more of the privacy/security enclosures described herein can comprise an injection molded, extruded, or thermo-form polymer.
- the polymer can comprise polyethylene, polypropylene, or polyethylene-polypropylene copolymers.
- the privacy/security enclosure can comprise at least one polymer comprising aramids (aromatic polyamides), poly(m-xylylene adipamide), poly(p-xylylene sebacamide), poly (2,2,2-trimethyl-hexamethylene terephthalamide), poly(piperazine sebacamide), poly(metaphenylene isophthalamide) (Nomex) and poly(p-phenylene terephthalamide), aliphatic and cycloaliphatic polyamides, including the copolyamide of 30% hexamethylene diammonium isophthalate and 70% hexamethylene diammonium adipate, the copolyamide of up to 30% bis-(-amidocyclohexyl) methylene, terephthalic acid and caprolactam, polyhexamethylene adipamide, poly(butyrolactam), poly(9-aminonanoic acid), poly(enantholactam), poly(caprillactam), polycaprol
- the privacy/security enclosure can comprise a polymer thermoset material.
- the thermosetting polymer can comprise an epoxide-based technology.
- epoxies based on saturated or unsaturated aliphatic, cycloaliphatic, aromatic and heterocyclic epoxides can be used to form at least a portion of the privacy/security enclosure.
- useful epoxides can comprise glycidyl ethers derived from epichlorohydrin adducts and polyols, particularly polyhydric phenols.
- Another useful epoxide is the dlglycidyl ether of hisphenol A.
- Additional examples of useful poly epoxides are resorcinol diglycidyl ether, 3,4-epoxy-6-methylcyclohexylmethyl- 9, 10-epoxystearate, l,2,-bis(2,3-epoxy-2-methylpropoxy)ethane, diglycidyl ether of 2,2-(p- hydroxyphenyl) propane, butadiene dioxide, dicyclopentadiene dioxide, pentaerythritol tetrakis(3,4-epoxycyclohexanecarboxylate), vinylcyclohexene dioxide, divinylbenzene dioxide, 1,5-pentadiol bis(3,4-epoxycyclohexane carboxylate), ethylene glycol bis(3,4- epoxycyclohexane carboxylate), 2,2-diethyl-l,3-propanediol bis(
- thermosetting resins based on aromatic vinyl esters can be used to form at least a portion of the privacy/security enclosure.
- aromatic vinyl esters can include a condensation product of epoxide resins and unsaturated acids usually diluted in a compound having double bond unsaturation such as vinyl aromatic monomer (e.g., styrene and vinyl toluene, and diallyl phthalate).
- Illustrative of useful vinyl esters are diglycidyl adipate, diglycidyl isophthalate, di(2,3-epoxybutyl) adipate, di(2,3-epoxybutyl) oxalate, di(2,3-epoxyhexy 1) succinate, d(3,4-epoxybutyl) maleate, d(2,3-epoxyoctyl) pimelate, di(2,3-epoxybutyl) phthalate, di(2,3-epoxyocty 1) tetrahydrophthalate, di(4,5- epoxy-dodecyl) maleate, di(2,3-epoxybutyl) terephthalate, di(2,3-epoxypentyl) thiodipropionate, di(5,6-epoxy-tetradecyl) diphenyldicarboxylate, di(3,4-epoxyheptyl) sulphonyl
- At least a portion of the privacy/security enclosure can include a filler material.
- some embodiments can include a thermoplastic or thermosetting resin that includes at least some filler material dispersed through at least a portion of the privacy/security enclosure.
- the filler material can be dispersed substantially homogenously through at least a portion of at least one layer of the privacy/security enclosure.
- the filler material can be substantially unevenly distributed through at least a portion of the privacy/security enclosure.
- the filler material can be dispersed substantially unevenly through at least a portion of at least one layer of the privacy/security enclosure.
- the filler material can be amorphous or crystalline, organic or inorganic material.
- the particle size of the filler material can be between 1-10 microns.
- at least some portion of the filler material can be sub-micron.
- at least a portion of the filler can comprise a nano- sized particle filler material.
- the filler can comprise a fibrous material.
- at least a portion of the filler can be oriented in a preferred direction.
- At least a portion of one or more of the privacy/security enclosures described herein can comprise an animal-based material such as leather or suede, and/or a plant derived material cellulosic material such as wood, cork, and/or a wood-based composite material.
- Some embodiments of the invention can include one or multiple rows of fingerstock bonded into a cover assembly or any interface between at least two portions of the privacy/security device.
- a hollow or solid conductive elastomer can be used in some embodiments of the invention.
- conductive elastomer in some or each row of fingerstocks, can comprise a generally circular cross-section. In some further embodiments of the invention, in some or each row of fingerstocks, conductive elastomer can comprise a generally oval cross-section. In some other embodiments of the invention, in some or each row of fingerstocks, conductive elastomer can comprise a generally square or rectangular cross-section.
- the bearing surface on the base can be nickel-plated for conductivity and surface hardness.
- At least some portion of the structurally self-supporting enclosed chamber can comprise a metal or a metal alloy.
- a metal or metal alloy that can comprise stainless steel, magnesium, aluminum, titanium, or a titanium-magnesium alloy.
- one or more components of the enclosed chamber can comprise a metal or metal alloy that is milled from a solid block.
- one or more components of the enclosed chamber can be stamped from raw sheet stock.
- components of the enclosed chamber such as a privacy/security enclosure base and/or a privacy/security enclosure lid can comprise stamped aluminum or magnesium alloy.
- the lid can be formed by other conventional manufacturing processes such as molding (e.g., injection molding or thermoforming), die-cutting, laser cutting, or printed using a three dimensional printer, etc.
- At least some portion of the privacy/security enclosure including the structurally self-supporting enclosed chamber can comprise a polymer or polymer composite. In some other embodiments, at least some portion of the structurally self-supporting enclosed chamber can comprise a composite. In some further embodiments, at least some portion of the structurally self-supporting enclosed chamber can comprise a polymer or polymer composite that includes a metal (such as a metal flake, metal powder, or a metal alloy coating, or other metal dispersion). Some embodiments include a metal or metal alloy that can comprise stainless steel, aluminum, or magnesium. In some embodiments, numerous other materials can be incorporated into various embodiments of the privacy/security enclosure.
- the privacy case can comprise a finished surface such as a polished surface.
- the privacy/security enclosure can comprise a box for corporate boardrooms that would encompass multiple devices (similar to any commercial cigar box).
- metallic meshes/fabrics and/or conductive metallic paints and finishes can be applied to one or more portions of the privacy/security enclosure (internally or externally) to create the RF shield and/or Faraday cage.
- Some embodiments of the invention include a privacy/security enclosure with an inner shell coupled to an outer shell.
- the inner shell and outer shell can comprise the same material (e.g., the inner and outer shells can each comprise a metal, or a polymer or a composite, and so on). In some other embodiments, the inner shell and outer shell can comprise different materials.
- components of the enclosed chamber such as a privacy/security enclosure base inner shell and/or a privacy/security enclosure lid inner shell can comprise a stamped metal or metal alloy (e.g., such as an aluminum and/or magnesium alloy), and a privacy/security enclosure base outer shell and/or a privacy/security enclosure lid outer shell can comprise a non-metal material such as an injection molded polymer or polymer composite material.
- the inner and outer shells of the base and lid can be coupled by a variety of conventional coupling methods including but not limited to a snap-fit, a latch, a hinge, or combinations thereof.
- the structurally self- supporting chamber can comprise a flexible and/or compliant material.
- the material can include at least one of a cloth or fabric, a polymer or polymer composite film or sheet, or other flexible material.
- the privacy/security enclosure can be structurally supported by one or more enclosed user devices, such as a mobile or stationary communication device.
- the privacy/security enclosure can comprise a flexible bag that can lay flat or be folded when empty, but can be configured to expand to accommodate at least one RF transceiver such as a mobile or stationary communication device.
- the privacy/security enclosure 100 can comprise a rigid, structurally self-supporting enclosed chamber.
- the privacy/security enclosure 100 can comprise a clam-shell type enclosure including an inner region 105 formed by coupling a lower portion, and an upper portion of a main housing 110.
- Some embodiments include at least one user device (such as the RF transceiver comprising a smart phone as depicted, and shown as device 10) positioned in the inner region 105.
- the privacy/security enclosure 100 can cradle the user device, and the upper portion can at least partially enclose one or more devices by at least partially moving and closing a base portion 120 and a lid portion 115.
- the privacy/security enclosure 100 can include a base portion 120 and a lid portion 115 coupled by at least one pivot.
- the privacy/security enclosure 100 can include a base portion 120 and a lid portion 115 coupled by at least one conventional hinge mechanism 107.
- the base portion or the lid portion can be shaped to accommodate at least a portion of a hinge mechanism 107.
- one or more edges of the base portion 120 can include at least one notch capable of providing clearance for a pivot mechanism.
- the base portion 120 or lid portion 115 or both can include a plurality of notches for providing clearance or for attachment of various portions of a pivot mechanism.
- the base portion 120 or lid portion 1 15 or both can include a plurality of apertures for providing attachment of various portions of a pivot mechanism.
- one or more surfaces of the base portion 120 and/or one or more surfaces of the lid portion 1 15 can include at least one aperture capable of securing one or more components of the privacy/security enclosure 100.
- any one of the above-mentioned apertures can include an attachment member (e.g., a screw, rivet or other coupling structure).
- the privacy/security enclosure 100 can include a liner 130 that can be shaped to fit substantially seamlessly from the outer periphery of the base, and can include at least one inner storage cavity.
- the liner 130 can include a storage cavity 135 shaped to cradle an RF transceiver (device 10).
- the example embodiments shown in FIG. 1 includes a storage cavity 130 positioned substantially centrally within the base portion 120, and shaped to cradle and at least partially surround the device 10.
- the liner 130 can comprise RF and/or acoustic shielding material forming a sealing interface 125.
- the base portion 120 and lid portion 115 can be coupled and pivoted with respect to each other to enable at least partial access to an inner region 105 of the privacy/security enclosure 100 by opening to an angle of between about 0° to about 90°.
- some embodiments include a privacy/security enclosure 200 that opens to an angle of between about 90° and about 180°.
- the privacy/security enclosure 200 comprises a main housing 210 including a base portion 220, and a lid portion 215 coupled by a hinge mechanism 207 shown coupled along a one edge of the base portion 220 and the lid portion 215.
- the base portion 220 and lid portion 215 can be coupled and pivoted with respect to each other to enable at least partial access to an inner region 205 of the privacy/security enclosure 200 by opening to an angle of between about 90° and about 180°.
- the base portion 220 and lid portion 215 can be pivoted with respect to each other and angled at an angle of greater than about 180° (not shown).
- the base portion 220 and lid portion 215 can be pivoted with respect to each other and angled at an angle of about 190°. In some embodiments, this can allow the privacy/security enclosure 200 to lay substantially fully open on a surface (e.g., such as a desk) and accommodate a base portion 220 that is thicker than the lid portion 215.
- the privacy/security enclosures 100, 200 can be closed, providing no access to the inner regions 105, 205 and effectively shielding the contents of the privacy/security enclosures 100, 200 from RF signals, and/or preventing sounds outside the enclosure from being monitored.
- the privacy/security enclosures can include a base and lid portions where the base portion is substantially parallel to the lid portion, and the base portion and lid portion are substantially matingly coupled and/or engaged.
- the hinge mechanisms 107, 207 can comprise a conventional friction hinge (such as a conventional friction hinge found in a conventional laptop computer).
- the hinge mechanism can comprise an open hinge mechanism, such as the hinges distributed by Taili Glasses Parts Co., ltd. (ht ⁇ ://www.tailiglassesparts.com/eyeglasses hinges.html .
- the hinge mechanisms 107, 207 can comprise a closed hinge mechanism, and can be sourced through Facebook.com(http://www.alibaba.com). ALIBABA" and "ALIBABA.COM” and related icons and logos are registered trademarks or trademarks or service marks of Facebook Group Holding Limited.
- the hinge mechanisms 107, 207 can comprise other types of coupling members capable of allowing the pivoting portions of the privacy/security enclosures 100, 200 to pivot and/or rotate with respect to each other.
- the hinge mechanisms 107, 207 can comprise a conventional spring-clip.
- the base and lid portions of the privacy/security enclosures 100, 200 can be decoupled.
- the privacy/security enclosures 100, 200 can be configured to enable a user to separate the base and lid portions.
- the privacy/security enclosures 100, 200 can include separate base and lid portions that can be matingly coupled and/or engaged by the user. Consequently, in some embodiments, a user can then choose to open the privacy/security enclosures 100, 200 by decoupling the base and lid portions.
- the privacy/security enclosure can include a radio-frequency shield (hereinafter referred to as an "RF shield").
- RF shield is intended to mean a barrier that is able to substantially attenuate, at least partially prevent transmission through, or at least partially block transmission of RF radiation (hereinafter referred to "RF").
- the RF shield can attenuate (i.e. reduce in signal strength) an RF signal by about 100 dB.
- the RF shield can provide greater than about 100 dB signal attenuation.
- the RF shield can attenuate an RF signal by less than about 100 dB while still disrupting effective communication.
- any privacy/security enclosure described herein can include an RF shield that can be capable of attenuating or at least partially blocking RF radiation from entering or exiting the privacy/security enclosure. In some embodiments, this can allow for bandwidth selectable pass-through capabilities.
- the privacy/security enclosure can form a Faraday cage capable of substantially attenuating RF signals (whether emitted from one or more mobile or stationary communication devices, or whether emitted from another source).
- at least a portion of the privacy/security enclosure is formed of a material substantially attenuating to RF radiation emitted from one or more mobile or stationary communication devices.
- the privacy/security enclosure can be formed of a material including at least a portion that is capable of substantially attenuating radio-frequency radiation emitted from outside of the privacy/security enclosure.
- at least a portion of the RF shield and/or Faraday cage can comprise aluminum, magnesium, copper, steel, or other conductive metal, metallic paints or coatings, wire mesh fabrics in one or more layers or orientations etc., or plastics infused with conductive elements, conductive compounds, and/or conductive mixtures.
- at least a portion of the Faraday cage can be optically translucent or transparent.
- Some embodiments can include a screen emulator. For example, in instances where the privacy/security enclosure includes substantial portions that are not optically transparent, a screen emulator can be used to replicate the enclosed device's screen on a screen that is outside of the privacy/security enclosure.
- one or more slots, windows, or openings can be formed in any portion of the privacy/security enclosure Faraday cage. In some embodiments, this can allow for features such as connecting internal and external antennas, each or all of which can provide varying levels of attenuation or gain at various frequencies. Further, in some embodiments, this can allow cables or wires to pass into the privacy/security enclosure for various purposes including charging the battery of internal devices, or the battery of the privacy/security enclosure, or to access any other internal component from the outside of the enclosure. Further, in some embodiments, the one or more slots, windows, or openings can be used to allow certain RF transmissions through based on the size and location of the slot/opening (e.g.
- Some embodiments of the invention can pass certain frequency ranges (with or without attenuation or gain) while attenuating other frequencies. In some embodiments, this can be achieved using one or more slots, windows, or openings that are configured in an open or partially open position. In some embodiments, when the one or more slots, windows, or openings that are configured in a closed configuration, some or all RF frequencies can be attenuated (thereby minimizing leakage).
- some embodiments can comprise mechanical or electro-mechanical switches and cut-offs, band pass filters, and other technologies, alone or in combination with each other and/or with antennas, repeaters, amplifiers and other such technologies.
- the privacy/security enclosure is formed of a material substantially attenuating RF radiation emitted to or from any RF antennas or transceivers when they are positioned inside the privacy/security enclosure.
- the privacy/security enclosure can comprise a Faraday cage to substantially attenuate, or at least partially block reception of RF radiation.
- Some embodiments of the invention can comprise an RF shield layer positioned within or on at least a portion of a base portion, or a lid portion, or both.
- FIG. 3 shows a partial cross-sectional view of a privacy/security enclosure 300 according to one embodiment of the invention that includes an RF shield layer 305.
- the privacy/security enclosure 300 shown includes an enclosure shell or housing 310 that encloses an inner region 320. Attached to the housing 310 is an RF shield layer 305. At least some portion of the RF shield layer 305 can be placed between the enclosure shell 310 (i.e., where the enclosure shell 310 as shown could be at least some portion of the base and/or at least some portion of the lid) and an enclosure liner 315. In other embodiments, the RF shield layer 305 can be placed in other regions of the privacy/security enclosure 300. For example, the RF shield layer 305 could be placed on the outside of the enclosure shell 310 (e.g., as a cover material) or embedded in the enclosure shell 310.
- the enclosure shell layer 305 can include layers of metal, alloy, wire, a wire mesh, a pure metallic casing, or some other electrically conductive material.
- the enclosure liner 315 can comprise the RF shield (i.e., the enclosure liner 315 performs a function of providing a physical lining of the enclosure and also functions as an RF shield).
- the RF shield layer 305 can extend across an entire inner surface of the enclosure shell 310 of the privacy/security enclosure 300. The view as shown includes a partial cross-sectional view of a privacy/security enclosure according to some embodiments of the invention.
- the view is not meant to limit the scope of the invention, and one of ordinary skill in the art would recognize that the view would also be representative of an opposite side of the privacy/security enclosure (i.e., a base portion or a lid portion or both).
- the enclosure shell 310 as shown can be either a base portion or a lid portion (e.g., such as base portion 220 or a lid portion 215 of privacy/security enclosure 200), and the RF shield layer 305 can extend across an entire inner surface of the privacy/security enclosure 300 (wherein the portion 302 as shown could function as a base portion or a lid portion).
- the RF shield layer 305 can be substantially continuous.
- the RF shield layer 305 can be discontinuous (i.e., it can be patterned and/or can contain gaps or apertures of various sizes).
- materials useful for fabricating an RF shield for at least one embodiment of the invention described herein can include materials comprising of metal, metal alloys, or any other conductive material including ultra-conductive film or coating.
- some embodiments can include a polymer and/or carbon-fiber based layer (e.g., a film, coating or cover) that can include at least one conductive layer.
- Some embodiments can utilize LORD® "UltraConductive Film and Coatings for Lightning Strike Protection" products with 121dB attenuation (found at the following web address: http://www.lord.com).
- tests have shown that a carbon composite coated with the LORD® "UltraConductive Film” achieved 121 dB of EMI shielding, equivalent to that of a solid 1- mm thick aluminum layer.
- Other materials useful for fabricating an RF shield for at least one embodiment of the invention can include materials comprising Lessemf.com, Y-Shield paint with 30 to 40 dB attenuation @ 1 to 18 GHz, http://www.lessemf.com/paint.html, an EMP Faraday Bag with 40 db @ 1 to 10 GHz, http://www.lessemf.com/cellphon.html, and shielding fabric with 50 to 80 dB @ 10MHz to 3 GHz, ht ⁇ p://www.lessemf.com/fabric.html
- Still other materials useful for fabricating an RF shield for at least one embodiment of the invention can include materials comprising Ibagroup.com RF paint with 30 to 40 dB attenuation, see http://www.lbagroup.com/products/shielding-paints, and fabric with 80 to 100 db attenuation @ 200 MHz to 10 GHz, see h1 ⁇ ://ww ⁇ lbagrou .corn/ rod ⁇ cts/rf-shielding-fabrics.
- Other materials useful for fabricating an RF shield for at least one embodiment of the invention can include materials comprising an Aaronia RFI shield fabric with 80 to 100 db attenuation @ 1 GHz to 10 GHz, such as those available from Kaltman Creations, 11c, see http://www.kaltmancreationsllc om ⁇
- 3MTM Dri-Shield metalized polyester and polyethylene with 45 dB attenuation
- Still other materials useful for fabricating an RF shield for at least one embodiment of the invention include nickel coated graphite mats, nickel coated steel foils and copper mesh with 70 to 93 dB @ 10 MHz to 17GHZ, available from Fiberforge
- materials useful to form an RF shield in one or more embodiments of the invention include a layer of material comprising a polymer-based matrix material including metal filaments dispersed in a matrix to form a polymer composite material.
- the polymer matrix can comprise a homopolymer and/or copolymer, and can include at least one ceramic, and/or at least one polymer-ceramic mixture.
- the RF shield can comprise a layer of material comprising nickel filaments dispersed in polyethersulfone ("PES") as disclosed in "Nickel Filament Polymer-Matrix Composites With Low Surface Impedance and High Electromagnetic Interference Shielding Effectiveness", Xiaoping Shui and D. D. L. Chung, Journal of Electronic Materials, Vol. 26, No. 8, 1997.
- PES polyethersulfone
- materials useful in one or more embodiments of the invention include a layer of material comprising a carbon fiber-based matrix material including metal filaments dispersed in a matrix to form a carbon fiber composite material.
- the carbon fiber matrix can comprise a homopolymer and/or copolymer, and can include at least one ceramic, and/or at least one polymer-ceramic mixture.
- the metal filaments can comprise nickel filaments. In some further embodiments, the metal filaments can include copper filaments and/or stainless steel filaments.
- Some embodiments of the invention can include using fabrics with copper or metallic wire/wire mesh woven into base fabric, with layering and/or crossed fabric layers.
- an RF shield can be placed between layers of cloth fabric.
- an RF shield layer as described earlier can be formed into or embedded in a cloth fabric.
- the cloth layer can then be used to line at least some portion of the inner region (e.g., the inner region of the base portion, or lid portion or both, and/or at least some portion of the outside of the privacy/security enclosure).
- FIGS. 10-15 show perspective views of privacy/security enclosures in which the base portion and lid portion are substantially matingly coupled and/or engaged to form a closed privacy/security enclosure.
- the mobile communication device (device 10) shown in FIGS. 1-2 or FIGS. 13-15 would be shielded from view by the enclosures shown in FIGS. 10-15.
- the shell of the privacy/security enclosure can be non-transparent (i.e., substantially attenuating to visible light) and capable of shielding the inner region of the privacy/security enclosure from view.
- the privacy/security enclosure can include a cover that is capable of at least partially covering at least one video camera within at least one user device.
- the cover can be the base or lid portion, and/or can comprise a further structural component integrated within, coupled with, or included within the privacy/security enclosure.
- at least some portion of the privacy/security enclosure can comprise a material that is at least partially or substantially fully attenuating to visible light radiation.
- the lid portion can comprise a translucent region or "window", capable of allowing some light to enter and exit the privacy/security enclosure.
- a user can be able to view the presence or absence of any mobile or stationary communication device within a closed privacy/security enclosure (i.e., the user can understand the presence of the device without opening the privacy/security enclosure).
- the translucent region would not enable a user or another individual or imaging device to read and comprehend a visual display of the communication device, or read and comprehend any information printed or inscribed on the communication device.
- other portions of the privacy/security enclosure can include at least one region capable of at least partially attenuating visible light radiation.
- some embodiments include a base portion and/or a lid with one or more translucent regions.
- one or more cameras i.e., still or moving picture recording apparatus sensitive to the visible light, infrared light and/or UV light
- one or more cameras will be attenuated to an extent that renders video recording devices enclosed within the privacy/security enclosure incapable of recording images outside of the enclosure.
- other sensors of enclosed devices such as light, proximity, heat/thermal, biometric and other such sensors will be partially or substantially fully blocked by the privacy/security enclosure.
- the privacy/security enclosure can suppress sound to substantially eliminate eavesdropping.
- the privacy/security enclosure can substantially block and/or damp the signals reaching audio sensors and microphones.
- the privacy/security enclosure can include audio blocking so that typical conversation-level audio outside the privacy/security enclosure will not be intelligible or discernible by the enclosed device's microphone.
- the enclosure can include sound dampening layers/materials.
- at least a portion of the privacy/security enclosure is formed of a material substantially attenuating sound emitted from one or more mobile or stationary communication devices.
- at least a portion of the privacy/security enclosure is formed of a material substantially attenuating sound emitted from outside of the privacy/security enclosure.
- the privacy/security enclosure can suppress the ability of various other sensors when enclosed within the privacy/security enclosure.
- the privacy/security enclosure can substantially block and/or damp the signals reaching other sensors such as accelerometers, gyroscopes, magnetometers.
- the enclosure can include materials configured to at least partially block or attenuate a signal that would normally be sensed by any accelerometers, gyroscopes, or magnetometers that may be coupled to one or more enclosed devices.
- the privacy/security enclosure can comprise a structure that includes at least one sound attenuation layer.
- the privacy/security enclosure can include a sound attenuation layer coupled with the enclosure liner 315 shown in FIG. 3.
- the enclosure liner 315 can comprise a sound attenuation layer.
- the privacy/security enclosure can include a sound attenuation layer positioned within the privacy/security enclosure so that it is immediately adjacent to a microphone and/or a loudspeaker of a device 10.
- sound attenuation can be accomplished by increasing the thickness of one or more regions of the privacy/security enclosure.
- the privacy/security enclosure can comprise a base portion and/or a lid portion with increased thickness to provide a level of sound attenuation that is greater than that provided for base portion and/or a lid portions that are thinner.
- the base portion and/or lid portion comprises an inner and outer shell
- either the inner shell or outer shell or both can be made thicker in order to provide increased sound attenuation.
- Increasing the thickness of any portion of the privacy/security enclosure can increase the mass of the privacy/security enclosure in some embodiments.
- every frequency has a corresponding wavelength (impacted by phase velocity).
- the stiffness or shape of the privacy/security enclosure can push these resonant frequencies away and/or out of the audible voice range.
- the material used, its mass, formed shape, and any reinforcing structures such as internal ribbing can increase the stiffness for a particular dimension and modify sound resonance within the privacy/security enclosure.
- sound attenuation can be accomplished using at least one low pressure or vacuum region or pocket within the privacy/security enclosure.
- one or more vacuum pockets can be integrated in a base portion and/or a lid portion of a privacy/security enclosure to provide a sound attenuation function.
- the vacuum pocket can be integrated into a wall of the base portion or the lid portion, integrated within an inner shell coupled to an outer shell of the base or lid portions, or formed by coupling an inner shell to an outer shell to form a vacuum pocket between the inner and outer shells.
- a vacuum pump can create at least a partial vacuum in at least a portion of the interior of the privacy/security enclosure.
- the vacuum pump can be a separate unit or integrated into the privacy/security enclosure in some embodiments, and can be actuated in various known ways including a motor or a manual actuator.
- Some embodiments include other sound attenuation that can be used alone, or with those described previously.
- Some embodiments of the invention can include at least one vibration dampener.
- the privacy/security enclosure can include at least one material and/or at least one component capable of attenuating a vibration.
- the privacy/security enclosure can include a vibration dampening coating.
- the coating can be applied to at least some region of a base portion and/or a lid portion (including for example be applied to one or more metal regions or components).
- the vibration dampening coating can comprise a lead- impregnated vinyl.
- the vibration dampening can be achieved using an aerogel material in the form of a coating, sheet, or one or more layers.
- the vibration dampening coating can include at least one conventional acoustical dampening material.
- sound attenuation can be enabled using at least one vibration damping structural feature capable of coupling with any surface of any enclosed device.
- sound attenuation can be enabled using at least one structural feature capable of coupling with one or more microphones of an enclosed device.
- the privacy/security enclosure can include at least one structural sound attenuator (e.g., such as a cap or header or footer) positioned inside the privacy/security enclosure that is capable of pressing against one or more microphones of any enclosed device in order to reduce, muffle, and/or substantially block sound from being picked-up by the one or more microphones.
- Some embodiments include a vibration damping structural feature comprising an isolation cage.
- one or more regions of the privacy/security enclosure can include a suspended vibration isolation cage.
- at least one user device can be placed within the vibration isolation cage, and suspended within the privacy/security enclosure in order to attenuate vibrations reaching or being emitted from one or more enclosed devices.
- Some embodiments include a suspended vibration isolation cage coupled to an inner surface of the privacy/security enclosure using a conventional suspension mount.
- the vibration isolation cage can be coupled to an inner surface of the privacy/security enclosure using a coupler comprising an elastomeric material.
- the coupler can comprised a fluid-filled chamber in which the fluid is selected for its attenuation of certain vibration frequency ranges.
- FIGS. 4, 5, 6A-6C, and 7A-7D show perspective views of passive acoustical attenuation technology according to at least one embodiment of the invention.
- FIG. 4 shows one example of a privacy/security enclosure 400 that is filled with vibration damping foam 415 that can exclude (i.e., displace) sound carrier air, while also providing damping of enclosure vibration caused by exterior sound.
- each portion 405, 410 of the privacy/security enclosure 400 can be at least partially filled with vibration damping foam 415 with at least one deformation seal 430 and at least one o- ring seal 435.
- the phone side surface of each half of the damping foam can be shaped or otherwise contoured with one or more features 420.
- the phone side surface can include a trough and/or depression 425 to accommodate and/or cradle at least a portion of a phone.
- Some embodiments can include one or more ridges 422 to support and/or suspend a phone.
- at least a portion of the phone side surface of the foam 415 can comprise a high deformation material.
- at least some of one or more foam portions 415 can comprise a gel-like material 445 comprising sound absorbing materials.
- Some embodiments can include passive acoustical protection using multiple air- to-enclosure boundaries. In this instance, each successive boundary can provide additional attenuation.
- at least one enclosure boundary can include an acoustical reflective outer layer with a "dead" inner layer (shows as 550) including latch 555.
- Some embodiments include an enclosure 500 comprising an adsorptive shell half 510 and shell half 514 with gasket labrynth interface 575, fuzzy interior 570, and suspension hooks 585.
- Some embodiments include a suspended frame 515 including an elastomeric enclosure forming an aperture 530 and extension inserts 525 for coupling with the suspension hooks 585.
- the device 10 can be inserted into the frame 515 and supported within the enclosure 500.
- the gasket labyrinth interface 575 can comprise a conductive gasket that can form at least a portion of a Faraday cage capable of providing RF protection.
- some embodiments can include a gasket portion comprising a soft elastomer that can be shaped to extend at least a partial distance around the interface between two portions of the privacy/security enclosure.
- the gasket portion can include inserts that comprise sound dampening foam and/or the aforementioned gel comprising sound dampening foam.
- at least some portion of the privacy/security enclosure 500 e.g., such as at least one enclosure boundary
- the one or more of the inner enclosures (forming a boundary between an outer enclosure) can comprise a sound absorbing shell.
- the outer surface of one or more inner enclosures can comprise at least one suspension damper capable of attenuating and isolating one internal enclosure from another (internal or outer) enclosure.
- the target microphone can be excited by vibrations caused by sound pressure waves.
- an internal suspension system for one or more communication devices (such as a phone) can reduce the amount of vibration that reaches the microphone.
- Other benefits can include drop and shock protection.
- Some embodiments of the invention can enable a user to upgrade and/or customize and/or maintain the acoustical dampening of the privacy/security enclosure.
- some embodiments of the invention can include a privacy/security enclosure 650 comprising one or more assemblies including an installable microphone sealing material (with assembly 600 shown in FIG. 6A and an embodiments of a seal of the privacy/security enclosure 650 shown in FIG. 6C).
- a tight seal applied directly to any microphone within the privacy/security enclosure 650 can further reduce the sound pressure waves that reach the microphone(s).
- some embodiments include a privacy/security enclosure 650 including an elastomeric trampoline- type suspension assembly 660.
- the suspension assembly 660 can be coupled to one portions of the privacy/security enclosure 650, and can be configured to be coupled to a grip an enclosure portion.
- some embodiments include a case 605, trampoline suspension 610, and grip case 615.
- auxiliary microphone plug 625, foam 620, and main microphone plug 630 can be assembled into the case 605 for sealing one or more microphones of a user's device.
- a main microphone plug 630 can be coupled to the grip enclosure portion (grip case 615), and in some further embodiments, the auxiliary microphone plug 625 can be coupled to the grip case 615.
- the main microphone plug 630 and/or the auxiliary mic plug 625 can attenuate sound to prevent it being sensed by one or more microphones in the device 10 (shown in FIG. 6B).
- two portions of the privacy/security enclosure 650 can include at least one o-ring capable of sealing at least a portion of the privacy/security enclosure 650.
- the at least one sealing o-ring can comprise a substantially airtight or near airtight seal formed substantially around the seam of the privacy/security enclosure 650. In this instance, when the privacy/security enclosure 650 is closed, the airtight seal reduces the sound waves reaching the target microphone. Other benefits include air, water and dust protection.
- at least a portion of one or more portions of the privacy/security enclosure can include a copper plated lining and/or layer. For example, FIG.
- FIG. 6B shows a cross-sectional view of the privacy/security enclosure 650 showing a device 10 held within the suspension assembly 660 formed by the assembly 600 shown in FIG. 6A.
- FIG. 6C shows a partial assembly view of a section of the case 605.
- the wall section 670 coupled to wall section 680 (forming a case half 605b) can be coupled to the case half 605a as shown.
- the case half 605b can comprise the sections 670, 680 coupled using a screw 687.
- the wall section 680 can include a copper plate 685 in some embodiments.
- the wall section 670 can include a groove 692 containing a sealing o-ring 690 into which a tongue portion 606 of the case half 605a is inserted to form the privacy/security enclosure 650.
- Some embodiments of the invention can include a combination of sound attenuation technologies.
- some embodiments can utilize elastomeric webs to suspend the phone and vibration damping inserts.
- the privacy/security enclosure 700 can include sound dampening foam distributed between one or more elastomeric ribs.
- FIG. 7A shows the privacy/security enclosure 700 including a case shell form by a base half 705 and a lid half 708.
- a foam web 720 can be positioned in one or more of the halves 705, 708.
- Soft foam 725, 730 can also be integrated as shown.
- FIG. 7C shows a partial assembly view of a section of the case 705.
- the wall section 762 (forming a portion of the case half 708b) can be coupled to a wall section 759 (forming a portion of a case half 705a).
- the wall section 759 is shown including an outer wall 755, which in some embodiments includes a multi-layer steel wall 765.
- foam section 750 and rib section 760 can be coupled to the wall section 759.
- At least one Faraday gasket 770 with air and water tight seal 775 can be coupled to a tongue 785 of the wall section 762 by coupled with the seal formed from gasket or o-ring 780.
- the wall section 762 can comprise a gasket 790 coupled to an outer wall 795.
- the foam 725, 730, 750 can comprise a soft, open cell memory foam that utilizes elastomeric webs (ribs 760) to suspend the phone and vibration damping inserts between the webs that also act as shock absorbers in the case of severe impact.
- the case shell e.g., formed by outer walls 755, 795 shown in FIG. 7C
- foam-faced plungers can be positioned to compress against the microphone ports of a communication device when the enclosure is closed.
- Some embodiments of the invention include active acoustical control.
- some embodiments include active masking of audio listening devices using at least one audio masking device.
- active acoustical control can comprise at least one sound generator (such as a speaker) transmitting audio masking signals such that any enclosed microphone and/or microphone recording of one or more targeted devices is not able to distinguish the masking signals from other audio content that may or may not have been present at the time of the broadcast of the masking signal.
- the audio content can comprise babble, chirps, pink noise, or white noise.
- FIGS. 8A-8B show one embodiment of the invention including a privacy/security enclosure 800 comprising an elastomeric suspension portion (810 coupled with 825), and at least one speaker that can emit sound in the general area of one or more communication devices (e.g., such as a phone).
- a privacy/security enclosure 800 comprising an elastomeric suspension portion (810 coupled with 825), and at least one speaker that can emit sound in the general area of one or more communication devices (e.g., such as a phone).
- the privacy/security enclosure 800 comprising a housing including a base portion 810 and a lid portion 815. Further, the privacy/security enclosure 800 can include an active sound system 850 positioned within the housing 805 that can utilize one or more piezoelectric transducers 830, 840, 845. In some embodiments, a battery 870 is provided for powering the active sound system 850, and optionally for use as an auxiliary power supply for a phone via conventional electromechanical or inductive coupling technologies.
- the privacy/security enclosure can include an acoustical attenuation comprising an elastomeric suspension that is removable from the privacy/security enclosure to allow easy fitting of the phone.
- the elastomeric suspension 900 can include a vibration isolating portion 955 comprising sound dampening foam that can be located at the microphone ports. Further, some embodiments can also include active/powered acoustical transmission via a speaker 930 coupled through a port 925.
- a portion of the foam 960 directly adjacent to the microphone port can include at least one embedded speaker 975 within the foam 985 coupled to a silicone frame portion 980 of the elastomeric suspension 900 (shown in FIG. 9C) capable of introducing noise within the vicinity of the microphone port of a communication device.
- embedded speakers 975 can be included based on the geometry of one or more enclosed devices in order to offer the flexibility to be used with different communication devices that can vary in size, quantity, and shape.
- embedded speakers 975 can be included based on the quantity and/or sizes of microphones.
- the broadcast of noise can create a signal that can limit or prevent a microphone in the privacy/security enclosure from detecting the presence and/or intelligibility of voices.
- the noise can be deterministic, partly-deterministic, or a random sound envelope.
- the noise signal could be chirping (a single tone starting from some frequency and shifting to another frequency that can go over an audible frequency range and repeat).
- the noise can comprise a random chirping (e.g., a sequence of random chirps played serially). Further, in some embodiments, each chirp can cover some portion of the audible range.
- Some further embodiments include a crowd noise and/or babble (e.g., multiple, substantially simultaneous speaking voices).
- Some other embodiments can include random and/or colored noise (e.g., random noise with a specific shape in the frequency domain including white noise, pink noise, brown noise, blue noise, gray noise, or other).
- Some embodiments of the invention can include a speaker driver to produce any one of the above mentioned noise sound envelopes within the privacy/security enclosure 900 or some portion of the privacy/security enclosure 900 (e.g. a sock or other mechanism holding one or more devices).
- the sound driver e.g., a speaker
- the sound driver can be configured for low power consumption, accuracy in reproducing the desired random noise source, and one or more front and back driver volume controls.
- Some embodiments include selective activation of acoustical masking. For example, in order to conserve power or to minimize obtrusive noise, some embodiments include a microphone capable of detecting the presence of speech. In some embodiments, when speech is detected, noise is broadcast to at least partially mask the speech (through a process of listening and responding). In some further embodiments, a broadcast tail (e.g. some time period, which may vary based on goal) can be used when speech is no longer detected (to accommodate pauses in conversation). Further, some embodiments include varying the power level of the noise signal being broadcasted based on the volume of speech detected. Further, some embodiments of the invention include broadcasting a low volume of sound substantially all of the time.
- Some embodiments of the invention can also include various controls (e.g., buttons or some other such interface) that can allow users to either activate or bypass the listen and response and/or other features.
- controls e.g., buttons or some other such interface
- a user can use the controls to selectively broadcast noise continuously at varying power levels, or to turn the device off entirely to allow for calls, or for some other such purpose, including those in which no audio masking is desired.
- the privacy/security enclosure can include at least one slot or aperture configured to allow access to a device port.
- at least some portion of the base and/or the lid of the privacy/security enclosure can include one or more apertures or slots that can enable access to an enclosed device.
- one or more access ports can enable power, audio, video, or other signals to be transmitted into and out of the privacy/security enclosure.
- a power supply, an audio signal, and/or a video signal can be transferred into or from any device within the privacy/security enclosure while substantially attenuating or substantially blocking receipt and transmission of RF signals to and from the privacy/security enclosure.
- the privacy/security enclosure can include at least one accessory pouch.
- the privacy/security enclosure 200 can include at least one accessory pouch 202 such as an internal sleeve or pocket capable of securing documents, credit or debit cards, driver's license, etc.
- the lid portion 215 can include the accessory pouch 202 including a plurality of pockets or compartments 202a.
- the privacy/security enclosure 200 can include at least one accessory pouch capable of securing an accessory selected from a group consisting of a pen, a pencil, coin currency, paper or plastic currency notes, USB memory sticks, and keys (e.g., house or automobile keys and key fobs).
- the pouch 202, 202a can comprise a metal mesh wallet.
- At least some portion of the privacy/security enclosure can include a colored covering.
- at least some portion of the base portion or lid portion of the privacy/security enclosure can be colored (e.g., the base or lid can be red in color).
- at least some portion of the privacy/security enclosure can include a multiple colored covering.
- at least some portion of the base or the lid of the privacy/security enclosure can comprise multiple colors.
- Some embodiments include a privacy/security enclosure that can include a patterned surface.
- at least some portion of the base or the lid of the privacy/security enclosure can include a patterned surface.
- at least some portion of the base or the lid of the privacy/security enclosure can include printed text.
- at least some portion of the base or the lid of the privacy/security enclosure can be textured.
- the privacy/security enclosure can include a covering layer.
- the privacy/security enclosure can comprise a substantially structurally supporting member including for example a base and lid portion, and at least some portion of the base or the lid of the privacy/security enclosure can be covered by at least one covering layer.
- the covering layer can comprise carbon fiber.
- the covering layer can comprise a polymer film or a fabric-based material.
- the shape of the outer surface of the privacy/security enclosure can dictate the material used for the covering layer and the process used to couple the covering layer to the outer surface of the privacy/security enclosure shell (e.g., by coupling to either the base portion or the lid portion).
- colors, patterns, textures, prints, or inserted materials can be applied to inside of the privacy/security enclosure (e.g., to liners, accessories, socks, and/or blocking foams etc.,) as well as to hinges and/or latches on the outside of the privacy/security enclosure.
- FIG. 10 illustrates a perspective view of a privacy/security enclosure 1000 according to one embodiment of the invention including filleted corners.
- the privacy/security enclosure 1000 can comprise a housing 1005 including a base portion 1020 and lid portion 1010 coupled by a hinge 1030.
- the corners of the base portion and the lid portion base portion 1020 (shown as 1026) and lid portion 1010 (shown as 1024) can be filleted so that the corners are curved, and the outer edge of the base portion and the lid portion can comprise a curved surface.
- FIG. 11 illustrates a perspective view of a privacy/security enclosure 1100 according to another embodiment of the invention.
- the privacy/security enclosure 1 100 can comprise a housing 1 105 including a base portion 1120 and lid portion 1 110 coupled by a hinge 1130.
- the corners (1126) of the base portion 1120 and the corners (1124) of the lid portion 1 110 can be curved.
- the edge interfaces of the corners of the base portion and the lid portion can be substantially flat as they meet with the top surfaces of the portions 11 10, 1 120.
- the edge interface 1 128 formed with the top surface 11 12 can be substantially flat proximate the corner 1 124).
- transition from the top surface of the base portion and to the wall surface 1 126a of the base portion 1120, and the transition from the top surface 1 112 to the wall surface 1 124a of the lid portion 1 110 can include a sharp or abrupt edge.
- the edge can be at least partially curved.
- FIG. 12 illustrates a perspective view of a privacy/security enclosure according to a further embodiment of the invention.
- the corners of the base portion 1220 (shown as 1224) and the corners of the lid portion 1210 (shown as 1214) can be curved.
- the base portion 1220 and the lid portion 1210 can include a curved transition region from their respective top surface (top surface 1211 of the lid portion 1210 being visible in the view of FIG. 12) to the wall surface 1216.
- the corners 1224, 1214) can include a reduction in the radius of curvature of the corners 1224, 1214 (as compared with the embodiments of FIG. 10 and 11).
- the reduced radius in the corners 1224, 1214 can reduce distortion and wear of the surfaces of the privacy/security enclosure 1200.
- FIGS. 13-15 show perspective views of various embodiments of a privacy/security enclosure.
- FIG. 13 illustrates a perspective view of a privacy/security enclosure 1300 adjacent to user device 10 in which the outer cover 1340 comprises a longitudinal feature 1330.
- the housing 1305 can comprise a base portion 1320 and lid portion 1310 including an outer cover 1340.
- the outer cover 1340 can include the feature 1340 that can extend at least a partial length of the housing 1305.
- the feature 1340 can comprise any color or texture as described earlier.
- the feature 1340 can comprise a window, layer, logo, emblem, display, or other functional or aesthetic feature.
- FIG. 14 illustrates a perspective view of a privacy/security enclosure adjacent to smart phone according to one embodiment of the invention in which the outer cover comprises a central feature
- FIG. 15 illustrates a perspective view of a privacy/security enclosure adjacent to smart phone according to one embodiment of the invention that includes a central feature extending across the width of the privacy/security enclosure.
- the housing 1405 can comprise a base portion 1410 and lid portion 1415 including an outer cover 1430.
- the portions 1410, 1415 are shown coupled by a pivot or hinge assembly 1420.
- the outer cover 1430 can include the centrally located feature 1440 that can extend at least a partial length of the housing 1405.
- the feature 1440 can comprise any color or texture as described earlier.
- the feature 1440 can comprise a window, layer, logo, emblem, display, or other functional or aesthetic feature.
- the housing 1505 can comprise a base portion 1510 and lid portion 1515 including an outer cover 1550.
- the outer cover 1550 can include the centrally located feature 1555 that can extend at least a partial length of the housing 1505.
- the feature 1555 can comprise any color or texture as described earlier.
- the feature 1555 can comprise a window, layer, logo, emblem, display, or other functional or aesthetic feature.
- a side 1540 of the privacy/security enclosure 1500 can comprise any color or texture as described earlier.
- the embodiments shown in FIGS. 13- 15 depict a user device 10 (e.g., a smart phone) positioned adjacent to the closed privacy/security enclosures, and in each enclosure represent one embodiment of a user device that can be enclosed by the adjacent privacy/security enclosure.
- the privacy/security enclosure can be closed. In some instances, closure and sealing of a base and lid portion of a privacy/security enclosure can be facilitated by the use of at least one tongue and groove.
- FIG. 3 shows a cross-sectional view of at least a portion of an outer rim of a shell enclosure of a privacy/security enclosure that can include a tongue and groove ring (shown as 325).
- the privacy/security enclosure can include single tongue and groove architecture. Some embodiments can include a groove positioned on a base portion and a single tongue positioned on a lid portion, configured and arranged to matingly engage when the privacy/security enclosure is closed.
- either one or both of a base portion and a lid portion can include an inner surface comprising a tongue and groove structure.
- the use of a plurality of tongue and grooves, with each tongue and groove including a conductive gasket can add incremental RF shielding based at least in part on the number of tongues, grooves, and conductive gaskets.
- FIG. 16 is a perspective view of an open privacy/security enclosure 1600 according to one embodiment of the invention.
- the privacy/security enclosure 1600 can comprise a main housing 1605 including a base portion 1610 and a lid portion 1615 enclosing an inner region 1602.
- a groove 1625 can extend at least partially around the edge 1610a of the base portion 1610
- a groove 1635 can extend at least partially around the edge 1615a of the lid portion 1615.
- FIG. 17 is a cross-sectional view of a privacy/security enclosure lid portion 1615 or base portion 1620 of the privacy/security enclosure 1600 of FIG. 16 according to one embodiment of the invention.
- the wall section 1700 can be coupled to wall section 1710, and surface 1750.
- the groove 1775 (representing either of the grooves 1625 or 1635 of FIG. 16) is shown at least partially extending into the wall section 1700.
- any privacy/security enclosure described herein can include two closely spaced tongue and groove structures (e.g., as represented by the cross- sectional view of FIG. 3).
- FIG. 18 is a perspective view of an open privacy/security enclosure 1800 according to another embodiment of the invention.
- the privacy/security enclosure 1800 can comprise a main housing 1805 including a base portion 1810 and a lid portion 1815 enclosing an inner region 1802.
- a groove 1825 can extend at least partially around the edge 1810a of the base portion 1810
- a groove 1835 can extend at least partially around the edge 1815a of the lid portion 1815.
- FIG. 19 is a cross-sectional view of a privacy/security enclosure lid portion 1815 or base portion 1820 of the privacy/security enclosure 1800 of FIG. 18 according to one embodiment of the invention.
- the wall section 1900 can be coupled to wall section 1905, and surface 1915.
- the grooves 1925, 1935 (representing either of the grooves 1825 or 1835 of FIG. 18) are shown at least partially extending into the wall section 1900.
- the one or more grooves can extend around an outer perimeter of the inner region (e.g., as shown in the example embodiment of FIG. 16), and can be positioned immediately adjacent to the inner region. In some other embodiments, the one or more grooves can extend around an outer perimeter of the inner region (e.g., as shown in FIG. 16), and can be located immediately adjacent to the outer surface of the base or lid portion. In some further embodiments, the one or more grooves can extend around an outer perimeter of the inner region (e.g., as shown in FIG. 16), and can be substantially centrally positioned between the inner region surface and the outer surface.
- any privacy/security enclosure disclosed herein can include an upper ring and a lower ring, in which the upper ring is capable of engaging the lower ring to form a seal.
- the upper ring can include at least two members capable of engaging a plurality of slots or grooves within the lower ring, and the lower ring can include a plurality of members capable of engaging a plurality of slots or grooves within the upper ring.
- the lower ring can include at least two members capable of engaging a plurality of slots or grooves within the upper ring, and the upper ring can include a plurality of members capable of engaging a plurality of slots or grooves within the lower ring.
- the upper ring can include at least one member capable of engaging a plurality of slots or grooves within the lower ring, and the lower ring can include one or more members capable of engaging one or more slots or grooves within the upper ring.
- the lower ring can include at least one member capable of engaging one or more slots or grooves within the upper ring, and the upper ring can include a plurality of members capable of engaging one or more slots or grooves within the lower ring.
- FIG. 20A is a cross-section view through region A of the privacy/security enclosure of FIG. 2 according to one embodiment of the invention.
- the section 2000 can comprise a lower ring 2010 and an upper ring 2015.
- the groove assembly 2050 (shown comprising ring seal 2070 in FIG. 20B) can comprise a seal 2025 position in the upper ring 2015, and at least one seal 2040 positioned in the lower ring 2010.
- the seals 2025, 2040 can comprise an RF or EMI o-ring seal in some embodiments.
- FIG. 20B is a perspective view of ring seal 2070 for use in a privacy/security enclosure according to one embodiment of the invention.
- the ring seal 2070 can comprise a corrugated frame comprising at least one groove 2080 bounded by at least one extension 2075.
- the at least one groove 2080 can be used to house a gasket or o-ring.
- any of these groove structures can be implemented with a tongue structure such as the tongue architecture illustrated in FIG. 20A, and can be used with or without an o-ring.
- one or more o-rings can be placed between any of the upper members of the upper ring and the slots of the lower ring, and/or between any of the members of the lower ring and the slots of the upper ring.
- any one of the plurality of o-rings can comprise an RF shield (i.e., can function as an RF attenuating gasket) and therefore, can enable a ring seal for use in a privacy/security enclosure.
- any one of the plurality of o-rings can comprise a polymer- based matrix material including metal filaments dispersed in a matrix to form a polymer composite material.
- the polymer matrix can comprise a homopolymer and/or copolymer, and can comprise an elastomeric polymer such as rubber.
- any one of the plurality of o-ring can comprise a carbon fiber-filled matrix material including metal filaments dispersed in a matrix to form a carbon fiber composite material.
- any one of the plurality of o-rings seals 2050, 2050 shown in FIG. 20A can be capable of forming a compliant privacy seal between an upper ring and lower ring of a privacy/security enclosure.
- the formed seal can be capable of functioning as an environmental barrier in addition to functioning as an RF shield.
- the formed seal can be capable of providing a water and/or moisture barrier in addition to function as an RF shield.
- the plurality of o-rings seals 2040, 2050 shown in FIG. 20A can be capable of forming a substantially water-resistant or substantially water-proof privacy seal between an upper ring and lower ring of a privacy/security enclosure. Further in some embodiments, when used in combination with the RF shield layer described earlier and shown in FIG. 3, the combination of the privacy seal form by the structure of FIG. 20A and the RF shield layer 305 of FIG.
- o-ring seals 2040, 2050 can be electrically conductive.
- more than one type of o-ring can be used with any of the upper members of the upper ring and the slots of the lower ring, and/or between any of the members of the lower ring and the slots of the upper ring structures described above.
- each o-ring type can be optimized for a specific function (either to at least partially block or attenuate RF, sound, light, moisture, etc.). However, any one o-ring can function to attenuate or at least partially block a combination of RF, sound, light, etc.
- one or more of the o-rings can function to attenuate RF, and one or more o-rings can function to attenuate sound, and one or more o-rings can function as an environmental barrier.
- one or more of the o-rings can be large or smaller than one or more other o-rings.
- one or more of the grooves can be larger or smaller than one or more other groove so as to be capable of cradling a complementarily-sized o-ring.
- FIG. 21 is a perspective view of a privacy/security enclosure 21 10 according to another embodiment of the invention.
- the privacy/security enclosure 2110 can include a housing 2105 comprising a bottom enclosure portion 21 15 including an inner region 2130, and a lid portion 21 10 coupled by at least one hinge mechanism 2105.
- the lid portion 2110 can also include an inner region 2135 to accommodate an upper portion 10a of a device 10.
- the bottom enclosure portion 2115 and the lid portion 2110 can be pivoted with respect to each other by the at least one hinge mechanism 2105.
- the privacy/security enclosure 2100 can include a bottom enclosure portion 2115, and a lid portion 2110 coupled along one edge proximate the at least one hinge mechanism 2105.
- the bottom enclosure portion 21 15 and the lid portion 2110 can be pivoted can be positioned and pivoted with respect to each other to enable at least partial access to the inner regions 2130, 2135 of the privacy/security enclosure 2100.
- the bottom enclosure portion 21 15 and the lid portion 2110 can be coupled along one longitudinal side, and angled at an angle of between about 0° and about 90° (shown as pivot angle P).
- the bottom enclosure portion 2115 and the lid portion 2110 can be coupled along one longitudinal side, and angled at an angle greater than about 90°.
- the bottom enclosure portion 21 15 and the lid portion 21 10 can at least partially enclose and/or cradle one or more mobile or stationary communication devices within their respective inner regions 2130, 2135. Moreover, in some embodiments, at least some portion of at least one mobile or stationary communication device can be enclosed by the bottom enclosure portion 21 15, and at least some portion (e.g., an upper portion 10a) of the mobile or stationary communication device can extend outwardly from the inner region 2130 defined by the bottom enclosure portion 2115.
- the lid portion 21 10 can include a latching mechanism 2127, and the bottom enclosure portion 2115 can include a latch 2125 coupled to the at least one side of the bottom enclosure portion 2115 of the privacy/security enclosure 2100.
- the lid portion 2110 can include a latch coupling 2140 coupled to at least one side of the lid portion 21 10 of the privacy/security enclosure 2100.
- the coupling 2140 can be coupled with the latch 2125.
- the latch 2125 can include other structures suitable for engaging and securing the bottom enclosure portion 2115 to the lid portion 21 10, including conventional clips, magnetic latches, Velcro latches, etc.
- FIG. 22 is a perspective view of a privacy/security enclosure 2200 according to another embodiment of the invention.
- the privacy/security enclosure 2200 can include a bottom enclosure portion 2210 including an inner region 2230, and a lid portion 2215 capable of being coupled to the bottom enclosure portion 2210.
- the bottom enclosure portion 2210 and the lid portion 2215 can be separated with respect to each other.
- the privacy/security enclosure 2200 can include the bottom enclosure portion 2210 and a separate lid portion 2215 capable of being positioned and aligned to allow a user to close the privacy/security enclosure 2200 (to substantially enclosing a mobile or stationary communication device such as the device 10 shown) by sliding the lid portion 2215 onto the bottom portion 2210 (e.g., similar to the operation of a conventional memory stick enclosure).
- a user can grasp the lid portion 2215 to slide off and remove the lid portion 2215 from the bottom enclosure portion 2210 so as to enable at least partial access to the inner region 2230 of the privacy/security enclosure 2200. As illustrated in FIG.
- the bottom enclosure portion 2210 can at least partially enclose and cradle a mobile or stationary communication device or devices (with upper portion 10 extending out of the inner region 2230). Moreover, in some embodiments, at least some portion of the mobile or stationary communication device can be enclosed by the bottom enclosure portion 2210 and at least some portion (an upper portion 10a) of the mobile or stationary communication device can extend outwardly and away from the bottom enclosure portion 2210 and into the lid portion 21 10 when the lid portion 2110 is position coupled to the bottom enclosure portion 2210.
- the bottom enclosure portions 21 15, 2210 can be longer or shorter than shown.
- the bottom enclosure portions 21 15, 2210 can be longer to enable a greater proportion of a mobile or stationary communication device to be enclosed and cradled, and to allow a lesser proportion of a mobile or stationary communication device to extend outwardly and away from the bottom portion. In some embodiments, this can provide a user or casual observer reduced access to one or more displays or one or more controls of one or more mobile or stationary communication devices. Conventional optical filters can also be used to limit casual observer observation in some embodiments.
- the access window can enable direct viewing access to the inner region of the privacy/security enclosure.
- the access window can comprise RF signal opacity.
- one or more mobile or stationary communication devices can be positioned in the privacy/security enclosure so that any conventional antenna can be immediately adjacent to the access window.
- the access window can enable a user to access one or more controls of any mobile or stationary communication device within the privacy/security enclosure.
- the privacy/security enclosure can include an inner region, capable of extending or retracting one or more mobile or stationary communication devices.
- a device cradled within the inner region of the privacy/security enclosure can be extended out of the inner region and/or retracted into the inner region.
- the lid portion can be a telescoping and retracting lid.
- the lid portions 115, 215 as shown in FIGS. 1 and 2 can comprise a telescoping and/or retractable lid. In this instance, at least a portion of the telescoping and/or retractable lid can be extended or retracted to at least partially cover or uncover the mobile or stationary communication device.
- the privacy/security enclosure can include at least one power source capable of providing power to the privacy/security enclosure and/or one or more devices within the privacy/security enclosure.
- Some embodiments of the invention include a rechargeable and/or replaceable battery capable of powering enclosure components such as microcontrollers and processors, speakers, and sound drivers, one or more light sources (such as LED's), switches, power amplifiers, signal generators, and any of numerous other electronic components.
- Some embodiments of the invention include a rechargeable and/or replaceable battery or another rechargeable and/or replaceable power source such as a power storage capacitor.
- any one of the privacy/security enclosures described herein can comprise or include a rechargeable and/or replaceable battery or other rechargeable and/or replaceable power source capable of charging a user device while positioned in the privacy/security enclosure.
- power can be delivered by plugging into an external power socket such as a wall socket or a car adapter socket.
- some embodiments include an onboard power source such as a rechargeable and/or replaceable battery or other power source (such as a power storage capacitor) as a sole power source that can be capable of charging a user device while positioned in the privacy/security enclosure.
- the onboard power source can be capable of charging the user device and/or can be capable of powering the user device.
- any of the embodiments depicted in the figures and description above can include passive attenuation or at least partial blocking of at least one of RF, sound, and/or light as described earlier and/or signals detectable by sensors within targeted devices (e.g. gyroscopes, accelerometers, magnetometers, light sensors, proximity sensors, cameras, thermal sensors etc.)
- Some further embodiments can include an active/powered attenuating, at least partially blocking, interfering and/or masking of at least one of RF, sound, light and/or signals detectable by sensors within contained devices, some of which are illustrated in FIGS.
- the privacy/security enclosure includes at least one system capable of active/powered attenuation.
- the privacy/security enclosure includes at least one system capable of active/powered attenuation.
- regulatory requirements may not allow transmission of interfering RF signals at the desired level
- positioning one or more RF transmitters along or inside of an RF shield may reduce transmissions to acceptable levels outside of the privacy/security enclosure.
- the same concept applies to active audio masking, with a benefit of any active audio transmission being less obtrusive because it is attenuated by the passive audio attenuation characteristics of the privacy/security enclosure.
- the privacy/security enclosure can include at least one system capable of actively attenuating and/or substantially masking or blocking sound and/or vibration.
- Other embodiments include at least one system capable of passively or actively attenuating or substantially blocking video and/or video or imaging (e.g., by passively or actively blocking a video camera).
- Other embodiments include at least one system capable of passively or actively attenuating, confusing, altering or substantially blocking data gathered by other sensors contained on a device targeted/within the privacy/security enclosure including, but not limited to, sensors such as thermometers, motion sensors, compass, proximity sensors, magnetic sensors, gyroscopes, gravitational sensors, thermal imaging sensors, humidity sensors, barometric sensors, UV sensors, step counters, orientation sensors, gaming sensors, rotational sensors, molecular sensors, olfactory sensors, accelerometers and others.
- sensors such as thermometers, motion sensors, compass, proximity sensors, magnetic sensors, gyroscopes, gravitational sensors, thermal imaging sensors, humidity sensors, barometric sensors, UV sensors, step counters, orientation sensors, gaming sensors, rotational sensors, molecular sensors, olfactory sensors, accelerometers and others.
- the privacy/security enclosure can actively substantially block or interfere with an electronic communication.
- the electronic communication can comprise an RF signal (such as a cellular, WiFi, a GPS signal, and a Bluetooth® signal), and/or an RFID or other RF tracking device.
- the privacy/security enclosure can include a conventional RF jammer.
- the privacy/security enclosure can include or comprise a rechargeable and/or replaceable battery enclosure capable of providing power to an RF jammer.
- the privacy/security enclosure can passively and/or actively attenuate and/or interfere with or at least partially block substantially all RF transmission including, but not limited to, a zero generation wireless signal, a first generation wireless signal, a second generation wireless signal, a third generation wireless signal, a fourth generation wireless signal, a fifth generation wireless signal, a global positioning satellite signal, (such as "GPS” or "GLONASS”), a Bluetooth wireless signal, RFID electromagnetic radiation, a WIFI wireless signal, a two-way radio RF signal, a UHF or VHF signal (such as a citizen's band radio signal or other radio signal emitted from a 'walkie talkie' type device), high-speed and millimeter wave signals, and a near-field wireless signal.
- a zero generation wireless signal such as "GPS” or "GLONASS”
- GLONASS global positioning satellite signal
- Bluetooth wireless signal such as "GPS” or "GLONASS”
- RFID electromagnetic radiation such as "GPS” or "GLONAS
- the privacy/security enclosure can include at least one transmitter capable of emitting a blocking or interfering signal.
- the blocking or interfering signal can be capable of attenuation, interfering with and/or at least partially blocking a signal from passing through the privacy/security enclosure, and can at least partially block, interfere and/or attenuate a signal confined to an area proximity of device, including inside and outside of the privacy/security enclosure.
- the privacy/security enclosure can at least partially block and/or attenuate a signal when the privacy/security enclosure is closed (i.e., when the enclosure is enclosing one or more user devices, or when the privacy/security enclosure is open).
- the privacy/security enclosure can emit a blocking or interfering signal when the enclosure is open or when the enclosure is closed.
- noise and/or a ripple is added to the DC power supply or ground inside the communication device.
- Some embodiments can include capacitive, inductive coupling, antenna coupling, or direct connection introduction of noise.
- single tone swept signal sources, band filtered white noise, multiple tones with modulation, or some combination of these techniques across some or all frequency bands can be used.
- various tone types or noise sources (or combination thereof) can be generated in non-regulated frequency bands (or within the transmission limits of regulated frequency bands) such that the sources interweave to create interfering signals in restricted regulatory bands.
- induced noise and/or a ripple can affect RF subsystems of some communication devices (e.g., such as the frequency synthesizers).
- noise and/or a ripple is added that can defeat multiple DC regulators within the communication device.
- FIGS. 23A-23C illustrate an active RF attenuation privacy/security enclosure according to another embodiment of the invention.
- some embodiments can include an interfering signal that can be coupled capacitively to the phone's circuits (e.g., FIG. 23A, showing privacy/security enclosure 2300 with active noise circuit 2310). In this instance, no wired electrical connection is needed in some embodiments.
- a ground connection can be made through the headphone jack or charging port (FIG. 23B, showing privacy/security enclosure 2325 with active noise circuit 2330).
- Some further embodiments can include an inductive interference of one or more circuits within the communication device (FIG. 23C with privacy/security enclosure 2350 and active noise circuit 2360).
- an interfering signal can be coupled inductively to the phone's circuits. In this instance, no electrical connection is needed, and various selected areas of the communication device can be targeted.
- a direct connection can relay an interfering signal via the charging port, test ports or multiple ports (headphone and charging port, battery contacts) of a communication device.
- passive components designed to alter a phone's antenna behavior are placed in strategic locations near the phone's antennas.
- FIGS. 24A-24B illustrates an active RF attenuation using a device positioned adjacent to the phone.
- the phone's antenna efficiency can be reduced so that reception and transmission of signals is disrupted.
- the active components can be positioned near the phone's antenna.
- a parasitic antenna (2410 in FIG. 24A and 2460 in FIG. 24B) can be placed near the phone's antenna(s). In this instance, the parasitic antenna can couple with the phone's antenna.
- the parasitic antenna can at least partially change the resonant frequencies and circuit matching of the phone's antenna, and the parasitic antenna can intercept RF power and channel it into a resistor.
- Some embodiments include a movable / switchable antenna.
- an external antenna system in order to disable or enable individual phone functions at will, can be either electrically controllable, or physically moveable so that its functionality can be turned on or substantially turned off.
- Some embodiments include the addition of electronic switches or phase shifters that allow more complex antenna structures to be configurable electronically.
- the resonant frequency, spatial layout, and directionality of the phone's antenna can be controlled automatically.
- individual phone systems can be affected, and can provide the ability optimize and/or enhance the antenna's attenuation in a given direction.
- a parasitic antenna can be switchable (e.g., electronically), and a parasitic antenna can be tuned for various frequency bands (device 2500 including switchable antenna 2510, shown as antenna 2515 with switch 2520 in FIG. 25B).
- an array of antenna elements shown as 2545 using the array 2530 shown in FIG. 25C with one or more antennas 2535
- FIGS. 26A-26B illustrate an active RF attenuation privacy/security enclosures 2600, 2650 according to another embodiment of the invention.
- an internal RF test port can be used to directly introduce RF signals into one or more receivers of the device (shown as 2610 coupled through port 2615).
- it can be possible to attenuate a received signal by shorting the internal antenna lead at a test port.
- an external RF interference generator can be directly connected to a phone's RF subsystem via a cable that, in some embodiments, can reduce the amount of radiated interference (shown as 2655 with switch 2660).
- Some further embodiments include modification of the battery of the device to ensure that the device is powered off when desired.
- FIGS. 27A-27B illustrate an active RF attenuation privacy/security enclosures 2700, 2750 according to another embodiment of the invention.
- the circuit 2715 it can be possible transmit RF interference through the phone's antenna. In some embodiments, this can be achieved by adding an electromagnetic structure outside the phone. This structure can induce concentrated and targeted RF interference into vulnerable circuits in the phone.
- an antenna coupling can be utilized to disrupt one or more functions of a communication device.
- RF interference can be injected into the phone via an external antenna (shown as 2760 in FIG. 27B) that is designed to optimize coupling to the phone's internal antenna. In some embodiments, inductive coupling is likely to cause less electromagnetic interference than antenna coupling.
- Some further embodiments can include the use of a transparent Faraday cage (e.g., as depicted in FIG. 28A showing privacy/security enclosure 2800 including transparent Faraday cage 2810).
- the privacy/security enclosure 2850 can include a very low power base station 2870 coupled to external antenna 2865, and transmitting to/from antenna 2860, which in some embodiments can prevent the communication device from logging or connecting to actual base stations.
- Some embodiments include an option to enhance communication when the privacy/security enclosure and/or any enclosed user device is not in a blocking mode.
- the privacy/security enclosure and/or the user's device(s) can be controlled to enable or disable communication of RF, sound, and/or light or other signals detectable by sensors within the targeted device.
- these features can be activated directly by a control on or within the privacy/security enclosure and/or within the user's device(s), or by a remote device.
- the privacy/security enclosure can include an option to selectively at least partially block or unblock one or more communication frequencies.
- the communication frequency can be an RF frequency, an audio frequency, or a light frequency.
- the privacy/security enclosure and/or the user's device(s) can be controlled to partially or substantially fully enable or disable communication of one or more frequencies of RF, sound, light and/or other signals detectable by sensors within the targeted device(s).
- these features can be activated directly by a control within the privacy/security enclosure, and/or on or within the user's device, or by a remote device.
- Attenuation and/or masking and interference of all RF, sound, and/or light frequencies can be turned off or turned on.
- frequency selection can be used to control the passage and emission of RF, sound or light frequencies to and from the enclosed user device(s) without affecting other internal functions of the user device (e.g., no disruption of internal function of devices such as smart phones, tablets, or laptops are affected, and calendars, MP3 players, readers, apps, games etc. that do not require the interfered with, masked or blocked signal to function), while positioned within an inner region of the privacy/security enclosure.
- Some embodiments of the invention include one or more systems to measure ambient field levels.
- ambient field levels of RF, sound, and/or light can be measured for purposes of actively interfering with, masking or blocking RF, sound or light.
- measurements can be made by at least one component of the privacy/security enclosure and/or by one or more user devices coupled to the privacy/security enclosure.
- ambient field levels can be provided as a function of strength of various frequencies.
- the privacy/security enclosure can include at least one active interfering, masking and/or blocking control of RF, sound and/or light or other signal whose output is impacted by one or more variables provided by one or more systems to measure ambient field levels.
- ambient field levels of RF, sound, and/or light can be measured for purposes of actively interfering, masking and/or at least partially blocking RF, sound or light at an interfering, masking and/or blocking power level required for a specific effect.
- a privacy/security enclosure can comprise at least one component or device for active blocking of video devices.
- the privacy/security enclosure can include at least one device capable of blinding a camera to prevent unauthorized view.
- the privacy/security enclosure can include at least one light source capable of overdriving a camera and/or imaging chip.
- at least one light emitting diode can be configured to overdrive an imaging device of a user's device(s) with the privacy/security enclosure.
- other light or optical sources can be used to blind and/or overdrive an imaging device.
- Some embodiments can include active attenuating, interfering, masking and/or substantially blocking of sound. Further, in some embodiments, active attenuation can be configured to modify how sound is received, processed, and transmitted by the communication device.
- FIGS. 29, 30A-30B, and 31-33 illustrate active acoustical attenuating privacy/security enclosure devices in accordance with some embodiments of the invention.
- some embodiments can de-correlate the pressure the microphones see from the sound pressure created by the speech that has to be masked.
- a sealing gasket 2920 can be installed around each microphone 2915 that creates a sealed chamber 2918 around each microphone 2915.
- a gasket or enclosures/shield attached to the gasket can be equipped with at least one speaker in order to generate a masking sound.
- a pneumatic piston 2940 coupled to a motor 2930 can be used.
- a gasket 2920 is installed around each microphone 2915 that can create a sealed chamber around each microphone 2915.
- each chamber created in part by the gasket 2920 can be coupled to or equipped with a pump that can pressurize and/or depressurize the microphone chamber, thereby degrading microphone capability/performance.
- FIG. 30A illustrates an active acoustical attenuation privacy/security enclosure 3000 according to another embodiment of the invention.
- mechanical motion can be used to create a noise that will be superimposed to the speech that has to be masked. If the level of this parasitic noise is high enough compared to the speech level, the resulting sound will not be understandable.
- the parasitic noise can be induced using a variety of methods.
- a vibrator 3010 can be leaned against the phone (e.g., close to each microphone) and a parasitic sound can be produced by vibration of the vibrator through impacts against a surface coupled to the microphone. Referring to FIG.
- a cymbal or a bell assembly 3050 can be used adjacent to the microphones.
- sound can be directed to the microphone (within privacy/security enclosure 3015) from the cymbal or a bell 3020 and/or from sound produced by impact of the cymbal or a bell with an adjacent structure 3055.
- the vibrator can be an electromechanical component (piezoelectric actuator) or a clock-style wind up mechanism (shown as 3025).
- the vibrator can be a brush with multiple hairs that are pushed and rotated against a hard surface to create multiple friction sounds.
- Some embodiments of the invention can deploy electrically produced noise. Some embodiments can use electrically produced noise (via a speaker for example) to mask the sound picked up by the microphone. For example, some embodiments include a chirp or warble noise that can be a single tone with a frequency that evolves with time (see for example FIG. 31 showing a plot 3100 including noise profile 3105). Some other embodiments can include an envelope of noise, where the noise's frequency content is shaped to the typical human speech frequency content in order to efficiently mask it. Some embodiments include a self-babble. In this instance, speech is recorded with the enclosure, then processed (played backwards, mixed, filtered, etc.). Some further embodiments include a speech shaped noise.
- the noise's frequency content is real-time amplitude shaped to the speech to match in order to efficiently mask it.
- Some other embodiments include saturating noise.
- a single frequency tune is played at the most sensitive frequency of the microphones in order to saturate the signal.
- Some embodiments include an electromagnetic source to produce a parasitic signal close to the phone (source 3205 directed to privacy/security enclosure 3200 depicted in FIG. 32). This signal will induce an electrical signal in the system which will be superposed to the electrical signal given by the microphones (depending on the susceptibility of the system).
- a physical barrier can be used to attenuate sound.
- FIG. 33A-B illustrates active acoustical attenuation privacy/security enclosures 3300, 3325 according to another embodiment of the invention.
- a physical shield 3300 can be positioned very close the microphones in order to attenuate the sound and pressure at the microphones.
- the physical barrier can comprise a switchable shield.
- a shield can be mounted on rails, and can be placed in front of the microphones whenever sound masking is required.
- Some embodiments can include a horn, or trumpet, or pipe shaped shield.
- a shield is shaped to attenuate external speech signal and to amplify a generated parasitic signal.
- Some other embodiments can include an audio conductive material.
- a conduit 3330 can be installed between an additional speaker and the microphones.
- the conduit 3330 can be filled with a sound conductor, and one of its extremities can be mechanically coupled to the speaker 3340.
- the other extremity can be placed as closed as possible to the microphones of a user's device within the privacy/security enclosure 3325 in order to deliver a parasitic sound as efficiently as possible.
- the shell 3332 of the conduit 3330 can act as a physical shield, while the sound conductor material 3335 can act as an amplifier for the parasitic sound.
- the sound conductor 3335 can be aluminum, brass, glass, or other material that can conduct sound to a greater degree than air.
- an assembly of acoustical attenuation covers can form an envelope covering a portion of one or more communication devices (such as a smart phone).
- some embodiments can comprise a sock-like enclosure that can cover all or a partial portion of one or more communication devices.
- the sock-like enclosure can include or be coupled to one or more acoustical attenuation materials or structures capable of muffling one or more microphones within the communication device.
- FIGS. 34A-34D illustrates assembly and perspective views of a sock assembly 3400 and components for a privacy/security enclosure in accordance with some embodiments of the invention
- FIG. 35 depicts the sock assembly 3400 of FIGS.
- FIGS. 34A depicts a sock assembly 3400 including an enclosure 3405 comprising a base cap 3415, hood cap 3410, and a strap 3420 for coupling the caps 3415, 3410.
- FIG. 34B shows a cross-section of a privacy/security enclosure 3450 that includes a sock assembly portion 3460 supporting a user device 10
- FIG. 34C shows a cross-section of a privacy/security enclosure 3465 including an enclosure 3455 that includes a sock assembly portion 3475 including blocking foam pads 3470 supporting a user device 10.
- the end cap assembly 3425 including upper and lower blocking foam pads 3427, 3429 shown in FIG.
- the privacy/security enclosure 3500 is shown comprising 3505 including a base portion 3510 and lid portion 3515.
- the sock assembly 3400 is shown position in the base portion 3510 of the privacy/security enclosure 3500 enclosing user device 10.
- Some embodiments of the invention can comprise a double sock design that uses two end covers that are connected with an elastic band.
- the upper and/or lower sock covering can apply blocking material (such as a foam material) against microphone ports covered by or adjacent to the respective sock.
- blocking material such as a foam material
- an axial force applied by the elastic band and the upper sock can force the blocking material against the lower microphone port to increase sound attenuation.
- the axial force applying the blocking material to microphones covered by or adjacent to a respective sock can be generated by springs, friction springs, ratchets, or any of a variety of other mechanisms.
- the upper sock or interior linings or other portions of the interior of the enclosure can apply the blocking material to one or more microphone ports located on the top and bottom of the enclosed device(s).
- the sock assembly enclosing one or more communication devices can float inside the enclosure or can include clearance holes.
- blocking material pads located on the top and bottom covers can squeeze the phone between the privacy/security enclosure halves only when the privacy/security enclosure is closed, nearly closed or when the sock is in a down position (regardless of the open/close status of the enclosure itself).
- the upper and lower sock can provide vibration isolation to one or more enclosed communication devices.
- the sock-like enclosure can comprise a single piece, and in other embodiments, the sock-like enclosure can comprise a plurality of coupled pieces. Some embodiments can include one or more gaps or apertures in the sock. In some embodiments, the sock-like enclosure can include portions that are disposable or re-useable. In some embodiments, various portions of the sock-like enclosure can be approximately equal in size. In other embodiments, portions of the sock-like enclosure can be smaller or larger than other portions. For example, FIG. 36 depicts another embodiment of a sock assembly 3625 within a privacy/security enclosure 3600 in which the upper sock portion (shown as 3627) has a reduced size over the example provided in FIGS.
- This example embodiments shows the privacy/security enclosure 3600 comprising a main housing 3605 including a base portion 3610 coupled to a lid portion 3615.
- the sock assembly 3625 is shown enclosing a user device 10 and positioned in the base portion 3610.
- the smaller upper sock portion 3627 can apply clamping force to the lower microphone blocking foam (not shown), and in some embodiments, can be positioned in the privacy/security enclosure so that the blocking foam pads in the two enclosure portions (i.e., halves) can be positioned against the front and rear microphone ports on the communication device (i.e., such as on an Apple iPhone ®).
- the upper blocking foam pad 3631 is shown coupled to the lid portion 3615, and can be positioned to couple or cover a microphone of the user device 10 when the lid portion 3610 is closed.
- iPhone® is a trademark of Apple Inc., registered in the U.S. and other countries.
- FIGS. 37A-37C depict a gel-piston assembly for acoustical control within a privacy/security enclosure 3700 in accordance with some embodiments of the invention.
- the privacy/security enclosure 3700 (shown as including main housing 3705 enclosing user device 10) can include a gel-like material 3725 constrained on at least five sides which, when deformed by the top enclosure half during closure, can press blocking foam against the bottom microphone port.
- the gel-like material 3725 can be gel like in that it is incompressible, cohesive, viscous, and mechanically robust, capable of repeated opening and closing operations of the privacy/security enclosure. This can allow the gel-like material 3725 to perform its own foam retraction function when the privacy/security enclosure is opened.
- the user can set the phone in a pocket with clearance, and the gel-like material 3725 can then remove that clearance and compress the blocking foam when the enclosure is closed.
- FIG. 37B shows a cross-sectional view of a privacy/security enclosure 3750 including the gel-like material portion 3755 coupled at an interface 3756 with an end of the user device 10 and an interface 3757 at the end of the main housing 3752.
- FIGS. 38A-38C depict a cover actuated acoustical control assembly 3800 in accordance with some embodiments of the invention.
- FIG. 38a shows a perspective view of the cover actuated acoustical control assembly 3800 with a main housing 3805 enclosing a user device 10.
- a privacy/security enclosure 3800 cover mechanism 3825 can comprise a leaf spring or two-link assembly 3827 which can be displaced in a downward direction by the closing upper portion of the privacy/security enclosure (not shown).
- FIG. 38B shows a partial front view of the privacy/security enclosure 3800 cover mechanism 3825, and FIG.
- the structure can act on another leaf or linkage pair to translate the lateral force to a longitudinal force thus removing clearance between the communication device and blocker, and can apply sealing force against the bottom microphone port.
- the privacy/security enclosure cover mechanism 3825 can comprise a leaf spring or two-link assembly 3827 which can include a controllable stroke.
- the privacy/security enclosure cover mechanism 3825 can comprise a leaf spring or two link assembly 3827 which can include force cover actuation or a user button actuation.
- the privacy/security enclosure can include at least one sock-like enclosure that is at least partially mechanized.
- FIGS. 39A-C show different views of a mechanized foldable sock assembly 3900 for a privacy/security enclosure in accordance with some embodiments of the invention.
- one or more communication devices can be placed in the mechanized foldable sock assembly 3900 that includes one or more articulating members 3925 that can be configured to move a portion 3910 of a sock-like enclosure 3905 to at least partially enclose at least one communication device (such as a user device 10).
- the user can press down on the upper portion 3910 of the mechanized foldable sock assembly 3900 to induce the collapsing of the cradle 3907 in a longitudinal direction as well as a folding of the cradle 3907 down into the lower enclosure half (3915).
- the mechanized foldable sock assembly 3900 can latch in this state with the privacy/security enclosure closed.
- the upper portion 3910 can include clearance holes 3912 for blocking foam to be attached to the top and bottom portions of the privacy/security enclosure.
- the mechanized foldable sock assembly 3900 can enable a controlled force to be applied to the blocking foam.
- 39C shows a partial cross-section of the mechanized foldable sock assembly 3900 enclosed within a case or shell 3945 including case halves 3950, 3955.
- the cross-sectional view of the upper portion 3910 shows blocking foam 3902 in position.
- the mechanized foldable sock assembly 3900 can enable a user to control the position of one or more sock-like enclosures, and control any portion of the communication device that can extend from and/or be visible from any vantage point.
- FIGS. 40A-40C illustrates further embodiments of the invention including a mechanized foldable sock assembly 4000 for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 40B shows the cradle assembly 4001 with upper and lower enclosure portions 4005, 4010 and articulating assembly 4003 including upper and lower rocker arms 4025, 4020.
- FIG. 40A shows a partial view of the mechanized foldable sock assembly 4000 in an upright configuration.
- two rockers 4070, 4080 can actuate which in turn press blocking foam 4040 against microphone ports (shown in FIG. 40C).
- the block foam mechanism can include a vibration isolation feature because the communication device lacks direct contact with either of the privacy/security enclosure portions. Further, by using an articulating cradle and/or integrated rockers, the blocking foam application force can be relatively high with little effort from the user due to the trigonometric advantage of the linkage arrangement.
- FIGS. 48-52 illustrate various views of a sock assembly 4800 including a device cradle assembly 4805 and various device positioning assemblies for raising and lowering the position of at least one device within the cradle assembly 4805.
- FIG. 53 depicts an assembly view of the sock assembly 4800 of FIGS. 48-52.
- FIGS. 48 and 49 illustrate perspective views of a sock assembly 4800 for a privacy/security enclosure in accordance with some embodiments of the invention.
- the sock assembly 4800 can comprise a cradle assembly 4838 comprising a moveable cradle 4840 and a fixed cradle 4830 coupled to a base portion 4810.
- the base portion 4810 can include one or more elements 4835 for interfacing with a cradled device (such as a user device 10).
- the element 4835 can comprise a foam, or other suspension component.
- Some embodiments of the invention include a cradle assembly 4805 structured to guide and facilitate capture and fixation of a cradle device.
- the moveable cradle 4840 can be slidably positioned in the sock assembly 4800 from a first end 4805a towards a second end 4805b of the sock assembly 4800.
- the 4840 can include a cavity 4841 for positioning at least one device (such as a user device 10) within the sock assembly 4800. Further, in some embodiments, when positioned in the cavity
- any cradled device can be moveably positioned within the sock assembly 4800 by slidably moving the moveable cradle 4840 in the sock assembly 4800 from the first end towards 4805a the second end 4805b of the sock assembly 4800. Movement of the cradle 4840 can be facilitated using a guide cavity 4825 positioned in the guide base 4820 that is coupled to the fixed cradle 4830 and the base 4810 (see FIG. 53).
- the moveable cradle 4840 can include one or more apertures or slotted portions to facilitate access to one or more functions of a cradled device.
- an upper side of the moveable cradle 4840 can include a slot portion 4840a.
- a user can reach into the sock assembly 4800 to access one or more functions of a cradled device by accessing the device through the slot portion 4840a.
- the slot portion 4840a can facilitate a user creating grip and/or leverage to position the cradle 4840 and any cradled devices in a fixed position.
- the moveable cradle 4840 can comprise one or more holes 4840b (and clustered into groups in some embodiments) in specific areas of the upper and/or lower sock assembly 4800. In some embodiments, this can allow sound to pass to or from the interior of the sock assembly 4800 (i.e. to allow use of the speakerphone microphone and speaker while the phone or other device is in the sock assembly 4800). In some embodiments, a device positioned in the cradle and sock assembly 4800 while it is in a fixed position may have audio blocking material applied to a microphone(s) enclosed by or adjacent to a sock.
- mechanisms to push the device away from such audio blocking material can be included in the sock assembly 4800.
- the mechanisms can be one or more springs or material that reverts to an expanded volume when not under some level of pressure or any other such typical mechanism.
- a construct attached to a portion of the interior, interior lining or privacy/security enclosure base or lid can be used to ensure that sock assemblies 4800 are pushed to a downward position (regardless of whether or not they are enclosing a transmission device), when the enclosure is being closed. In some embodiments, this configuration can prevent damage occurring to interior mechanisms, assemblies, and other such contents by the closing and/or latching of the enclosure.
- the privacy/security enclosure can include one or more mating plugs for headphone, power, and other such ports can be included in various sock mechanisms to assist users with the proper orientation of their device in the sock.
- privacy/security enclosure sock assemblies can provide pass through holes for charging cables or other features, enabling charging or other functions while the communication device is in the sock and the enclosure is open or closed.
- Other embodiments of the invention can comprise a privacy/security enclosure that can provide for charging devices (or other such functions) while one or more devices are in the sock (regardless of whether open or closed). In some embodiments, this can be achieved via mating connectors (i.e.
- male connectors on the interior of the sock assembly 4800 plugged into the device itself while in the sock).
- the male connectors can then be connected through the sock assembly 4800 to female connectors on the exterior of the sock assembly 4800.
- native power and other such cables e.g. for headsets etc.
- the privacy/security enclosure including a sock assembly 4800 can have the ability to handle multiple makes, models, and types of devices, while still providing levels of audio, video, RF and other forms of protections.
- the sock assembly 4800 can be sized to house the largest of the supported devices and have mechanisms that guide and/or secure or grip a varying number of smaller devices via clamping, springing, elastic or other such mechanisms.
- the positioning of blocking foams, tuning of speaker volumes, and placement of active audio protection speakers and/or microphones can be tuned to be able to handle multiple supported devices within the same enclosure.
- the privacy/security enclosure can include active audio components broadcasting masking sounds into a sock assembly 4800, regardless of whether the enclosure is open or closed, and adjustable seals can be used at the entry of the sock assembly 4800 in order to reduce masking audio sounds leaving the interior of the sock.
- the cradle assembly 4805 can be slidably moved in the sock assembly 4800.
- FIG. 53 illustrates an exploded assembly view of a sock assembly 4800 for a privacy/security enclosure in accordance with some embodiments of the invention.
- the sock assembly 4800 can comprise at least one rail 4880 and at least one rail slot 4825.
- the cradle assembly 4805 can be coupled to the at least one rail 4880.
- the at least one rail 4880 can couple to the at least one rail slot 4825.
- the cradle assembly 4805 can be slidably moved in the sock assembly 4800 by sliding the cradle assembly 4805 coupled to the at least one rail 4880 that is slideaby coupled to the at least one rail slot 4825 by a pivot 4860.
- the cradle assembly 4805 can be slidably moved between defined positions defined a position ladder 4850 within the guide base 4820 of the sock assembly 4800.
- FIG. 50 illustrates a rear perspective view of a sock assembly 4800 for a privacy/security enclosure showing a plurality of position notches 4855 within the position ladder 4850
- FIG. 52 illustrates a cross-sectional view of a sock assembly 4800 for a privacy/security enclosure taken through the cross-section line shown in FIG. 52 showing the position notches 4855 in accordance with some embodiments of the invention.
- the position notches 4855 can be formed within a portion of the guide base 4820.
- the position notches 4855 can be formed in a lower side of the sock assembly 4800 as part of the position ladder 4850.
- the base portion 4810 can comprise a notch aperture 4812.
- the notch aperture 4812 can be positioned adjacent one or more of the position notches 4855 so that the notches 4855 are visible through the rear of the sock assembly 4800.
- a spring 4870 can be coupled to the pivot 4860 at one end and to a fixed point 4875 of the guide base 4820. To enable movement of the cradle 4840, a stop 4885 coupled to the at least one rail 4880 can incrementally move between one or more of the notches 4855 under tension of the spring 4870.
- the movement of the cradle 4840 is bounded by the end 4822 coupled to the guide base 4820 at the first end 4805a of the sock assembly 4800, and towards a second end 4805b of the sock assembly 4800 by coupling of the stop 4885 to the end 4852 of the position ladder 4850.
- Some embodiments of the previously mentioned sock assembly 4800 can include one or more defined positions, which in some embodiments can enable an enclosed device to be positioned up to an angle of about 90° with a level surface.
- the device can be moved from an elevated position in the sock assembly 4800 to a substantially flat position (i.e., substantially parallel with the surface that is supporting the privacy/security enclosure).
- Some embodiments can use a tensioner such as a spring 4870, multiple springs, a dampened spring, a spring-loaded or biased peg, or other conventional biasing element to apply a force to the device in one or more elevated or angled positions and when moving the device from one defined position to another defined position.
- the cradle 4840 can be pivotally positioned in the sock assembly 4800.
- the cradle 4840 can include a pivot mechanism (pivot 4860) for pivotally positioning at least one device within the sock assembly 4800.
- a cradled device when pivotally positioned in the cavity of the sock assembly 4800, can be pivotally positioned toward or away and/or at least partially out of the sock assembly 4800 by pivotally moving the cradle 4840 in the sock assembly 4800 using the pivot mechanism 4860.
- FIG 51 illustrates a top view of a sock assembly 4800 for a privacy/security enclosure in accordance with some embodiments of the invention, and shows a pivot mechanism 4860 positioned at the base 4841 of the cradle 4840 within the sock assembly 4800.
- the cross-sectional view and exploded assembly view shown in FIGS. 52 and 53 illustrate the pivot mechanism 4860 coupled the cradle 4840 in accordance with some embodiments of the invention.
- the pivot mechanism 4860 can comprise a plurality of position ridges 4861 positioned on a pivot gear 4865 and configured to couple with a position stop 4862.
- the pivot mechanism 4860 can be coupled to at least one tensioner, such as a spring 4870, multiple springs, a dampened spring, a spring-loaded or biased peg, or other conventional biasing element to apply a force to the cradle assembly and any object nestled within the cradle assembly.
- the cradle 4840 can be pivotally rotated using the pivot mechanism 4860 by rotating the pivot gear 4865 to engage at least one of the plurality of position ridges 4861 with the position stop 4862.
- the tensioner spring 4870
- the tensioner can extend and store potential energy.
- any stored potential energy within the tensioner can be used to at least partially move the cradle 4840.
- an extended tensioner can be used to reversibly pivot the cradle 4840 and move the cradle 4840 towards the sock assembly 4800 housing and/or return the cradle 4840 to a prior position adjacent or within the sock assembly 4800 housing.
- at least a portion of the tensioner can be viewed and/or accessed through the rear of the sock assembly 4800.
- any device positioned within the cradle assembly can be rotated away from the sock assembly 4800 and/or rotated towards the sock assembly 4800.
- a device such as a phone
- a user can rotate the cradle 4840 to facilitate positioning or using a device within the cradle 4840.
- the cradle 4840 can be pivoted away from the sock assembly 4800 housing using the pivot mechanism, and a device (such as a phone) can be positioned into the cradle 4840.
- a user can use the pivot gear 4865 to engage at least one of the plurality of position ridges/position stops (or infinite positions with pivot mechanisms using a tensioned spring or other such mechanism) such that a device can be more easily loaded into the cradle 4840 or used/operated while within the cradle 4840.
- the position (flat or elevated to any degree) of the device can modify the security level applied by the privacy/security enclosure.
- a basic level of audio security can include the device operating normally except for using one or more of the microphones enclosed by or adjacent to any of the sock assemblies (e.g. via the application of attenuating technologies such as blocking foam or speakers transmitting a masking signal) or being compressed against blocking foam on the bottom side of the enclosure or enclosure liner or interior.
- the privacy/security enclosure can be configured so that one or more microphones covered by any portion of the sock mechanism can include an audio masking signal applied within or near to the sock, and interfering with the microphone's ability to record and recover non-masking audio content, regardless of sock position/elevation.
- one or more antennas can be positioned on the outside of the Faraday cage of a privacy/security enclosure, and tuned to one or more frequencies (e.g., wideband frequencies).
- the one or more antennas can be coupled to one or more antennas internal to the Faraday cage.
- the antennas can be permanent or switchable (e.g., switchable using a mechanical or electro-mechanical switch). The antenna gain, directionality, radiation pattern, and coupling characteristics to other antennas can be changed and modified to meet any specific performance standard.
- the performance characteristics can be modified by a variety of parameters including the distance to the Faraday cage (which can detune antennas), the type of dielectric material used in the antenna, and the choice of electromagnetic band gap structures or other such materials or devices to optimize antenna performance.
- the combination of these capabilities are used to allow all or a specific subset of frequencies into the privacy/security enclosure, and through to the housed device.
- examples of selective frequency antenna use can include for example, allowing Bluetooth® through to play music in the car on the car's speakers, allowing cellular signals through to receive calls, allowing NFC/RFID through for mobile payments/checkout while at least partially blocking all other frequencies etc., and not attenuating WiFi, GPS or Bluetooth® such that retail stores or other entities, devices, or people cannot or have more difficulty tracking movement and/or location.
- Some embodiments of the invention include a privacy/security enclosure including one or more external antennas that can comprise of one more antennas with a wide bandwidth to cover cellular, GPS, WIFI/BT (700M-2.7GHz + margin) and/or one or more antennas to operate within narrow, more specific frequency bands (e.g. Bluetooth).
- the external antenna(s) can include a high antenna gain (to compensate for coupling and connection loss).
- the external antenna(s) can preserve the cellular antenna pattern, and in some embodiments, the antenna(s) can be omnidirectional.
- the external antenna(s) can be configured to function near a metal surface (e.g., such as a shield box).
- Some embodiments of the invention include a privacy/security enclosure including one or more internal/coupling antenna.
- the one or more internal/coupling antenna can be capable of operating at a wide bandwidth to cover cellular, GPS, WIFI/BT (700M-2.7GHz + margin) and/or be tuned to best operate within narrow, more specific frequency bands (e.g. Bluetooth® etc.).
- the internal/coupling antenna can include a high coupling efficiency, and be capable of functioning near a metal surface (e.g., such as a shield box).
- the internal/coupling antenna can be compatible with multiple cell phones.
- the internal/coupling antenna can enable selectivity options for cellular and connectivity (GPS, WIFI/BT) (i.e. through filtering technologies, antenna tuning, etc.)
- FIG. 41 illustrates an internal/external antenna design for a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 42 illustrates an internal/external antenna design for a privacy/security enclosure including an internal antenna ground plane connected to the shield box
- FIG. 43 illustrates an internal/external antenna design for a privacy/security enclosure including an internal and external antenna ground plane connected to the shield box in accordance with some embodiments of the invention. As illustrated in FIG.
- the privacy/security enclosure 4101 can enclosed a cell phone comprising cellular, GPS, and/or WIFI/BT antennas (shown as 4100).
- the privacy/security enclosure 4101 can comprise a shield box 41 10 enclosing the device, and two coupled antennas.
- the privacy/security enclosure 4101 can comprise a ground plane externally coupled to the external antenna, and a ground plane enclosed within the shield box, coupled to the internal antenna.
- FIG. 41 shows the privacy/security enclosure 4101 with an internal and an external antenna radiating element (shown as antenna radiating element 4150 with antenna ground plane 4160, and antenna radiating element 4130 with antenna ground plane 4140) including a coupling 4120 between the antennas.
- the privacy/security enclosure 4201 can enclosed a cell phone comprising cellular, GPS, and/or WIFI/BT antennas (shown as 4200).
- the privacy/security enclosure 4201 can comprise a shield box 4210 enclosing the device, and two coupled antennas.
- the internal ground plane of the internal antenna can be coupled to the shield box.
- the privacy/security enclosure 4201 includes an internal and an external antenna radiating element (shown as antenna radiating element 4250 with antenna ground plane 4260, and antenna radiating element 4230 with antenna ground plane 4240), with a coupling 4220 between the antennas.
- both the external ground plane and the internal ground plane can be coupled to the shield box.
- the privacy/security enclosure 4301 can enclosed a cell phone comprising cellular, GPS, and/or WIFI/BT antennas (shown as 4300).
- the privacy/security enclosure 4301 can comprise a shield box 4310 enclosing the device, and two coupled antennas each coupled to the shield box 4310.
- the internal ground plane of the internal antenna and the external antenna can be coupled to the shield box.
- the privacy/security enclosure 4301 includes an internal and an external antenna radiating element (shown as antenna radiating element 4350 with antenna ground plane 4360, and antenna radiating element 4330 with antenna ground plane 4340), with a coupling 4320 between the antennas.
- any number of the features described earlier can be implemented in the privacy/security enclosure 4400 illustrated in FIGS. 44-47. Further, in some embodiments, any number of the features described earlier can function based at least in part on the relative position of the base portion 4410 with respect to the lid portion 4415 of the main housing 4405. In some embodiments, the base portion 4410 and/or lid portion 4415 or both can include at least one extended portion for at least partially housing and providing attachment for various portions of a pivot mechanism.
- FIG. 44 illustrates a front perspective view of a privacy/security enclosure 4400 in a closed position (i.e., the base portion 4410 and lid portion 4415 are coupled, and positioned substantially parallel with respect to each other. As can be seen in FIG.
- the privacy/security enclosure 4400 can include a contoured region 4427 comprising an outward extension of the lid portion 4415 coupling to an outward extension of the base portion 4410.
- at least a portion of the outwardly extending portions of the base and lid portion 4415 can at least partially house a pivot mechanism 4425.
- the privacy/security enclosure 4400 can comprise an extended portion formed from portions of an outward extension of the lid portion 4415 coupling to an outward extension of the base portion 4410.
- the extended portion can be comprise a substantially rounded and contoured shape, extending gradually outward from each end of the privacy/security enclosure 4400 to generally centrally positioned region extending along at least a partial length of the privacy/security enclosure 4400.
- the central region of the extended portion can be positioned substantially equidistant from each end of the privacy/security enclosure 4400.
- the extended central portion can be comprise a substantially rounded and contoured shape, generally smoothly integrated with portions of the extended portion at each end of the privacy/security enclosure 4400,
- the extended portion can comprise other shapes than those illustrated.
- the extended portion can comprise substantially rounded and contoured portions, and/or angular, square, or rectangular portions.
- the base and lid portions 4410, 4415 of the privacy/security enclosure 4400 shown in FIGS. 44-45 can be moved with respect to each to provide access to the inner region 4402 of the privacy/security enclosure 4400.
- the privacy/security enclosure 4400 can include a bottom enclosure portion (comprising the base portion 4410), and a lid portion 4415 coupled along one edge.
- each portion 4410, 4415 can be positioned and pivoted with respect to each other to enable at least partial access to the inner region 4402 of the privacy/security enclosure 4400.
- the base portion 4410 and a lid portion 4415 can be pivotally moved with respect to each other to open and close the privacy/security enclosure 4400.
- the privacy/security enclosure 4400 can include a base portion 4410 and a lid portion 4415 coupled by at least one pivot mechanism 4425.
- the privacy/security enclosure 4400 can include a base portion 4410 and a lid portion 4415 coupled by at least one conventional hinge mechanism 4425.
- the hinge mechanism 4425 can comprise any of the aforementioned hinge mechanisms.
- the base portion 4410 or lid portion 4415 or both can include one or more apertures for providing attachment of various portions of a pivot mechanism within the extended portion (not shown).
- the hinge mechanism 4425 can be at least partially shielded from view by integrating at least partial portions of the hinge mechanism within portions of the extended portion (e.g., the outwardly extending portions of the base and lid portions 41 10, 41 15 can at least partially housing a pivot mechanism as described earlier).
- the inner region 4402 can include a base enclosure 4430 that can be used to cradle or enclose a user's device.
- the lid portion 4415 can be moved to a partially open position.
- FIG. 46 illustrates a front perspective view of a privacy/security enclosure 4400 in a partially open position.
- the lid portion 4415 can be moved to a partially open position so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to about 45° with respect to the base portion 4410.
- the lid portion 4415 can be pivoted about the base portion 4410 and positioned between about a 0° (i.e., the lid is closed) to about 190° or higher with respect to the base portion 4410.
- the lid portion 4415 can be moved so that the lid portion 4415 is pivoted about the base portion 4410 and positioned at other angles with respect to the base portion 4410.
- the lid portion 4415 can be moved to a partially open position so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to about 90° with respect to the base portion 4410.
- the lid portion 4415 can be moved further from the aforementioned partially open positions so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to other angles with respect to the base portion 4410.
- the lid portion 4415 can be moved further from the aforementioned partially open positions so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to about 190° so that the privacy/security enclosure 4400 lid portion 4415 can rest against a supporting surface when substantially fully open and be stable (i.e., not tip) with respect to the base portion 4410.
- FIG. 47 illustrates a bottom rear perspective view of a privacy/security enclosure 4400 in a similar open position.
- the lid portion 4415 can be moved to other positions from the aforementioned partially open positions so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to other angles with respect to the base portion 4410.
- the lid portion 4415 can be moved by a user to open positions so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to at angles between greater than about 0° and less than about 45° with respect to the base portion 4410.
- the lid portion 4415 can be moved to open positions so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to at angles between greater than about 45° and less than 90° with respect to the base portion 4410.
- the lid portion 4415 can be moved to open positions so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to at angles greater than about 90° and less than about 180° with respect to the base portion 4410. In some other embodiments, the lid portion 4415 can be moved to extended open positions so that the lid portion 4415 is pivoted about the base portion 4410 and positioned to at angles greater than about 180° and less than about 360° with respect to the base portion 4410.
- the base portion 4410 of the privacy/security enclosure 4400 shown in FIGS. 44-47 can comprise a base housing 441 1 comprising a bottom side coupled to four base sides.
- the base sides can comprise a generally curved side wall extending from the bottom side to a generally curved outer base edge.
- the lid portion 4415 can comprise a lid housing 4416 comprising a top side coupled to four lid sides.
- the lid sides can comprise a generally curved side wall extending from the top side to a generally curved outer lid edge.
- the lid side can comprise a generally curved surface. In some other embodiments, at least a portion of the lid side can be generally flat.
- the generally curved outer lid edge can be shaped to generally or substantially complement the generally curved outer base edge. Therefore, in some embodiments, when the privacy/security enclosure 4400 in closed so the privacy/security enclosure 4400 can include the base portion 4410 and the lid portion 4415 coupled substantially continuous along one edge by coupling the generally curved outer lid edge to substantially complement the generally curved outer base edge to form a substantially sealed enclosure.
- privacy can be enhanced by disabling or making less effective one or more of the following sensors or systems through the use of motors, magnets or known signal blocking or attenuating techniques: accelerometers, magnemometers, gyroscopes, Near Field Communication systems, humidity sensors, infrared or other light sensors, orientation sensors, pressure sensors, force sensors, proximity sensors, rotational or vector sensors, significant motion sensors, pedometers and any other sensors or systems.
- the privacy/security enclosure 5400 include a "knife edge" 5415 where the edge 5410 of the lid portion 5408 of the privacy/security enclosure 5400 can be positioned and wedged between two or more gaskets 5240 positioned within a groove 5407 of a base portion 5405 of the privacy/security enclosure 5400.
- Some further embodiments of the invention include privacy/security enclosures that allow RF pass through capabilities, where specific frequencies can be allowed to pass through the Faraday cage while maintaining protection against other frequencies (i.e. while maintaining privacy protection of the device). Some embodiments include privacy/security enclosures that allow an RF pathway to be closed to reinstate a RF protection via an RF/Antenna cut-off switch.
- Some embodiments of the invention include privacy/security enclosures that include RF filtering and/or RF band selection.
- RF bands that can pass through the enclosures are adjacent to other bands that can be blocked or attenuated.
- band 40 and 41 of the cellular spectrum are adjacent to the bands that carry WiFi and Bluetooth (which overlap).
- some embodiments include a series of filter that allow this to happen.
- Some embodiments of the invention include a privacy/security enclosure that includes at least one external to internal interface and communication apparatus.
- the privacy/security enclosure can enable passing certain types of information from inside to outside the Faraday cage without compromising its protection (i.e., information can be transmitted from the enclosed device while maintaining privacy protection of the device).
- Some embodiments of the invention include privacy/security enclosures that enable DC power pass-through.
- the privacy/security enclosure can enable charging of one or more batteries within the privacy/security enclosure. Further, some embodiments also enable charging of batteries of one or more enclosed devices. Moreover, in some embodiments, charging of one or more batteries in the privacy/security enclosure and one or more batteries of at least one enclosed device can occur substantially at the same time.
- the privacy/security enclosure can comprise one or more charging conductors or wires that pass through the Faraday cage of the privacy/security enclosure for purposes such as charging.
- the privacy/security enclosure can comprise one or more charging conductors or wires that pass through the Faraday cage of the privacy/security enclosure for purposes such as charging that do not require a user to connect and disconnect separate leads on the inside and/or outside of the privacy/security enclosure.
- Some embodiments of the invention include privacy/security enclosures that comprise one or more optical pass-through components, regions, or structures.
- the privacy/security enclosure can include one or more micro-controllers on both the inside and outside of the Faraday cage.
- holes can be included to allow communication via optical signaling without materially degrading the performance of the Faraday cage.
- power e.g., for one or more LED's
- data e.g., data
- Some embodiments of the invention can enable a head set pass-through.
- a user can plug a headset into the outside of the privacy/security enclosure (through the Faraday cage) to access a corresponding feature or port on the device enclosed inside the Faraday cage in the privacy/security enclosure while maintaining privacy protection of the enclosed device.
- Some embodiments of the invention include at least one form of audio protection.
- Some embodiments of the invention include an open case audio protection" ("OCAP").
- OCAP open case audio protection
- audio protection can be enabled while the privacy/security enclosure is open.
- a user can use at least a portion of the functionality of the device while maintaining audio protection.
- the privacy/security enclosure can provide a user with at RF functionality (e.g., to check if calls are coming in and/or to receive and/or respond to text messages).
- the privacy/security enclosure can also provide a user with screen access (e.g. to send and/or receive emails, check calendars, notes, To Do's, play games, use apps etc.).
- the privacy/security enclosure can provide a user with access to the use of a front and rear facing camera, and use of various buttons and device functions requiring physical access by the user.
- Some embodiments of the invention include listen and respond capabilities. Some embodiments enable a user to use one or more microphones to listen to the environment and play one or more masking signals when sound is detected. Some embodiments include a privacy/security enclosure that comprises one or more microphones that are band limited to specific frequencies that are associated with voice. In this instance, the microphones have a lowered noise floor that is below the threshold of microphones in enclosed user devices (e.g. the enclosed, phone, computer, tablet etc.)
- the privacy/security enclosure can comprise one mic in the middle of the low frequency of the common voice frequency band and another in the middle of the medium frequency voice band. In some embodiments, by being very deep (in terms of noise floor) in each of these areas, the presence of speech can be detected (while not capturing the voice content) while ensuring privacy/security enclosure protection is activated.
- Some embodiments of the invention include speaker and/or speaker driver selection specifically for masking. Some embodiments include a privacy/security enclosure that can produce one or more specific waveforms to mask human speech. Moreover, some embodiments include speakers that can produce the masking signal with minimal power consumption.
- the privacy/security enclosure can change and/or delay a starting time for the masking signal.
- the privacy/security enclosure includes a control system that enables the system and/or the user to select and vary the amount of time between speech detection and masking signal activation.
- the privacy/security enclosure can change the masking signal tail time.
- the control system can stop the transmission of the masking signal substantially immediately.
- the control system can include a transmission of the masking signal that comprises a tail (i.e. a transmission for a certain period of time after speech ceases). In some embodiments, this can minimize obtrusiveness as testing indicates that a constant start/stop is more obtrusive than continuous transmission.
- tuning the tail can allow substantially continuous broadcast through the normal starts and stops and pauses that are a part of human conversation.
- the volume of the masking signal can be varying. In some embodiments, the control system or the user can vary the volume of the masking signal based on the volume of the detected sound (e.g. such as a human voice).
- the privacy/security enclosure can include an obfuscation and/or randomness setting.
- the privacy/security enclosure can prevent an unauthorized listener from detecting the presence of speech.
- the privacy/security enclosure in the obfuscation and/or randomness mode, can randomly broadcast to simulate protection even if no one is speaking, thereby diminishing the ability of an unauthorized listener of detecting when there is actual speech by a user using the system.
- Some embodiments of the invention include an always on mode.
- the privacy/security enclosure includes active audio masking that is always on. In this mode, the privacy/security enclosure can maintain privacy protection substantially constantly.
- the privacy/security enclosure can include one or more LED's or other forms of communication to indicate when the privacy/security enclosure is providing protection, which mode the privacy/security enclosure is in (always on, obfuscation and/or randomness mode setting, etc.), and/or can be configured to flash anytime the privacy/security enclosure is broadcasting.
- a privacy/security enclosure can include audio technologies that can be used independently of RF and other protection technologies.
- some embodiments include the capability to remotely activate various modes of audio protection.
- some embodiments can include a remote control that activates audio protection in the privacy/security enclosure that can attach to a smart TV or gaming console that can include built-in microphones.
- Other examples include cars and any other electronic device with a microphone.
- the audio protection can be used/applied independent of any other type of protection (RF, etc.); 2) The audio protection can be packaged to protect against any device that has microphone (car, TV, etc.) and 3) Any audio protection can be activated in one or more ways: a.) automatically by some sensing and/or control mechanism built into the product; b.) by physical user interaction/activation (some type of physical button or switch etc.) and c.) a remote activation capability that uses a non-physical interface (RF, infrared/light based, sound (perhaps voice or sound activated by saying a keyword, clapping or something similar.)
- RF radio frequency
- Some embodiments of the invention include a noise delivery system that takes the masking signal generated by one or more speakers within the privacy/security enclosure and delivers it to the various microphones that are being protected by the privacy/security enclosure.
- Some embodiments of the invention include a privacy/security enclosure that comprises a collection point. This is the point at which signals generated by the speakers are captured and are coupled to the delivery system.
- Some example embodiments include an open port near a privacy/security enclosure speaker or a shaped capture point that changes or impacts capture and delivered signals.
- the privacy/security enclosure can comprise a system that channels a signal through at least a portion of the physical architecture of the privacy/security enclosure and delivers it proximate the microphones of the device against which are being protected.
- Some example embodiments can include tubes (e.g. similar to tubes used to deliver sound to the ear in a conventional hearing aid).
- Some example embodiments include channels or paths that are built into the privacy/security enclosure.
- the transmission of the speaker can be propagated to the microphone.
- the length, diameter, shape, material and stiffness of the tubes and channels can vary and can impact the signal that is being delivered by the privacy/security enclosure.
- Some embodiments of the invention can include one or more microphone attachment and/or sealing mechanisms.
- a physical element of the privacy/security enclosure architecture can be placed against the surface of the device against microphones that are being protected.
- this physical element can comprise a seal or gasket that minimizes the escape of our masking signal to the surrounding environment, and thereby can reduce the noise detected by people nearby.
- the tube delivering the sound can open to a hole which is greater than the location of the microphone so that when it is sealed and/or attached, a substantial majority of the signal can be delivered to the microphone rather than to the environment.
- Some embodiments of the invention include an extensible design.
- a privacy device that includes be the ability to slide or move the delivery point in order to accommodate devices with different microphone locations.
- Some embodiments of the invention include an audio pass-through.
- a user receives a phone call that they want to take, they can be provided with the option to remove the sealed delivery element such that they can take the call (including if they want to do so on speakerphone, for a video call etc.)
- Some embodiments can improve audio clarity depending on the physical architecture of the privacy/security enclosure.
- Some embodiments include holes that are placed on the mechanism that holds the protected device in place. In this instance, if the holding mechanism overlaps with a microphone and/or speaker, audio pass-through applies in both directions, listening to the caller and passing through the audio content of the speaker.
- the sealing can attenuate an external audio signal coming from outside the seal to the microphone as well as attenuate a masking signal going from inside the seal to outside (that can reduce obtrusiveness).
- the level of the masking signal can be lower on one microphone position versus another.
- Some embodiments of the invention include shock absorption features. These features help protect against falls, but also can act as a shock absorber that helps minimize vibrations caused by sound from reaching the IMU's within specific devices.
- RF gasketing can provide the secondary benefit of minimizing the transmission of air, water, dust and other such substances from passing into the interior of the case when it is closed.
- other environmental gaskets can be added to that are more specifically designed for this purpose.
- Some embodiments of the invention enable the user to select different levels or types of protection provided any given time. Some embodiments provide multiple selectable states, each of which provides different types or levels of protection.
- ramps or other features can be provided that prevent damage to interior portions of the case in the event the user is closing the case without having put at least one portion of the interior in the optimal state.
- kickstands can be built into or on top of the back of such products to provide similar functionality. Tacky or soft elements can be added to cases or housings to minimize slipping and sliding of products when they are on slippery surfaces.
- Some embodiments of the invention allow users to use as much of their native device functionality as possible. Accordingly, some embodiments of the invention provide access to both front and rear facing cameras, side buttons, and other device controls.
- Some embodiments of the invention do not use the previously described sock mechanisms. Accordingly, some embodiments utilize different ways of loading, unloading and holding protected devices within the case. Some embodiments include different ways to interface with various ports and plugs on the phone (i.e. power, headset etc.) In some embodiments, access is not provided to some or all of these capabilities while the device is within the case (even if the case is closed to provide RF protection).
- Some embodiments of the invention include passive RF protection and passive audio protection. Some of these embodiments include a microphone blocker and a corresponding release function.
- a lift mechanism lifts the phone from the audio sealing material inside the bottom of the sock.
- Some of these embodiments use foam (or springs or other such mechanisms) that lift the phone when the phone is not in the compressed or "down" mode.
- Some embodiments include holes drilled or otherwise formed into the bottom of the sock (or include a grill or some other such pass through method) that allow sound to pass through more easily.
- Some embodiments of the invention include passive RF protection and active audio protection. Some of these embodiments of the invention can include shapes that are dissimilar from a bathtub type of design. These alternative embodiments can leverage knife edge labyrinth and gasket designs etc. in order to provide a compact and effective device.
- Some embodiments of the invention include different Faraday cage designs. While some embodiments include one piece cases with a book-type of hinge, other embodiments use vertical hinges, two-piece or multi-piece products with removable pieces that both do and do not attach to the pieces that were not removed from the protected or enclosed device.
- Some embodiments of the invention include a user interface comprising controls and status indicators.
- the user interface can display different modes and status using LED's or other visual or audio features.
- Embodiments of the invention that use active audio masking technology can include a user interface which users to turn the device on/off and/or activate different modes, provide battery and other status, etc.
- FIGS. 55A-128H Further embodiments of privacy/security enclosures including components, assemblies, and methods of use are shown in FIGS. 55A-128H.
- FIGS. 55A- 55C illustrates views of a privacy/security enclosure lid with a U-channel gasket according to another embodiment of the invention.
- the main housing 5505 can include at least one peripheral u-shaped channel or groove 5520 into which a portion of a lid 5510 can be inserted.
- the u-shaped channel or groove 5520 can include a gasket 5530 that at least partially fills the u-shaped channel or groove 5520 and the enclosed portion of the lid 5510.
- FIG. 56 illustrates a perspective view of a privacy/security enclosure 5600 with mesh fabric gaskets 5625 according to a further embodiment of the invention.
- two rows of mesh fabric gaskets 5625 can be formed into a u-shaped channel or groove of the privacy/security enclosure 5600.
- FIGS. 57A-57B illustrates a perspective view of a privacy/security enclosure 5600 with mesh fabric gaskets according to a further embodiment of the invention.
- the main housing 5605 can include at least one channel 5608 into which a lid portion 5610 can be inserted between gaskets 5620 comprising an upper gasket 5625a and a lower gasket 6525b.
- FIG. 58 illustrating a cross-sectional view of a privacy/security enclosure 5800 according to one embodiment of the invention.
- a lid or gasket portion 5810 can be positioned between an interface 5815 formed between an upper portion 5805 and lower portion 5808 of the privacy/security enclosure 5800.
- gaskets 5820 can be positioned in the interface 5815 between the upper and lower portions 5805, 5808.
- a single gasket can be used placed in the interface 5815 between the lid or gasket portion 5810 and the upper portion 5805, or between the lid or gasket portion 5810 and the lower portion 5805.
- FIG. 59 illustrates a cross-sectional view of an edge of a privacy/security enclosure 5900 according to one embodiment of the invention.
- the privacy/security enclosure 5900 can comprise a lower portion 5905 including a groove 5907, and an upper portion 5910 including a tongue 5912.
- tongue 5912 can be positioned in the groove 5907 and one or more gaskets 5925 can be place between the tongue 5912 and the lower portion 5905 (e.g., on one or both sides of the tongue 5912 as described for the example embodiment of FIG. 58).
- FIG. 60A shows a partial perspective view of a portion of a privacy/security enclosure 6000 according to one embodiment of the invention.
- FIG. 60B shows a cross- sectional view of a privacy/security enclosure 6000 according to one embodiment of the invention.
- FIG. 60C shows a cross-sectional view of an edge of the privacy/security enclosure 6000 shown in FIGS. 60A-60B according to one embodiment of the invention.
- the privacy/security enclosure can comprise lid portion 6005 positioned engaged with a base portion 6015 with a gasket 6010.
- the base portion 6015 can comprise first groove 6025 and second groove 6027
- the lid portion 6005 can comprise first tongue 6030 and second tongue 6035.
- the base portion can also comprise a base tongue 6020 between the grooves 6025, 6027, and the lid portion 6005 can comprise a groove 6033 between the tongues 6030, 6035.
- the privacy/security enclosure 6000 can comprise a gasket seal 6007 including gasket 6010 comprising the second tongue 6035 positioned in the second groove 6027, the tongue 6020 positioned in the groove 6033, and the first tongue 6030 positioned in the first groove 6025.
- FIG. 61A illustrates a cross-sectional view of a privacy/security enclosure 6100 according to one embodiment of the invention.
- FIG. 61B illustrates a cross-sectional perspective view of a privacy/security enclosure 6100 according to one embodiment of the invention.
- the main housing 6105 of a privacy/security enclosure 6100 can comprise a base portion 6110 coupled to a lid portion 6115, and a gasket seal 6120 can be formed within the wall 61 12 of the base portion 6110.
- FIGS. 61C-61F illustrate various alternative embodiments of the gasket seals 6120 for a privacy/security enclosure 6100 according to one embodiment of the invention. For example, referring to FIG.
- some embodiments include a gasket seal 6120a comprising a tongue and groove architecture comprising a groove 6130 and a tongue 6140 at least partially inserted in the groove 6130.
- an inner gasket 6150 e.g., such as a fabric gasket as described earlier
- the gasket seal 6120 can comprise a gasket seal 6120b.
- groove 6130 can include tongue 6140 positioned between an inner and outer gasket 6150, 6151.
- the inner gasket 6150 can be positioned in the groove 6130 between the inner wall 61 12a of the wall 61 12 and the tongue 6140, and the outer gasket 6151 can be positioned in the groove 6130 between the outer wall 6112b of the wall 6112 and the tongue 6140.
- some embodiments include a gasket seal 6120c comprising a tongue and groove architecture comprising a groove 6130 and a tongue 6140 at least partially inserted in the groove 6130.
- an inner gasket 6150 can be positioned in the groove 6130 between the inner wall 61 12a of the wall 6112 and the tongue 6140, and a base gasket 6152 (e.g., such as a mesh gasket) can be positioned at the bottom of the groove 6130 between the tip of the tongue and the bottom of the groove 6130.
- the gasket seal 6120 can comprise a gasket seal 6120d.
- groove 6130 can include tongue 6140 positioned between an inner and outer gasket 6150, 6151.
- the inner gasket 6150 can be positioned in the groove 6130 between the inner wall 6112a of the wall 6112 and the tongue 6140
- the outer gasket 6151 can be positioned in the groove 6130 between the outer wall 61 12b of the wall 61 12 and the tongue 6140.
- an inner gasket 6150 can be positioned in the groove 6130 between the inner wall 61 12a of the wall 61 12 and the tongue 6140
- a base gasket 6152 e.g., such as a mesh gasket
- FIGS. 62A-62F various views of a privacy/security enclosure 6200 in progressive stages of opening and device insertion or removal according to one embodiment of the invention.
- the privacy/security enclosure 6200 can comprise a lower case 6210, coupled to an inner enclosure 6245 and an articulating enclosure 6240.
- an outer case or shell 6250 can at least partially enclosure the inner enclosure 6245.
- a user can use a latch 6260 to open the privacy/security enclosure 6200 enabling the articulating enclosure 6240 to pivot, and for the case or shell 6250 to be removed (shown progressively in FIGS. 62A-62D.
- FIG. 63A illustrates a perspective view of a closed privacy/security enclosure 6300 according to one embodiment of the invention.
- FIG. 63B illustrates a cross-sectional view of the privacy/security enclosure of FIG. 63 A according to one embodiment of the invention.
- FIG. 63C illustrates the privacy/security enclosure of FIG. 63A in an open configuration according to one embodiment of the invention.
- FIG. 63D illustrates a cross- sectional view of the privacy/security enclosure of FIG. 63C according to one embodiment of the invention.
- Some embodiments include a main housing 6305 comprising a base assembly 6310, a case or cover 6315, a base cover 6325, and a hood 6335.
- an articulation assembly 6360 can be used to extend the enclosure 6340 including an inside RF shield 6375 from the base assembly 6310.
- FIGS. 64A illustrates an assembly view of an example embodiment of a privacy/security enclosure according to one embodiment of the invention.
- FIG. 64B illustrates a base shell assembly view of a privacy/security enclosure according to one embodiment of the invention.
- Some embodiments include a cover 6310a and a base shell 6310b including a gasket 631 1 coupled to a base shell bezel 6312.
- Some embodiments include a base assembly 6370 coupled to base shell 6310b.
- Embodiments of the assembly can comprise a lower gasket lever 6372, electronics / PCB (inside RF case) 6375.
- Some embodiments include phone bed 6380, hood 6385, and masking speaker 6388. Referring to FIG.
- FIGS. 65A-65E depicts various views of a privacy/security enclosure 6300 in use according to one embodiment of the invention.
- some embodiments include a privacy/security enclosure 6300 including a base assembly 6325 coupled to a user device 10.
- the hood exterior 6335 can enable a device camera 13 of the user device 10 to have viewing access when extended from the main housing.
- FIGS. 66A-66C depicts various views of a privacy/security enclosure 6300 in use according to one embodiment of the invention.
- the enclosure 6305 can be positioned in or on the case or shell 6315.
- the enclosure 6305 including hood 6335 and Faraday base 6370 can be removed from the case or shell 6315 (shown in removal process FIG. 66B and FIG. 66C), and turned over and reversed in position to enable the enclosure 6305 including hood 6335 and Faraday base 6370 to be placed in an elevated positon on the case or shell 6315.
- 67A-67F depicts various views of a privacy/security enclosure 6300 in use according to one embodiment of the invention, and show views of the interaction between the enclosure 6305 and the case or shell 6315 (shown as 6310a in FIG. 67E). Further, as shown in FIG. 67E, the hood 6335 can be extended away from the user device lOto enable insertion and removal of the user device 10.
- FIG. 68 shows a privacy/security enclosure 6800 according to another embodiment of the invention.
- Some embodiments include a main housing 6805 comprising a base portion 6810 and lid portion 6815.
- the hinge mechanism 6820 main housing 6805 can be pivoted with respect to the base portion 6810.
- FIG. 69 shows a further example of a privacy/security enclosure 6900 according to another embodiment of the invention.
- Some embodiments include a main housing 6905 comprising a lid portion 6910 and base portion 6915.
- FIG. 70 shows another example of a privacy/security enclosure 7000 according to another embodiment of the invention.
- Some embodiments include a case or shell 7005 enveloping an enclosure 7010.
- FIGS. 71A-71D shows privacy/security enclosures according to various embodiments of the invention.
- FIG. 71A shows a privacy/security enclosure 7100 comprising a main housing 7105 including a base portion 71 10 pivotably coupled to a lid portion 71 15 using a hinge 7108.
- the enclosure 7120 shown within the privacy/security enclosure 7100 can comprise a base enclosure 7130 and hood enclosure 7140 that can be accessed by opening the privacy/security enclosure 7100 using a latch 7125. Further, FIG.
- FIG. 71B shows a privacy/security enclosure 7150 including a base portion 7147 coupled to a lid portion 7145 using a hinge 7148.
- the base enclosure 7155 shown can be accessed by opening the privacy/security enclosure 7150 using a latch 7158.
- FIG. 71C shows enclosure 7160 comprising a main cover or shell 7165 that can enclose enclosure 7167 comprising a base enclosure 7175 and hood enclosure 7170.
- FIG. 7 ID shows enclosure 7180 including base enclosure 7185 and hood enclosure 7198, and a cover or shell 7190 comprising an inner region 7195 into which the enclosure 7180 can be inserted.
- FIGS. 72A-72D depicts a privacy/security enclosure 7200 in use in accordance with some embodiments of the invention.
- the privacy/security enclosure 7200 can comprise a main housing 7205 including a cover or shell 7210 enclosing an enclosure 7215 and including a latch 7230.
- the user device 10 can be positioned in the enclosure 7215 to provide some privacy while the cover or shell is removed and/or folder away from the enclosure 7215.
- the user device 10 can be removed from the privacy/security enclosure 7200 for use by a user (as depicted in FIG. 72C showing user 25).
- the user device 10 can also be mounted in the privacy/security enclosure 7200 using a standing feature (shown in FIG.
- FIGS. 73A-73C Further views of the privacy/security enclosure 7200 are shown in FIGS. 74A-74D, and FIGS. 75A-75F depicting a privacy/security enclosure 7200 in use in accordance with some embodiments of the invention.
- FIGS. 76A-76D depicts a privacy/security enclosure 7600 in use in accordance with some embodiments of the invention
- FIGS. 77A-77C depicts a privacy/security enclosure 7600 in use in accordance with some embodiments of the invention.
- the privacy/security enclosure 7600 includes main housing 7605, cover or shell 7608, and enclosure 7610 including base enclosure 7630, enclosure support 7635, hood cap 7640, and hood 7650.
- the enclosure 7610 can be removed from the cover or shell 7608.
- the hood 7650 and/or hood cap 7640 can be extend and retracted to facilitate insertion and removal of a user device 10.
- FIGS. 78A-78C depicts a privacy/security enclosure 7800 in use in accordance with some embodiments of the invention
- FIGS. 79A-79C depicts a privacy/security enclosure 7800 in use in accordance with some embodiments of the invention.
- Some embodiments include main housing 7805 including a cover or shell 7808 and enclosed enclosure 7810 comprising an enclosure base 7815 and hood 7825.
- proximate the hood wall 7815, and aperture 7818 can be included to enable access to one or more controls of the user device 10.
- the hood cap 7830 can be pivoted from an open position (shown as 7802) to a closed position (shown as 7804) to enable the enclosure 7810 to enclose and clasp the user device 10.
- FIGS. 80A-80F illustrate various views of a privacy/security enclosure 8000 according to at least one embodiment of the invention.
- Some embodiments include a main housing 8005 including a removable outer cover 8007, a rear outer enclosure 8010, a front outer enclosure 8030, and a base enclosure 8040.
- Some embodiments include an LED or button 8042 positioned in the base enclosure.
- Some embodiments include an extendible hood 8050 including a hood cap 8055.
- the hood cap 8055 can comprise at least one function, status, and/or privacy indicator comprising an indicator LED 8070.
- logo 8088 can be including on at least a portion of the main housing.
- FIG. 81A-81D illustrate various views of a privacy/security enclosure 8100 according to at least one embodiment of the invention.
- the privacy/security enclosure 8100 can include a main housing 8105 comprising an enclosure 81 10, cover or shell 81 15, base enclosure 81 12, and hood 81 14.
- the enclosure 81 10 can be removed from the cover or shell 8115.
- FIG. 8 ID shows a user device 10 in a standing mode.
- FIGS. 82A-82D illustrate various views of a privacy/security enclosure 8100 according to at least one embodiment of the invention.
- the enclosure 81 10 can comprise a support 8215 coupled to the base enclosure 81 12 and hood 81 14. As shown in FIG.
- FIGS. 83A-83D illustrate various views of a privacy/security enclosure 8300 according to at least one embodiment of the invention. Some embodiments include a main housing 8305 comprising an enclosure 8310 and a cover or shell 8315, and base enclosure 8312. In some embodiments, the enclosure 8310 can be removed from the cover or shell 8315 (removal process shown in FIG. 83B and removed cover or shell 8315 shown removed in FIG. 83C). Referring to FIG.
- the hood 8316 with a hood clip 8314 can be moved from a closed position (shown as 8314a in FIG. 83C) to an open position (shown as 8314b in FIG. 83D).
- FIGS. 84A-84D illustrating various views of a privacy/security enclosure 8300 according to at least one embodiment of the invention.
- FIG. 84A shows the closed position 8314a
- FIG. 84B shows a user 25 in the process of opening the hood 8314.
- FIG. 84C shows the open position 8314b of the hood 8314.
- This view also shows the aperture 8307 enabling access to the user device 10 as described for another embodiment earlier.
- FIG. 84D shows the hood 8316 can be extended away from the enclosed user device 10 forming a gap 8303 and enabling access to one end of the user device 10.
- FIGS. 85A-85C illustrate various views of a privacy/security enclosure 8500 according to at least one embodiment of the invention.
- the privacy/security enclosure 8500 can include a main housing 8505 comprising a cover 8507, enclosure 8510, coupled base enclosure 8515 and hood 8540 including hood cap 8545.
- a user device 10 is shown cradled in the enclosure 8510 with one end positioned in the base enclosure 8515, and another end clasped in the hood 8540 with the hood cap 8545.
- An access aperture 8517 is shown in the base enclosure 8515 to enable user access to one or more controls of the user device 10.
- FIGS. 86A-86D Further views of the privacy/security enclosure 8500 are shown in FIGS. 86A-86D including various positions of the cover 8507 with respect to the enclosure 8510 in accordance with some embodiments of the invention.
- FIGS. 87A-87E illustrate various views of a privacy/security enclosure 8700 according to at least one embodiment of the invention.
- the privacy/security enclosure 8700 is shown comprising a main housing 8705 including a cover 8707, base enclosure 8715, hood enclosure 8740, and removable cover 8750a.
- the removable cover 8750 positioned coupled to the base enclosure 8715 can be rotated to a rotated position 8750b, and removed (shown as removed cover 8750c)
- FIGS. 88A-88C illustrate various views of a privacy/security enclosure 8800 according to at least one embodiment of the invention.
- a privacy/security enclosure 8800 comprising a main housing 8805 including a cover 8807 positioned at least partially covering an enclosure 8810 and coupled to a base assembly 8815.
- the enclosure 8810 can comprise a hood 8830 including a cap 8840.
- FIGS. 89A-89E illustrate various views of a privacy/security enclosure 8800 including some an assembly view (shown in FIG. 89C).
- a removable cover 8802 can couple to the main housing 8805 including base enclosure 8815, hood 8830, and cap 8840.
- FIGS. 90A-90F illustrate various views of a privacy/security enclosure 9000 according to at least one embodiment of the invention.
- the privacy/security enclosure 9000 can comprise a cover or shell 9010 at least partially enclosing an enclosure assembly 9015 including enclosure 9040, pivot assembly 9050, pivot 9060, and blocker 9065.
- the enclosure 9040 can pivot using the pivot assembly 9050 about the pivot to couple the blocker 9065 with a microphone, speaker, camera, or other sensor of the user device.
- FIGS. 91A-91C illustrate various views of a privacy/security enclosure 9100 according to at least one embodiment of the invention.
- the privacy/security enclosure 9100 can include the main housing 9105 comprising the enclosure 9110 and frame 91 15, hood 9130, and base assembly 9020.
- FIGS. 92A-92E illustrate various views of a privacy/security enclosure 9200 according to at least one embodiment of the invention.
- the privacy/security enclosure 9200 can include main housing 9205 comprising enclosure 9215 and frame 9235, hood 9225.
- FIG. 92D shows an assembly view showing frame 9235 positioned to accept a user device 10 and/or for insertion into the main housing 9205.
- FIG. 92C shows the hood 9225 in a closed position 9225a
- FIG. 92D shows the hood 9225 in an open position 9225b.
- FIGS. 93A-93C illustrate various views of a privacy/security enclosure 9200 according to at least one embodiment of the invention, where FIG.
- FIGS. 94A-94D illustrate various views of a privacy/security enclosure 9400 according to at least one embodiment of the invention.
- the privacy/security enclosure 9400 includes main housing 9405 with covers 9407, 9420 (shown in the assembly view of FIG. 94A), removable cover 9410, aperture 9415 (shown in FIG. 94D with cover 9410 removed).
- removable cover 9410 can be separated from the privacy/security enclosure 9400 to change the privacy of an enclosed device.
- FIGS. 95A-95C illustrate various views of a privacy/security enclosure 9500 according to at least one embodiment of the invention.
- Some embodiments include a main housing 9505 with slidable cover 9525.
- the cover 9525 can be rolled beneath the main housing 9505 to uncover an enclosed user device 10 (shown depicted in FIG. 95C).
- FIGS. 96A-96B illustrate various views of a privacy/security enclosure 9600 according to at least one embodiment of the invention. Some embodiments include a housing 9605 enclosing an enclosure 9610 and base enclosure 9615. The assembly view of FIG. 96A shows the removal of a user device 10 within enclosure 9610 by removal from the housing 9605, and assembly of the enclosure 9610 on the exterior of the housing 9605. Further, FIG. 96B shows the separation of the housing 9605 and the enclosure 9610.
- FIGS. 97A-97C illustrate various views of a privacy/security enclosure 9700 according to at least one embodiment of the invention.
- Some embodiments include a housing 9705 and enclosure 9710 with hood cover 9725.
- the assembly view of FIG. 97A shows the partial removal of a user device 10 within enclosure 9710 by partial separation of the cover portion 9725 from the housing 9705.
- FIG. 97B shows the assembly view of the separation of the cover portion 9725
- FIG. 97C shows the stand configuration 9726 using fold 9725 a of the cover portion 9725.
- FIGS. 98A-98B illustrate various views of a privacy/security enclosure 9800 according to at least one embodiment of the invention.
- the privacy/security enclosure 9800 can comprise a main housing 9805, enclosure 9810, coupled base assembly 9815, and foldable cover 9825.
- FIG. 98B shows the separation and folding or flipping of the cover 9825
- FIG. 98C shows the flipped cover 9825 with bend 9825a.
- FIGS. 99A-99C illustrate various views of a privacy/security enclosure 9900 according to at least one embodiment of the invention.
- the privacy/security enclosure 9900 can comprise a main housing 9905 including a pivoting cover 9910 and enclosure 9915.
- FIG. 99A shows the assembly view of the pivoting cover 9910
- FIG. 99B shows the privacy/security enclosure 9900 with the pivoting cover 9910 at least partially rotated from the user device 10
- FIG. 99C shows the assembly view with removal of the cover 9910.
- FIGS. lOOA-lOOC illustrate various views of a privacy/security enclosure 10000 according to at least one embodiment of the invention.
- the privacy/security enclosure 10000 can comprise main housing 10005 including a first half 10010 and a second half 10020 that can enclose an enclosure 10025 comprising a base assembly 10045 and hood 10035.
- FIG. 100B shows the action view of the halves 10010, 10020 pivoting apart from each other.
- FIG. lOOC shows an assembly view of the insertion or removal of the enclosure 10025 including user device 10 from the main housing 10005.
- FIGS. 101A-101C illustrate various views of a privacy/security enclosure 10100 according to at least one embodiment of the invention.
- the privacy/security enclosure 10100 can include an enclosure 10105 and reversible removable cover 10110.
- FIG. 101A shows the reversible removable cover 10110 coupled to the enclosure 10105.
- FIG. 101B depicts separation of the reversible removable cover 10110 from the enclosure 10105.
- FIG. 101 C shows removal of the enclosure 10105 from the reversible removable cover 10110 that has been reversed to function as a tray or holder.
- FIGS. 102A-102C illustrate various views of a privacy/security enclosure 10200 according to at least one embodiment of the invention.
- the privacy/security enclosure 10200 can include an enclosure 10205 with base portion 10220 and hood 10230 and reversible removable cover 10210.
- FIG. 102A shows the reversible removable cover 10210 on the enclosure 10205.
- FIG. 102B depicts separation of the reversible removable cover 10210 from the enclosure 10205.
- FIG. 102C shows removal or insertion of the enclosure 10205 from or to the reversible removable cover 10210.
- FIGS. 103A-103B illustrate various views of a privacy/security enclosure 10300 according to at least one embodiment of the invention.
- the enclosure 10305 includes hood 10310 and a removable wallet enclosure 10315.
- the latch 10325 can coupled or decoupled the foldable access flap 10335 portion of the removable wallet enclosure 10315 to enable insertion, removal, or access to a user device 10.
- FIGS. 104A-104B illustrate various views of a privacy/security enclosure 10400 according to at least one embodiment of the invention.
- the privacy/security enclosure 10400 can comprise a main housing 10405 appearing and/or functioning as a shoe.
- the privacy/security enclosure 10400 can comprise an enclosure 10410 with a pivoting shoe cover 10415 (shown in action view from closed to open in FIG. 104A, and in use in FIG. 104B).
- FIGS. 105A-105C illustrate various views of a privacy/security enclosure 10500 according to at least one embodiment of the invention.
- privacy/security enclosure 10500 can comprise main housing 10505 with enclosure 10510 as shown in FIG. 105A.
- the assembly view of FIG. 105B shows the removal or insertion of the enclosure 10510 from the main housing 10505.
- FIG. 105C shows the removal of the enclosure 10510 from the main housing 10505 and the subsequent partial collapse of the main housing 10505 to a lower profile (shown progressively as 10515a to 10515b to 10515c.)
- FIGS. 106A-106C illustrate various views of a privacy/security enclosure 10600 according to at least one embodiment of the invention.
- the privacy/security enclosure 10600 can include an enclosure 10605 and reversible removable cover 10615.
- FIG. 106A shows the reversible removable cover 10615 coupled to the enclosure 10605.
- FIG. 106B depicts separation of the reversible removable cover 10610 from the enclosure 10605.
- FIG. 106C shows removal of the enclosure 10605 from the reversible removable cover 10610 that has been reversed to function as a tray or holder.
- FIGS. 107A-107D illustrate various views of a privacy/security enclosure 10700 according to at least one embodiment of the invention.
- the enclosure 10705 can comprise a base assembly 10715 and rotatable hood 10710.
- the rotatable hood 10710 can be extended and rotated via a tensioner 10712.
- the rotatable hood 10710 can be extended and rotated from a first or closed position 10710a (clasping a user device 10) to a second or open position 10710b to enable a user to access and/or remove the user device 10 from the enclosure 10705.
- FIGS. 108A-108C illustrate various views of a privacy/security enclosure 10800 according to at least one embodiment of the invention.
- the privacy/security enclosure 10800 comprises a main housing 10805 including an enclosure 10810, coupled hood 10815, and base enclosure 10820.
- the base enclosure 10820 can include a sliding plug 10825 movable from a first position (shown as 10825a in FIG. 108A) to a second position (shown as 10825b in FIG. 108B).
- the sliding plug 10825 can be used to modify the privacy of an enclosed user device 10.
- FIGS. 109A-109C illustrate various views of a privacy/security enclosure 10900 according to at least one embodiment of the invention.
- Some embodiments of the invention include a main housing 10905 comprising a rotatable hood 10915 pivotably coupled to a base support 10917 about a pivot 10918.
- the base support 10917 is further coupled to a base enclosure 10920.
- a user can open and remove a user device by rotating the rotatable hood 10915 by pivoting the hood 10915 from the base support 10917 about the pivot 10918 (show rotated in FIGS.109B-109C).
- FIGS. 1 10A-1 10C illustrate various views of a privacy/security enclosure 1 1000 according to at least one embodiment of the invention.
- the privacy/security enclosure 1 1000 can comprise an enclosure 11005 including a base assembly 1 1020, and including an extendible hood 1 1015 coupled to an extender 11017.
- the hood 1 1015 can be extended or moved upwards away from the base assembly 11020 to enable access to an enclosed user device 10, or to enable a user to insert a user device 10 in the enclosure 1 1005 (see FIG. HOB).
- the user device 10 can be inserted or removed into or from the enclosure 1 1005 with the hood 1 1015 extended outward coupled to the extender 1 1017.
- FIGS. 1 11A-1 11B illustrate various views of a privacy/security enclosure 1 1100 according to at least one embodiment of the invention.
- the enclosure 1 1105 can comprise a base assembly 1 1120 with a base extension spring 11 125, and a rotatable hood 1 11 15 coupled to a hood pivot 1 1 117.
- access to a user device 10 and/or insertion or removal of the user device 10 can be facilitated by rotating the hood 1 11 15 about the pivot 11 117 to move the hood 1 1 115 from a closed position (11 115a) to an open position (1 11 15b), and/or by extending the base assembly 11 120 on the base extension spring 11 125 (see the assembly view of FIG. 11 IB).
- FIGS. 1 12A-1 12B illustrate various views of a privacy/security enclosure 1 1200 according to at least one embodiment of the invention.
- the enclosure 11205 can comprise a base assembly 11220, and a rotatable hood 11215 coupled to a hood pivot 1 1217.
- access to a user device 10 and/or insertion or removal of the user device 10 can be facilitated by rotating the hood 1 1215 about the pivot 1 1217 to move the hood 1 1215 from a closed position (11215a) to an open position (11215b) (see the assembly view of FIG. 112B).
- FIGS. 1 13A-1 13B illustrate various views of a privacy/security enclosure 1 1300 according to at least one embodiment of the invention.
- the enclosure 1 1305 can comprise a base assembly 11320 with a base pivot 1 1325, and a rotatable hood 1 1315 coupled to a hood pivot 11317.
- insertion or removal of the user device 10 can be facilitated by rotating the hood 1 1315 about the pivot 11317 to move the hood 11315 from a an open position (1 1315a) to a closed position (11315b), and/or by rotating a portion of the base assembly 1 1320 and/or a clamp on the base base pivot 1 1325 (see the assembly view of FIG. 113B).
- FIGS. 1 14A-1 14B illustrate various views of a privacy/security enclosure 1 1400 according to at least one embodiment of the invention.
- the privacy/security enclosure 1 1400 can include the enclosure 11405 comprising a hood 1 1415 and base assembly 1 1420.
- the user device 10 can be removed from the privacy/security enclosure 11400 (shown in the assembly view of FIG. 1 14A and 1 14B).
- FIGS. 1 15A-1 15B illustrate various views of a privacy/security enclosure 1 1500 according to at least one embodiment of the invention.
- the privacy/security enclosure 1 1500 comprises a main housing 1 1505, a coupled flip cover 1 1510, pivotable coupled to an enclosure 1 1515 including a base assembly 11520 and lever assembly 11530.
- the upper cover 11550 of the flip cover 1 1510 can pivot about the pivot 11512 to open or close the cover 11510.
- the lever assembly 1 1530 can into and out of the base assembly as the upper cover 1 1550 is opened and closed.
- FIGS. 1 16A-1 16B illustrate various views of a privacy/security enclosure 1 1600 according to at least one embodiment of the invention.
- the privacy/security enclosure 11600 can comprise an enclosure 11605 including a hood 1 1615 and base assembly 1 1620.
- the enclosure 11605 including the hood 11615 can be extended or retracted using a gear 11630 coupled to teeth 1 1635.
- the inner region 11606 can be enlarged (to enable a user to access a user device 10 or to place a user device 10 in the enclosure 11605).
- FIGS. 1 17A-1 17B illustrate various views of a privacy/security enclosure 1 1700 according to at least one embodiment of the invention.
- the privacy/security enclosure 11700 can comprise an enclosure 1 1705 including a hood 1 1715 movable from a closed hood 11715a to an open hood 1 1715b using a pivot 11717 (show in action view of FIG. 1 17B).
- the base assembly 11720 can include a lever or plug 1 1735 coupled to the hood 1 1715 by a cable 11730 and spring or tensioner 11740.
- actuation of the hood 11715 to a closed position (1 1715a) can cause the lever or plug 11735 to extend into or against a portion of the user device 10. Further, actuation of the hood 11715 to an open position (1 1715b) can cause the lever or plug 11735 to extend out of or away from a portion of the user device 10.
- FIG. 1 18 depicts a microphone blocking assembly 11800 according to one embodiment of the invention.
- a user can use a switch 11810 coupled to a belt assembly 11820 including a belt 1 1840 and pulley assembly 1850 to block (sealing position 11830) or unblock a microphone of a user device 10.
- FIG. 1 19 depicts a microphone blocking assembly 11900 according to one embodiment of the invention.
- the enclosure 1 1905 can comprise a roller 11915, base enclosure 1 1920, microphone blocker 11928, gear assembly 11932, and teeth 11934.
- the microphone blocker 11928 can be rotated onto one or more microphones of an enclosed user device 10 by rotation of the gear assembly 1 1932 on the teeth 11934.
- FIG. 120 depicts a microphone blocking assembly 12000 according to one embodiment of the invention.
- a main housing 12005 can comprise an enclosure 12010 with coupled door 12015 including a coupled microphone blocker 12017.
- the door 12015 can be rotated on the pivot 12019 to couple the microphone blocker 12017 with one or more microphones of a user device.
- FIG. 121 depicts a microphone blocking assembly 12100 according to one embodiment of the invention.
- Some embodiments include a main housing 12105 comprising a rear entry frame 121 10, enclosure 121 15, and pivot 12120.
- the rear entry frame 121 10 can be pivoted about the pivot 12120 to couple with a user device 10 and to seal at least one microphone of the user device 10.
- FIG. 122 depicts a microphone blocking assembly 12200 according to one embodiment of the invention.
- Some embodiments of the invention include a main housing 12205 comprising an enclosure 12210, hood 12215, base enclosure 12220, movable microphone blocker 12225, and control lever 12235.
- the movable microphone blocker 12225 can be moved by a user using the control lever 12235.
- FIGS. 123A-123C depicts views of a microphone blocking assembly 12350 according to one embodiment of the invention.
- Some embodiments include a main housing 12305 comprising an enclosure 12310 base enclosure 12320 latch assembly 12350 including a microphone blocker latch 12315, tensioner assembly 12360, and pivot 12370.
- a user can move the microphone blocker latch 12315 by rotating the pivot 12370 under tension by the tensioner assembly 12360.
- FIG. 123C shows the reverse action to cover a microphone of a user device 10.
- FIGS. 124A-124B depicts views of a microphone blocking assembly 12400 according to one embodiment of the invention.
- Some embodiments include a main housing 12405 including enclosure 12420, pivotably coupled to a base 12430 including a microphone blocker portion 12410.
- the base 12430 including microphone blocker portion 12410 can be rotated with respect to the enclosure 12420 about the pivot 12440 to block or unblock a microphone of a user device 10.
- FIGS. 125A-125G show privacy/security enclosure housing cross-sections according to one embodiment of the invention.
- FIG. 125A shows an example embodiments of a Faraday shell 12510.
- FIG. 125B depicts a Faraday shell 12520 layer 12530 comprising a full RF layer with non-RF shielding.
- FIG. 125C shows a Faraday shell 12540 including an inner layer 12550 comprising an RF layer with RF shield plastic insert.
- FIG. 125D depicts a Faraday shell 12560 with layer 12570comprising a non-RF shielding plastic with a conductive spray/mesh/cloth layer.
- FIG. 125A shows an example embodiments of a Faraday shell 12510.
- FIG. 125B depicts a Faraday shell 12520 layer 12530 comprising a full RF layer with non-RF shielding.
- FIG. 125C shows a Faraday shell 12540 including an inner layer 12550 comprising an RF layer with RF
- FIG. 125E shows a Faraday shell 12580 including a layer 12585 comprising an RF shielding plastic layer and conductive spray/mesh/cloth layer.
- FIG. 125F shows a Faraday shell 12590 layer including a fingerstock 12595.
- FIG. 125G depicts a Faraday layer 12598 comprising a metal injection molded RF layer (e.g., a magnesium thixo-molding).
- FIGS. 126A-126C illustrate various views of a privacy/security enclosure 12600 housing according to one embodiment of the invention. Some embodiments include base portion 12601, shelf portion 12603, rim 12605, and gasket seal 12608.
- the gasket seal 12608 can comprise an upper layer 12610 with tongue and groove gasket 12615.
- a lower layer 12620 including groove 12640 can couple with tongue 12630 as shown to form the gasket seal 12608.
- FIGS. 127A-127D illustrate user device insertion and positioning into a privacy/security enclosure according to one embodiment of the invention.
- Some embodiments include enclosure 12705 comprising removable foam blocks 12708 and at least one removable foam block 12710 forming a cavity 12720 for insertion of a user device 10.
- FIG. 127B shows a privacy/security enclosure 12750 comprising a housing 12705 including straps 12755 threaded though apertures 12760 enclosing a user device 10.
- FIG. 127C shows an enclosure frame 12775 including an adjustable clamp 12778 with adjuster 12779 for clamping a user device 10 in the frame 12775.
- FIG. 127D shows a privacy/security enclosure 12785 comprising a clip 12790 for positioning a user device 10.
- FIGS. 128A-128F illustrate cross-sectional detail views of privacy/security enclosure housing gasket seals according to one embodiment of the invention.
- FIG. 128A shows upper layer 12810 and lower layer 12811 with first o-ring 12812 and second o-ring 12813.
- FIG. 128B shows upper layer 12820 with lower layer 12821 and upper o-ring seal 12822 and lower o-ring seal 12823.
- FIG. 128C shows upper layer 12830, lower layer 12831, and o-ring seal 12832.
- FIG. 128D shows upper layer 12840, lower layer 12841, and o-ring seal 12842.
- FIG. 128E shows upper layer 12850, lower layer 12851, and o-ring seal 12852.
- FIG. 128A shows upper layer 12810 and lower layer 12811 with first o-ring 12812 and second o-ring 12813.
- FIG. 128B shows upper layer 12820 with lower layer 12821 and upper o-ring
- FIG. 128F shows upper layer 12860, lower layer 12861, first o-ring seal 12862, and second o-ring seal 12863.
- FIG. 128G shows upper layer 12871, lower layer 12872, first o-ring seal 12873, and second o-ring seal 12784.
- FIG. 128H shows upper layer 12880, lower layer 12881, first tongue 12882, second tongue 12883, and second groove 12884, and first groove 12885. Any of the gasket seals shown in FIGS 128A-128H can be used in any of the privacy/security enclosures disclosed herein.
- Some embodiments of the invention include a charging interface comprising at least one microcontroller that can determine the power that can be drawn by a power source into which the interface is plugged.
- Some embodiments of the charging interface include logic regarding the sequence and priority of charging masking technology as well as an enclosed device and any other desired accessories.
- the privacy/security enclosure can comprise a rigid, structurally self-supporting chamber that can be opened and closed by a user.
- the chamber can be formed of a material which attenuates RF radiation emitted to or from any RF antennas or transceivers positioned inside the privacy/security enclosure.
- the privacy/security enclosure can comprise one or more separable and/or moveable portions.
- some embodiments include a privacy/security enclosure comprising a lower portion (i.e. a base portion) and an upper portion (i.e., a lid portion).
- the privacy/security enclosure can comprise a Faraday cage configured to attenuate, or at least partially block, reception or transmission of RF radiation.
- the Faraday cage includes and/or is formed by the one or more RF gaskets.
- the RF gasket can attenuate (i.e. reduce in signal strength) an RF signal.
- the RF gasket can attenuate a portion of an RF signal while still disrupting effective communication. In some embodiments, the RF gasket can attenuate or at least partially block RF radiation from entering or exiting a privacy/security enclosure to which it is coupled. In some embodiments, this can provide bandwidth selectable pass-through capabilities.
- At least a portion of the RF gasket can be formed of a material which at least partially attenuates RF radiation emitted from one or more mobile or stationary communication devices.
- the RF gasket can be formed of a material including at least a portion that substantially attenuates RF.
- at least a portion of the RF gasket can at least partially attenuate RF radiation emitted from outside of the privacy/security enclosure.
- at least a portion of the RF gasket can at least partially attenuate RF radiation emitted from within the privacy/security enclosure.
- the privacy/security enclosure 12900 can comprise an upper portion 12910 that can be coupled to the base portion 12920 to at least partially enclose a user device. Further, the upper portion 12910 and base portion 12920 can be at least partially uncoupled and/or separated to enable a user to access the privacy/security enclosure 12900 (e.g., to insert or remove one or more user devices). Further, FIG. 130 illustrates an interior view from line 2 of the privacy/security enclosure of FIG. 129 according to some embodiments of the invention, and FIG.
- the RF gaskets 12930 can extend completely and/or continuously around the interface 12922. In some other embodiments of the invention, the RF gaskets 12930 can partially extend around the interface 12922.
- the privacy/security enclosure can include one or more RF gaskets extending around at least a portion of an interface 12922 between the upper portion 12910 and base portion 12920 of the privacy/security enclosure (e.g., such as the privacy/security enclosure 12900 or any other privacy/security enclosure disclosed herein).
- the privacy/security enclosure can include one or more RF gaskets that can extend completely around a region of the upper and/or lower portion of the privacy/security enclosure (e.g., such as the interface 12922 between the upper portion 12910 and base portion 12920).
- the privacy/security enclosure 12900 can include a conventional or custom fingerstock assembly.
- the privacy/security enclosure can include at least one fingerstock 13200.
- the fingerstock assembly 13200 can comprise a plurality of fingers 13225 comprising generally C-shaped, angular and/or curved extensions or tabs extending from a base or mounting surface 13210.
- the fingers 13225 can comprise contact areas 13325a that can be used to couple with one or more portions of the upper and/or lower portions for the privacy/security enclosure 12900 such as the upper portion 12910 and base portion 12920.
- the plurality of fingers 13225 can comprise contact areas 13225a that can be used to couple with one or more inner walls of the upper portion 12910 to provide an electromagnetic seal.
- the base or mounting surface 13210 and the individual fingers themselves can be flexible enough to enable the fingers 13225 to bend or pivot with respect to the base or mounting surface 13210 using force applied by a user (e.g., to enable two surfaces such as surfaces of the portions 12910, 12920 to be coupled to at least partially prevent passage of electromagnetic radiation).
- the fingers 13225 can be integrally formed with the base portion 12920 as shown.
- the C- shaped curved fingers 13225 can comprise separate C-shaped curved extensions or tabs. In some embodiments, these can be coupled or mounted directly to a portion of the privacy/security enclosure 12900.
- the fingers 13225 can be coupled or mounted to a support and coupled to at least one portion of the privacy/security enclosure 12900.
- the fingers 13225 can be coupled or mounted to an inner gasket.
- the shape of the extensions or tabs can be varied to accommodate different portions of the privacy/security enclosure 12900, and/or to provide different levels of RF attenuation and/or different levels of seal between portions of the privacy/security enclosure.
- more than one RF gasket can be used within a privacy/security enclosure.
- the privacy/security enclosure can include two RF gaskets positioned at an interface between an upper and lower portion of the privacy/security enclosure.
- the RF gaskets can be positioned adjacent each other within an inner wall of a lid receiving end of the privacy/security enclosure.
- one RF gasket can be positioned coupled to the inner wall of the lid receiving end of the privacy/security enclosure adjacent the top surface of the base, and a second RF gasket can be positioned coupled to the inner wall of the lid receiving end of the privacy/security enclosure proximate the first RF gasket and adjacent the lid receiving wall of the base gasket.
- the privacy/security enclosure can include three or more fingerstocks and/or a plurality of base gaskets.
- FIG. 133 illustrates a close up cross-sectional view of the privacy/security enclosure 12900 of FIG. 129 through cut line 5 of FIG. 131 showing a dual fingerstock (comprising fingerstock 13100 and fingerstock 13150), and an RF gaskets 12930 comprising a gasket 13175 according to some embodiments of the invention.
- the close-up cross-sectional view shows section 12925 of the base portion 12920 and section 12915 of the upper portion 12910, with the dual fingerstocks 13100, 13150 forming a seal between the sections 12915, 12915.
- any of the previously mentioned RF gaskets can be capable of forming a compliant privacy seal between portions of the privacy/security enclosure (e.g., between an upper and a lower portion and/or between two halves of any of the privacy/security enclosures described herein). Further, in some embodiments, the formed seal can be capable of functioning as an environmental barrier in addition to functioning as an RF shield. In some embodiments of the invention, RF gasketing can provide the secondary benefit of minimizing the transmission of air, water, dust and other such substances from passing into the interior of the privacy/security enclosure when the enclosure is closed.
- environmental or sealing gaskets can be included that are more specifically designed for this purpose.
- the environmental or sealing gaskets can be used with one or more RF gaskets as required.
- at least one base or sealing gasket 13175 can be positioned at or adjacent the interface 12922 between the sections 12915, 12925.
- the gasket 13175 can be used with or without one or more fingerstocks (i.e., with one or both or more fingerstocks 13100, 13150).
- the gasket 13175 can be positioned to accommodate and couple with at least a portion of a base end of an upper portion such as a lid.
- the base end of the upper portion 12910 (show as section 12915) can slide onto or over a portion of the base portion 12920 (shown as 12950a in FIG. 133) to couple with the gasket 13175.
- the gasket 13175 can couple with the inner surface 12910a of the upper portion 12910 as the upper portion 12910 is coupled with the base portion 12920.
- one or more gasket 13175 can be positioned coupled to the inner wall 12920a of the base portion 12920 adjacent or proximate to one or more gaskets 13175.
- FIG. 134 illustrates an example of the view of FIG. 133 including a single fingerstock 13400 and gasket 13175 according to some embodiments of the invention.
- some embodiments include a single gasket 13175 positioned as previously described.
- the fingerstock 13400 can be positioned generally equally spaced between the top surface 12925b of the base portion 12920 and the interface 12922.
- the fingerstock 13400 can be positioned proximate the top surface 12925b of the base portion 12920.
- the fingerstock 13400 can be positioned proximate the interface 12922.
- a combination of one or more grooves formed within one or more surfaces of one or more portions of the privacy/security enclosure can be used with one or more RF gaskets (e.g., such as fingerstock 13400 and gasket 13175) to provide various levels of coupling, seating, and/or sealing of the privacy/security enclosure.
- RF gaskets e.g., such as fingerstock 13400 and gasket 13175
- at least some portion of an upper and/or base portion of a privacy/security enclosure can comprise at least one form, cavity, or depression (i.e. forming a groove) for coupling to at least one or more RF gaskets.
- at least one form, cavity, or depression can be formed during any of the aforementioned manufacturing processes.
- FIG. 135 illustrates an assembly view of FIG. 133 depicting insertion of an upper portion 12918 onto the base portion 12920 (shown as section 12925) of a privacy/security enclosure.
- This example embodiment includes fingerstock grooves 12918a, 12918b formed within the upper portion 12918.
- FIG. 136 illustrates the assembled view of FIG. 135 according to some embodiments of the invention.
- the upper portion 12918 is coupled with the base portion 12920
- the base end 12919 of the upper portion 12918 can slide onto or over an edge wall 12925a of the base portion 12920 to couple with the gasket 13620.
- the gaskets 13610, 13615 can each couple with the fingerstock grooves 12918a, 12918b formed within the upper portion 12918.
- one or more fingerstocks can be used together within one or more inner gaskets to form an RF gasket or seal.
- Some embodiments of the invention can comprise an RF gasket assembly comprising at least two components.
- some embodiments include an assembly of components comprising at least one fingerstock coupled to at least one gasket.
- FIG. 137 illustrates a compound gasket assembly 13700 according to some embodiments of the invention
- FIG. 138 illustrates a cross sectional view of a compound gasket assembly 13700.
- FIG. 139 illustrates a rear view of a gasket assembly 13700 according to one embodiment of the invention
- FIG. 140 illustrates a front view of a gasket assembly 13700 according to one embodiment of the invention.
- the compound gasket assembly 13700 can comprise a fingerstock 13701 coupled to one or more inner gaskets 13720.
- the compound gasket assembly 13700 can comprise a fingerstock 13701 comprising a series of generally C-shaped curved fingers 13710 extending from a base or mounting surface 13705.
- the fingers 13710 can be integrally formed with the mounting surface 13705.
- the C- shaped curved extensions or tabs can comprise separate fingers 13710 that can be coupled to or mounted onto or over an inner gasket 13720.
- the shape and/or the spacing of each of the fingers 13710 can be varied to accommodate different portions of a privacy/security enclosure, and/or to provide different levels of RF attenuation and/or different levels of sealing between portions of the privacy/security enclosure.
- the fingerstock 13701 can provide mechanical or physical support to the inner gasket 13720. In some further embodiments, the fingerstock 13701 can provide degradation or wear protection to the inner gasket 13720. For example, in some embodiments, when used to provide one or more RF and/or environmental seals between surfaces and/or portions of a privacy/security enclosure, the use of a fingerstock 13701 at least partially enveloping the inner gasket 13720 can prevent wear and extend the life of the inner gasket 13720.
- FIG. 141 illustrates an example of the view of FIG. 133 including dual fingerstocks of FIG. 138 (shown as gasket assembly 14150, 14160) and base gasket 14170 according to some embodiments of the invention.
- the privacy/security enclosure portion 14100 can include two RF gaskets (formed by gasket assembly 14150, 14160 positioned at an interface 14105 formed between an upper and lower portions 141 10, 14120 of the privacy/security enclosure).
- the mounting surfaces 14150a, 14160a of the fingerstocks of gasket assemblies 14150, 14160 can be coupled to the inner surface 141 15 of the upper portion 141 10, and the fingers 14155, 14165 of the gasket assemblies 14150, 14160 can extend away from portion 141 10, coupling with the surface 14120a of the base portion 14120.
- the gasket assemblies 14150, 14160 can be rotated by 180°.
- FIG. 142 illustrates an example of the view of FIG. 133 including gasket assemblies 14150, 14160.
- FIG. 143 illustrates an example of a view 14300 of FIG. 133 including dual fingerstocks of FIG. 138 (shown as gasket assemblies 14150, 14160) according to some embodiments of the invention
- FIG. 145 illustrates an example of a view 14500 of FIG. 133 including a single gasket assemblies 14150 of FIG. 138 according to some embodiments of the invention.
- the mounting surfaces 14150a, 14160a can be positioned and coupled as described for FIG. 141.
- FIG. 144 illustrates an example of the view 14400 of FIG. 133 including gasket assemblies 14150, 14160 of FIG. 138 according to some embodiments of the invention
- FIG. 146 illustrates an example of view 14600 of FIG. 133 including a single gasket assembly 14150 of FIG. 138 according to some embodiments of the invention.
- the mounting surfaces 14150a can be positioned and coupled as described for FIG. 142.
- one or more fingerstocks can be used together within one or more inner gaskets to form an RF gasket or seal.
- FIG. 147 illustrates a compound gasket assembly 14700 according to some embodiments of the invention
- FIG. 148 illustrates a cross sectional view of a compound gasket assembly 14700. Further, FIG.
- the compound gasket assembly 14700 can comprise a fingerstock 14701 coupled to one or more inner gaskets 14720.
- the compound gasket assembly 14700 can comprise a fingerstock 14701 comprising a series of generally C-shaped curved fingers 14710 extending from a base or mounting surface 14705.
- the fingers 14710 can be integrally formed with the mounting surface 14705.
- the C- shaped curved extensions or tabs can comprise separate fingers 14710 that can be coupled to or mounted onto or over an inner gasket 14720. Further, in some embodiments, the shape and/or the spacing of each of the fingers 14710 can be varied to accommodate different portions of a privacy/security enclosure, and/or to provide different levels of RF attenuation and/or different levels of sealing between portions of the privacy/security enclosure.
- the fingerstock 14701 can provide mechanical or physical support to the inner gasket 14720. In some further embodiments, the fingerstock 14701 can provide degradation or wear protection to the inner gasket 14720.
- the use of a fingerstock 14701 at least partially enveloping the inner gasket 14720 can prevent wear and extend the life of the inner gasket 14720.
- FIG. 151 illustrates an example of the view of FIG. 133 including a gasket assemblies 14700 of FIG. 148 (shown as gasket assemblies 15150, 15160) and base gasket 15170 according to some embodiments of the invention.
- the privacy/security enclosure portion 15100 can include two RF gaskets (formed by gasket assemblies 15150, 15160 positioned at an interface 15105 formed between an upper and lower portions 151 10, 15120 of the privacy/security enclosure).
- the mounting surfaces 15150a, 15160a of the fingerstocks of gasket assemblies 15150, 15160 can be coupled to the inner surface 15115 of the upper portion 151 10, and the fingers 15155, 15165 of the gasket assemblies 15150, 15160 can extend away from portion 15110, coupling with the surface 15120a of the base portion 15120.
- the gasket assemblies 15150, 15160 can be rotated by 180°.
- FIG. 152 illustrates an example of the view of FIG. 133 including gasket assemblies 15150, 15160.
- the mounting surfaces 15150a, 15160a of the fingerstocks of gasket assemblies 15150, 15160 can be coupled to the surface 15120a of the base portion 15120, and the fingers 15155, 15165 can extend towards the inner surface 15115 ofthe upper portion 151 10.
- the privacy/security enclosure can be sealed without a base gasket.
- a privacy/security enclosure can be sealed without a base gasket.
- FIG. 153 illustrates an example of a view 15300 of FIG. 133 including a dual fingerstocks of FIG. 148 (shown as gasket assemblies 15150, 15160) according to some embodiments of the invention
- FIG. 155 illustrates an example of a view 15500 of FIG. 133 including a single gasket assemblies 15150 of FIG. 148 according to some embodiments of the invention.
- the mounting surfaces 15150a, 15160a can be positioned and coupled as described for FIG. 151.
- FIG. 154 illustrates an example of the view 15400 of FIG. 133 including gasket assemblies 15150, 15160 of FIG. 148 according to some embodiments of the invention
- FIG. 156 illustrates an example of view 15600 of FIG. 133 including a single gasket assembly 15150 of FIG. 148 according to some embodiments of the invention.
- the mounting surfaces 15150a can be positioned and coupled as described for FIG. 152.
- at least a portion of any of the RF gaskets described herein can comprise a metal or a metal alloy.
- At least a portion of any of the RF gaskets described herein can comprise copper or a copper alloy. In some other embodiments, at least a portion of any of the RF gaskets described herein can comprise iron or steel. In some embodiments, at least a portion of any of the RF gaskets described herein can comprise nickel or a nickel alloy (e.g., a nickel-copper alloy), or an alloy of copper and tin. In some embodiments, at least a portion of any of the RF gaskets described herein can comprise aluminum, magnesium, or mixtures or alloys thereof.
- any of the RF gaskets described herein can comprise a polymer.
- at least a portion of any of the RF gaskets described herein can comprise one or more homopolymers, one or more copolymers, or mixtures thereof.
- the polymer matrix can comprise an elastomeric polymer such as rubber or silicone.
- the polymer can comprise a solid rubber or silicone.
- Other embodiments can include a polymer comprising a sponge rubber or silicone.
- the polymer can comprise a butyl rubber, silicone rubber, a fluorosilicone, chloroprene rubber, nitrile rubber, or combinations thereof.
- At least a portion of any of the RF gaskets described herein can comprise an elastomer that is cut or machined to size.
- at least a portion of the RF gasket can comprise an elastomer that is molded (injection molding or thermoforming, transfer molding, insert molding) and/or cured to a specified shape.
- the RF gasket can be formed by other conventional manufacturing processes such as extrusion, die-cutting, laser cutting, or printed using a three dimensional printer, etc.
- At least a portion of any of the RF gaskets described herein can comprise a polymer-based matrix material including a dispersed secondary material.
- some embodiments include an RF gasket comprising one or more polymers infused with conductive elements, conductive compounds, and/or conductive mixtures.
- at least a portion of any of the RF gaskets described herein can comprise a polymer-based matrix material including metal filaments dispersed in a matrix to form a polymer composite material.
- at least a portion of any of the RF gaskets described herein can comprise a carbon fiber-filled matrix material including metal filaments dispersed in a matrix to form a carbon fiber composite material.
- the polymer can include one or more homopolymers, one or more copolymers, or mixtures thereof.
- the polymer matrix can comprise a butyl rubber, silicone rubber, a fluorosilicone, chloroprene rubber, nitrile rubber, or combinations thereof, and the secondary phase can include at least one dispersed conductor.
- the conductor can comprise a metal or a carbon-based conductor.
- the metal can comprise copper, iron, aluminum, silver, nickel, copper-silver alloy, or combinations thereof.
- materials useful in one or more embodiments of the invention include a layer of material comprising a carbon fiber-based matrix material including metal filaments dispersed in a matrix to form a carbon fiber composite material.
- the carbon fiber matrix can comprise at least one homopolymer and/or copolymer, and can include at least one ceramic, and/or at least one polymer-ceramic mixture.
- the metal filaments can comprise nickel filaments.
- the metal filaments can include copper filaments, brass filaments, stainless steel filaments or combinations thereof.
- the combination of the privacy seal formed by the one or more RF gaskets described here and/or one or more additional RF shield layers can form a Faraday cage.
- the Faraday cage can substantially attenuate or at least partially block RF transmission into and/or out of the privacy/security enclosure. In some embodiments, the Faraday cage attenuates RF transmission to a level of at least 120 dB.
- any of the RF gaskets described herein can be optimized for a specific function (either to at least partially block or attenuate RF, and/or at least partially block or attenuate sound, and/or at least partially block or attenuate light, and/or at least partially block or attenuate moisture, etc.) However, any one RF gasket can function to attenuate or at least partially block a combination of RF, sound, light, etc.
- one or more RF gaskets can function to attenuate RF, and one or more additional RF gaskets can function to attenuate sound, and one or more further RF gaskets can function as an environmental barrier.
- one or more of the RF gaskets are larger or smaller than one or more other RF gaskets.
- any of the fingerstock described herein can comprise a pitch of about 0.06 inches and a slot diameter of about 0.02 inches.
- the base height (“B") can be about 0.09 inches.
- any of the gaskets described herein can include an outer diameter ("A") of about 0.06 inches or 0.062 inches, and an inner diameter ("B") of about 0.02 to about 0.035 inches. Further, in some other embodiments, the outer diameter ("A") of the gasket can be about 0.09 inches, with an inner diameter ("B") of about 0.06 inches. In some embodiments, the inner and outer diameters can be greater or less than as described above.
- any of the fingerstocks described herein can comprise fingerstocks supplied by Parker Chometrics, Woburn, MA http://mvw homerics.com/contact/index.htmn. Some embodiments include fingerstocks with part numbers 81 -C 14-XXX-YDZZZZ and/or 81 -C 15 -XXXX- YDZZZZ . In some further embodiments, any of the fingerstocks described herein can comprise one or more stacked or coupled fingerstocks. In some embodiments, the fingerstock can be represented as two stacked fingerstocks comprising fingerstocks with part numbers 81-C07-XXXX- YDZZZZ available from Parker Chometrics mentioned above. In some embodiments, the contact areas of any of the fingers of the fingerstocks described herein can be used to couple with one or more portions of the upper and/or base portions of any of the privacy/security enclosures described herein.
- the fingers of any of the fingerstocks described herein can be integrally formed with the base or mounting surface, and the fingers and mounting surfaces can be coupled or mounted directly to any portion of any interface or sealing surfaces within any of the privacy/security enclosures described herein.
- the fingerstock can be formed by etching a metal substrate and forming the extensions or tabs, and/or any portion of the mounting base of the fingerstock.
- FIGS. 157A-C and FIGS. 158A-158C illustrate custom fingerstocks according to some embodiments of the invention, any one of which can be formed by conventional etching and/or forming methods.
- FIG. 157A illustrates a custom etched fingerstock plate 15700 with a clip 15713 including a bend line 15702, and a tab form 15704 that can form a clip 15713 when formed (shown in FIG. 157B).
- the etched plate 15701 can include an upper etched finger 15705 and a lower etched finger 15707.
- FIG. 157B illustrates a formed fingerstock array 15710 comprising an end surface 15712, upper finger 15714, and lower finger 15716.
- the custom fingerstock can include a clip (shown in FIG. 157C).
- the clip can extend from the base or mounting surface in a generally opposite direction from the extensions or tabs.
- the form clip 15713 is shown in FIG. 157C, including tab 15720 extending from the end surface 15712.
- FIG. 158A-C illustrate custom fingerstocks according to some embodiments of the invention.
- FIG. 158A illustrates a custom etched fingerstock plate 15800. This example embodiments does not include the clip 15713.
- the etched plate 15802 can include upper etched finger 15805 and lower etched finger 15807.
- FIG. 158B illustrates a formed fingerstock array 15810.
- the array 15810 can comprise a formed array plate 15812, with an upper finger 15814 and lower finger 15816 extending from the plate 15812 (shown in FIG. 158C).
- FIG. 159A-159C illustrates custom fingerstocks integrated with a privacy/security enclosure 15900 according to some embodiments of the invention.
- an RF gasket comprising a compound gasket assembly including one or more of the aforementioned fingerstocks can be used to couple and/or seal a privacy/security enclosure.
- the RF gasket can comprise custom fingerstocks without a gasket.
- FIG. 159A illustrates a cross-sectional view of a privacy/security enclosure 15900 shown in FIG. 159C. A close up of the RF gasket 15950 showing wall 15915 with inner surface 15915a is shown in FIG. 159B.
- At least one RF gasket 15950 can be positioned coupled to, adjacent to, or proximate to an inner surface 15915a of an upper portion 15910 of the privacy/security enclosure 15900.
- an RF gasket 15950 can be positioned coupled to the inner surface 15915a (see FIGS 159A and 159B).
- At least one RF gasket 15950 can be positioned coupled to the inner surface 15915a of the upper portion 15910 of the privacy/security enclosure 15900 so that the fingers 15960, 15965 are positioned within the inner region 15905 privacy/security enclosure 15900, and the mounting surface 15927 coupled to the at least one RF gasket 15950 and inner surface 15915a.
- the at least one RF gasket 15950 including a clip 15955a can be further coupled to the upper portion 15910 by at least partially extending over and/or around at least a portion of the end surface 15916 of the upper portion 15910.
- FIG. 160 illustrates RF attenuation behavior of various embodiments of the invention.
- the use of one or more compound gasket assemblies can attenuate RF when used with a privacy/security enclosure including one or more of the embodiments described herein.
- the greater attenuation can be provided with embodiments comprising dual compound gasket assemblies with and without a base gasket.
- FIG. 160 illustrates RF attenuation behavior of various embodiments of the invention.
- the attenuation plot 16000 shows attenuation versus frequency for RF gasket configuration 16100 (data plot 16101), RF gasket configuration 16200 (data plot 16201), RF gasket configuration 16300 (data plot 16301), RF gasket configuration 16350 data plot 16351, RF gasket configuration 16400 data plot 16401, RF gasket configuration 16500 (data plot 16501).
- the privacy/security enclosure can comprise a case formed from at least one housing assembly.
- the housing assembly can comprise a single monolithic element or can be formed from a plurality of sub-assemblies and/or components.
- at least one of the plurality of sub-assemblies and/or components can be movable with respect to another portion, assembly, or sub-assembly of the housing assembly.
- the housing assembly can include an enclosure for a user device.
- the enclosure can couple directly to a user device such as a smart phone.
- at least one of the plurality of sub-assemblies and/or components can be rotatable, and/or or pivotable with respect to another portion, assembly, or sub-assembly of the housing assembly
- the housing assembly 161 10 including the case 16115 of the privacy/security enclosure 16100 can include at least one chiseled, carved, and/or angular face or surface.
- two or more chiseled, carved, and/or angular faces can be coupled to at least one other surface with an edge (such as edges 161 13, 16117).
- the surface or edge can comprise a hard or substantially abrupt edge surface (providing a chiseled-off appearance or look).
- the edge can comprise a soft or substantially curved or rounded edge surface.
- the two or more chiseled, carved, and/or angular faces can form a portion of the housing assembly providing a chiseled-off appearance and/or an armored and/or robust appearance.
- the chiseled-off appearance, and/or an armored and/or robust appearance can extend to the base 16130.
- an access edge 16120 can include a chiseled-off appearance, and/or an armored and/or robust appearance.
- the housing assembly 16205 including the cover 16210, and/or the base 16215, and/or the hood 16220 can include at least one sliced, carved, and/or angular face or surface.
- two or more sliced, carved, and/or angular faces can be coupled to at least one other surface with an edge such as edges 16211, 16213.
- the surface or edge can comprise a hard or substantially abrupt edge surface (providing a sliced-off appearance).
- the edge can comprise a soft or substantially curved or rounded edge surface.
- the two or more sliced, carved, and/or angular faces can form a portion of the housing assembly providing a sliced-off appearance.
- the housing assembly 16405 including the cover 16415 coupled to the chassis or carrier 15410 can include at least one sliced, carved, and/or angular face or surface.
- two or more sliced, carved, and/or angular faces can be coupled to at least one other surface with an edge such as edges 16412, 16213.
- the surface or edge can comprise a hard or substantially abrupt edge surface (providing a sliced- off appearance).
- the edge can comprise a soft or substantially curved or rounded edge surface.
- the two or more sliced, carved, and/or angular faces can form a portion of the housing assembly 16405 providing a sliced-off appearance.
- the housing assembly 16405 can include at least one curved or angular face or surface and/or sub-assembly 16425 substantially monolithically and/or seamlessly coupled to another portion of the housing assembly 16410.
- two or more curved or angular faces or surfaces and/or sub-assemblies can be substantially monolithically and/or seamlessly coupled to at least one other surface.
- the at least one curved or angular face or surface and/or sub-assembly can comprise a hard or substantially abrupt edge surface (providing a sliced-off appearance or look).
- the at least one curved or angular face or surface and/or sub-assembly edge can comprise a soft or substantially curved or rounded edge surface.
- the two or more curved or angular faces or surfaces and/or sub-assemblies can form a portion of the housing assembly 16410 providing a monolithic or substantially seamless appearance.
- the housing assemblies 16505, 16605 can include at least one curved or rounded face, surface, edge and/or sub-assembly.
- Some embodiments of the invention can include a privacy/security enclosure 16500, 16600 comprising housing assemblies 16505, 16605 with at least one curved or rounded face, surface, edge and/or sub-assembly substantially coupled to at least one other curved or rounded face, surface, edge and/or sub-assembly substantially.
- any portion of the enclosures 16510, 16610 and/or covers 16515, 16615 can include curved or rounded faces or surfaces and/or sub-assemblies that can be substantially monolithically and/or seamlessly coupled to at least one other curved or rounded faces or surfaces and/or sub-assemblies including for example the base portions 16520, 16620.
- the housing assembly 16505 can comprise at least one movable, slidable, removable, or replaceable portion.
- the housing assembly 16505 can comprise a section, portion and/or component that can be moved, slid, removed, rotated or pivoted, latched or unlatched from, or with respect to, other portions of the privacy/security enclosure.
- the privacy/security enclosure can comprise at least one removable or replaceable section, portion, or component that can be removed, slid, latched or unlatched from the privacy/security enclosure after moving, sliding, removing, rotating, or pivoting at least a portion of the housing assembly with respect to other portions of the housing assembly.
- the privacy/security enclosure 16500 including an housing assembly 16505 with enclosure 16110 including lower portion 16540 and moveable hood portion 16530
- the portions 16530, 16540 can include curved or rounded faces or surfaces and/or sub-assemblies that can be substantially monolithically and/or seamlessly coupled to at least one other curved or rounded faces or surfaces and/or sub-assemblies (including for example the base portion 16520).
- the at least one curved or rounded face or surface and/or sub-assembly can comprise a soft or substantially rounded or curved edge surface (providing a smooth, rounded, or soft geometric appearance or look).
- the privacy/security enclosure can include a housing assembly that can comprise at least one splined surface.
- any of the privacy/security enclosures 16100, 16200, 16300, 16400, 16500, 16600 can comprise two or more splined surfaces or faces can be coupled to at least one other surface and/or splined surface or face.
- the at least one splined surface can comprise a hard or substantially abrupt edge surface (providing a splined-off appearance or look).
- the at least one splined surface can comprise a soft or substantially curved or rounded edge surface.
- the two or more splined surfaces can form a portion of the housing assembly, providing a splined appearance.
- the privacy/security enclosure 16700 can include a housing assembly 16705 that can comprise at least one layered, wrapped, and/or coupled surface or structure.
- the housing assembly 16705 can comprise a chassis 16710 and/or cover 16715 and/or surface 16718, and/or base 16720 can include at least one layered, wrapped, and/or coupled surface or structure can be coupled to at least one other one layered, wrapped, and/or coupled surface or structure.
- the at least one layered, wrapped, and/or coupled surface or structure can comprise a hard or substantially abrupt edge surface (providing a chiseled, carved, sliced, and/or splined-off appearance or look).
- the at least one layered, wrapped, and/or coupled surface or structure can comprise a soft or substantially curved or rounded edge surface.
- two or more one layered, wrapped, and/or coupled surfaces or structures can form a portion of the housing assembly providing a layered, wrapped, and/or multiple parts or assembly coupled appearance.
- the housing assembly of a privacy/security enclosure can comprise at least one moveable, slidable, and/or latching portion that can engage or disengage with at least a portion of the housing assembly and/or a user device when placed within the privacy/security enclosure.
- at least a portion of the housing assembly can comprise a section, portion and/or component that can be moved, slid, rotated, pivoted, latched, or unlatched from or with respect to other portions of the privacy/security enclosure.
- the at least one moveable, slidable, and/or latching portion can engage or disengage with at least a portion of the housing assembly to enable insertion or removal of a user device such as a smart phone, tablet, computer or other such device with one or more microphones and/or camera(s) and/or RF transceiver(s) and/or other sensor(s).
- a user device such as a smart phone, tablet, computer or other such device with one or more microphones and/or camera(s) and/or RF transceiver(s) and/or other sensor(s).
- the at least one moveable, slidable, and/or latching portion can be positioned proximate or adjacent one end of the privacy/security enclosure.
- the housing assembly can comprise at least two moveable, slidable, and/or latching portions.
- the at least two moveable, slidable, and/or latching portions can be positioned proximate each end of the privacy/security enclosure.
- the housing assembly can comprise at least one moveable, slidable, and/or latching portion that can engage or disengage with at least a portion of the housing assembly and/or a user device when placed within the privacy/security enclosure that covers one side of the user device only.
- FIGS. 168A-168C illustrate perspective views of various embodiments of a privacy/security enclosure 16800 including separable components that can be coupled by sliding one component (e.g., a component for housing a user device) into another component such as a case or cover.
- housing assembly 16805 illustrates an enclosure 16810 including hood 16812, base 16820, and a removable cover 16815 (FIG. 168C showing an assembly view for insertion of the enclosure 16810 into the case or cover 16815.
- the housing assembly can at least partially house or couple to a user interface and/or an indicator such as an LED, or other conventional illumination device, port, or other connector.
- FIGS. 169A-169B illustrate perspective views of various embodiments of a privacy/security enclosure 16900.
- the privacy/security enclosure 16900 can comprise a housing assembly 16905 including an enclosure 16910, hood 16912, cover or case 16915, and base 16920.
- the base 16920 can include a user interface 16925.
- the user interface 16925 can display an operation of the privacy/security enclosure 16900 and/or a function of any enclosed device.
- FIGS. 170A-170B illustrate perspective views of various embodiments of a privacy/security enclosure 17000.
- the privacy/security enclosure 17000 can comprise a housing assembly 17005 including an enclosure 17010, hood 17012, cover or case 17015, and base 17020.
- the base 17020 can include a user interface 17030.
- the user interface 17030 can display an operation of the privacy/security enclosure 17000 and/or a function of any enclosed device.
- a privacy/security enclosure that can comprise a housing assembly including at least one moveable, slidable, and/or latching portion or section.
- a privacy/security enclosure can comprise a housing assembly including at least one moveable, slidable, and/or latching portion with at least one user interface and/or an indicator (within either the movable or static portions of the privacy/security enclosure).
- the at least one moveable, slidable, and/or latching portion can be positioned at one end of the privacy/security enclosure, and the at least one user interface and/or an indicator can be positioned adjacent or proximate the other end of the privacy/security enclosure.
- the at least one moveable, slidable, and/or latching portion can engage or disengage with at least a portion of the housing assembly and/or a user device when placed within ore removed from the privacy/security enclosure.
- an action such as movement of the at least one moveable, slidable, and/or latching portion can substantially coincide with and/or cause an action or operation of the user interface and/or an indicator.
- At least a portion of the user interface and/or the indicator providing an indication can change state (e.g., such as light or illuminate and/or display colors, text, or graphics).
- at least a portion of the user interface and/or the indicator can provide an indication when opening. In other embodiments, at least a portion of the user interface and/or the indicator can provide an indication when closing.
- the privacy/security enclosure 17100 can comprise a housing assembly 17105 including an enclosure 17110, hood 17112, cover or case 171 15, and base 17120.
- the base 17120 can include a user interface 17130 (shown positioned at an end 1711 1 of the enclosure 171 10).
- the user interface 17130 can display an operation of the privacy/security enclosure 17100 and/or a function of any enclosed device.
- a user interface of any of the privacy/security enclosures described herein can include at least one user-accessible function.
- a user action of the at least one user-accessible function of the user interface can change a status or actuate a function of the privacy/security enclosure, change a status or actuate a function of the user interface, and/or change a status or actuate a function of at least one user device covered, held or cradled with the privacy/security enclosure.
- the user interface can comprise at least one button capable of enabling a user to power-on or power- off the privacy/security enclosure.
- the user can press and hold the button for a specified period of time to power-on the privacy/security enclosure.
- the user can press and hold the button for a short period of time to control the power of the privacy/security enclosure.
- an action by the user of one or more functions of any of the privacy/security enclosures described here through the user interface can change a display or illumination status of the user interface of the privacy/security enclosure.
- the action of powering on or off of the privacy/security enclosure by the user using the user interface can be accompanied by a change of display or illumination of the user interface.
- Some embodiments of the invention include a user interface that comprises an LED that can change illumination status based on the user's interaction with the user interface.
- an LED lamp can illuminate.
- the LED can be placed behind a lens.
- the user interface can comprise an audible interface.
- the user interface, or other coupled portion of the privacy/security enclosure can emit one or more sounds based at least in part on a change in status of the privacy/security enclosure, a user initiated action (such as any of the user actions previously described), and/or a change in status or function of at least one user device that is at least partially enclosed by or otherwise coupled to the privacy/security enclosure.
- the user interface can comprise capacitive or toggle-style buttons.
- the indicating status of the user interface can be based at least in part on a status or position of at least one moveable portion of the privacy/security enclosure.
- FIGS. 171C-171D illustrate user interface 17155 and uses of user interfaces 17155 of a privacy/security enclosure 17150 comprising enclosure 17151
- the at least one moveable portion of the privacy/security enclosure 17150 e.g., a hood 17152 is shown in the example embodiment
- the indicating status 17155a of the user interface 17155 can change.
- FIGS. 172A-172C show detailed perspective views of various embodiments of a privacy/security enclosure 17200 according to some embodiments of the invention.
- the privacy/security enclosure 17200 can comprise an enclosure 17210 including a hood 17250 and a base 17220.
- a cover or case 17215 can be coupled to the enclosure 17210.
- FIGS. 172A-172C show detailed perspective views of various embodiments of a privacy/security enclosure 17200 according to some embodiments of the invention.
- the privacy/security enclosure 17200 can comprise an enclosure 17210 including a hood 17250 and a base 17220.
- a cover or case 17215 can be coupled to the enclosure 17210.
- FIGS. 173-175 show detailed perspective views of various embodiments of a privacy/security enclosure 17400 according to some embodiments of the invention.
- the privacy/security enclosure 17400 can comprise an enclosure 17410 including a hood 17450 and a base 17420.
- a cover or case 17415 can be coupled to the enclosure 17410.
- FIGS. 176-178 show detailed perspective views of various embodiments of a privacy/security enclosure 17600 according to some embodiments of the invention.
- the privacy/security enclosure 17600 can comprise an enclosure 17610 including a hood 17650 and a base 17620.
- a cover or case 17615 can be coupled to the enclosure 17610.
- the privacy/security enclosure 17900 can comprise an enclosure 17910 including a hood 17950 and a base 17920.
- a cover or case 17915 can be coupled to the enclosure 17910.
- FIGS. 182-184 show detailed perspective views of various embodiments of a privacy/security enclosure 18200 according to some embodiments of the invention.
- the privacy/security enclosure 18200 can comprise an enclosure 18210 including a hood 18250 and a base 18220.
- a cover or case 18215 can be coupled to the enclosure 18210.
- FIGS. 185-187 show detailed perspective views of various embodiments of a privacy/security enclosure 18500 according to some embodiments of the invention.
- the privacy/security enclosure 18500 can comprise an enclosure 18510 including a hood 18550 and a base 18520.
- a cover or case 18515 can be coupled to the enclosure 18510.
- the at least one moveable portion of the privacy/security enclosure e.g., such as a hood
- the indicating status of the user interface of the hood of the privacy/security enclosure or other portion of the privacy/security enclosure, or both can provide an indicating status.
- at least some portion of the interior region of the privacy/security enclosure can illuminate and/or can be illuminated upon an action or change of status of the privacy/security enclosure.
- the interior region of the privacy/security enclosure can illuminate and/or can be illuminated.
- the illumination of the interior can be indicative of the unprotected status of any user device within the privacy/security enclosure.
- movement of the hood can change a status of the privacy/security enclosure. For example, in some embodiments, when the hood is raised (i.e., when the privacy/security enclosure is opened) the privacy/security enclosure can move to a power off state. In some embodiments, a user can access a button on the user interface of the privacy/security enclosure to power-on the privacy/security enclosure (e.g., by pressing a button on the user interface for a specified, short period of time such as a period between about 0.5 to about 3 seconds).
- a user can access a battery status using the user interface.
- a user can access a "poll" button on the user interface to ascertain the charge status of the battery of the privacy/security enclosure.
- the privacy/security enclosure can display a battery status at pre-determined intervals. Further, in some embodiments, when the battery is being charged, successive LED indicators can illuminate based on the charge status of the battery.
- the privacy/security enclosure can comprise at least one icon display.
- the privacy/security enclosure can comprise at least one user interface configured as an icon display and/or configured to display at least one icon. Referring to FIGS.
- the icon display can comprise one or more audio function-related icons.
- the icon can comprise one or more microphone enabled and/or audio-protected icons.
- the icons can comprise combined audio and battery and/or charge indicator icons.
- FIG. 188 illustrates icon displays of a privacy/security enclosure in accordance with some embodiments of the invention.
- Some icons can be illuminated, marked, and/or animated (e.g., flashed on and off or color cycled) depending on a status of one or more functions of at least one of the privacy/security enclosures described herein.
- Icons include indicators of the status of one or more microphones and audio protection characteristics. For example, some embodiments include at least one microphone enabled icon 18810, audio protected icon 18815, microphone enabled icon 18820, audio protected icon 18825, microphone enabled icon 18830, audio protected icon 18835, microphone enabled icon 18840, and audio protected icon 18845. Any of the privacy/security enclosures disclosed herein can utilize icons 18810, 18815, 18820, 18825, 18830, 18835, 18840, and 18845.
- FIG. 189 illustrates icon displays of a privacy/security enclosure in accordance with some embodiments of the invention.
- Some icons can be illuminated, marked, and/or animated (e.g., flashed on and off or color cycled) depending on a status of one or more functions of at least one of the privacy/security enclosures described herein.
- Icons include indicators of microphone status, audio protection (including microphone enabled icon 18910), audio protected icon 18915, microphone enabled icon 18920, audio protected icon 18925, microphone enabled icon 18930, and audio protected icon 18935. Any of the privacy/security enclosures disclosed herein can utilize icons 18910, 18915, 18920, 18925, 18930, 18935.
- FIGS. 190A-1 90D illustrates icon displays of a privacy/security enclosure in accordance with some embodiments of the invention.
- Some icons can be illuminated, marked, and/or animated (e.g., flashed on and off or color cycled) depending on a status of one or more functions of at least one of the privacy/security enclosures described herein.
- Icons include indicators of battery charge or status, microphone status, audio protection.
- FIG. 190A some embodiments include charged and microphone- enabled icon 19010, half-charged and microphone enabled icon 19020, and half-charged and audio-protected icon 19030. Any of the privacy/security enclosures disclosed herein can utilize icons 19010, 19020, 19030.
- FIG. 190B some embodiments include audio-protected icon 19040, microphone-enabled icon 19045, and battery charge icon 19050. Any of the privacy/security enclosures disclosed herein can utilize icons 19040, 19045, 19050.
- some embodiments include microphone enabled icon 19060, audio-protected icon 19065, microphone-enabled icon 19070, and audio- protected icon 19075. Any of the privacy/security enclosures disclosed herein can utilize icons 19060, 19065, 19070, 19075. Further, referring to FIG. 190D, some embodiments include microphone-enabled icon 19080, audio-protected icon 19085, audio protect on icon 19087 (pulsing when on), and battery low indicator icon 19089. Any of the privacy/security enclosures disclosed herein can utilize icons, 19080, 19085, 19087, 19089.
- the privacy/security enclosure 19100 can comprise a chassis 191 10 that includes a base 19120 that can hold electronics and a user interface.
- the back 191 10a of the chassis 19110 can hold a rechargeable, user or non-user accessible battery.
- at least a portion of the base 19120 can form part of an RF attenuation cage (e.g., a Faraday cage).
- a cover 191 15 completes the RF cage.
- the top portion of the chassis (hood 191 12) can lower onto or over the top of an enclosed device (shown generically as device 10) such as a smart phone, tablet, computer or other such device with one or more microphones and/or camera(s) and/or RF transceiver(s) and/or other sensor(s).
- the chassis 191 10 can couple to an enclosure 19105 positioned and formed to support a user's device 10.
- the hood 19112 can be moved from a lower position (FIGS. 191B-191C) to a raised position (FIGS. 191D-191F).
- the user can raise and lower the hood to facilitate insertion and removal of a user device into the privacy/security enclosure 19100.
- the movement of the hood 191 12 can change a function or status of the privacy/security enclosure 19100 as described earlier.
- the privacy/security enclosure 19100 and/or any privacy/security enclosure disclosed herein can prevent or reduce the ability of an authorized or unauthorized listener from using the microphone or other sensors, from detecting the presence of speech, or, if the presence of speech can be detected, reducing or eliminating the intelligibility of such speech.
- the privacy/security enclosure when set to a obfuscation and/or randomness mode, can randomly broadcast to provide protection even if no one is speaking, thereby diminishing the ability of an authorized or unauthorized listener of detecting when there is actual speech by a user using the system.
- the hood can seal one to all of the microphones (e.g. front, rear, bottom etc.) device(s), and can cover one to all of the cameras (e.g, front, rear etc.), and engage masking sound(s) to be received by the sensor(s) of the protected device(s).
- the sealing/unsealing, covering/uncovering and/or activation/deactivation for any up to all of the sensors of the protected device(s) can occur with a single movement or action of the hood or other desired structure (e.g.
- the movement/action described can be manually actuated, while in others the movement/action can be partially or fully electro-mechanically actuated.
- the ability to protect against different types of sensors in different physical locations on the protected device(s) in one or more motions/action can be accomplished by physical or electrical linkages between the portions of the enclosure providing the protection against each and/or every sensor.
- the privacy/security enclosure will include sensors to determine if and where any protected devices reside within the enclosure and to determine the state (e.g. raised or lowered) of specific protective assemblies, thereby allowing coordination of protection.
- the mechanisms that provide protection to a user's device including protections against audio, video, RF transmit/receive capability and/or other sensors (i.e. gyroscope, accelerometers and/or any other sensor that is part of the enclosed device(s) etc.) can be integrated into the core structure of the privacy/security enclosure.
- sensors i.e. gyroscope, accelerometers and/or any other sensor that is part of the enclosed device(s) etc.
- such mechanisms can be activated or deactivated with a conventional slide, button, switch and/or other such physical and/or electro-mechanical feature.
- the feature can activate/deactivate the protection for one or more microphones, cameras, RF antennas or RF transmit/receive functionality for the enclosed device(s) in a single actuation, action, motion, and/or interaction.
- a feature can require two or more actuations, action, motion, and/or interactions (i.e. button press, switch slide, etc.).
- the two or more actuations, actions, motions, and/or interactions can comprise two or more individual sequential or parallel single actuations, actions, motions, and/or interactions.
- a button can be used to the masking audio sound turn on and off.
- one LED can indicate a masking sound, and another can indicate a battery status, while yet another could indicate other functions such as maintenance requirements and/or feature indications/activations.
- the indications/status of the previously mentioned functions could be combined into one or more LEDs.
- the case and enclosed device(s) are charged through a micro- USB or other such charging port.
- any of the privacy/security enclosures described herein can include the circuit layout shown in FIG. 192.
- FIG. 192 illustrates a circuit system layout 19200 that can be used in any of the privacy/security enclosures described herein.
- the circuit system layout 19200 can comprise a RF case half section 19210, base circuitry and connections 19201, case half connections 19228 including cover 19230, hood 19240, and miscellaneous external connections 19203.
- the circuit system layout 19200 can comprise an interface board 19202, main board 19270 with optical communication 19204, case battery 19224, and LightningTM connector 19226. Connections can comprise charging socket 19206, USB connector 19208, power plug 19209, power socket 19212, i/o features 19214.
- Visual indicators or masking functions can comprise masking LED 19216, and battery capacitor LED 19218.
- Other components include foot speaker 19232, hood/phone switch 19260, and pass-through filter 19280.
- the pass-through filter 19280 can allow the transmission of specific frequencies, while filtering and/or attenuating others.
- the pass-through filter 19280 can allow the passage of a physical wire through the surface of the Faraday cage, while not materially degrading the RF attenuation capabilities of the Faraday cage.
- the boards 19202, 19270 can be coupled using at least one optical communication link 19204, configured to communicate in such a way that does not materially degrade the RF attenuation of the Faraday cage through which the communication is passing.
- a hood 19240 and/or enclosed device detection switch (19260) can be coupled to the main board 19270.
- the hood 19240 and/or a bottom, foot and/or other portions of the privacy/security enclosure eg., components 19201, 19210, 19230
- the battery 19224 coupled to the main board 19270 and/or a LightningTM connector 19226, USB, micro-USB, and/or other type of power connector coupled to the main board 19270.
- the interface board 19202 is coupled to a charging socket 19206, and input/output features such as a masking LED 19216, a battery capacitor capacity LED 19218, and an on/off button 19222.
- the charging socket 19206 can be coupled to a USB connector 19208 and/or a wall charger 19212.
- the indicating status of the user interface can be based at least in part on a status or position of at least one moveable portion of the privacy/security enclosure.
- FIG. 193 illustrates an operational state diagram of a privacy/security enclosure (represented as privacy/security enclosure 19300) with a phone present in accordance with some embodiments of the invention.
- the privacy/security enclosure 19300 can include a chassis 19310 with an upper portion 19312, base 19320, a hood 19350, and an attached outer housing or case 19315.
- operation of the privacy/security enclosure 19300, movement of the hood 19350, opening of the case 19315 can define a state 19311, and include a status of the case 19315 (status 19314), phone acoustics (19316), masking status (19318), and user device presence (19319).
- the operational parameters can be defined as 19370, 19375, 19380, 19385, or 19390 as shown.
- a state 19312 comprising "closed off can be representative of a closed privacy/security enclosure, sealed acoustics, and masking off (19370).
- the privacy/security enclosure 19300 can comprise a microphone sealed indicating symbol turned on.
- a "closed on” state 19312 can comprise a case closed, phone acoustics sealed, and masking fully on (shown as 19375).
- the privacy/security enclosure 19300 can comprise two indicating symbols turned on including a microphones sealed indicator and a masking playing indicator.
- the privacy/security enclosure can comprise an open free state 19312 comprising an open case, unsealed phone acoustics, and masking off (shown as 19380). In this instance, the privacy/security enclosure can comprise no indicating symbols turned on indicating masking silent and microphones unsealed.
- the privacy/security enclosure can comprise an open off state 19312, comprising a case open, phone acoustic sealed, and masking off (shown as 19385).
- the privacy/security enclosure 19300 can comprise an indicating symbol turned on comprising a microphones sealed indicator.
- the privacy/security enclosure can comprise an open on state 19312, comprising a case open, phone acoustic sealed, and masking full on (shown as 19390).
- the privacy/security enclosure can comprise two indicating symbols turned on including a microphones sealed indicator and a masking playing indicator.
- FIG. 194 illustrates a state cycle diagram of a privacy/security enclosure in accordance with some embodiments of the invention.
- the state cycles can be represented as phone in/out interactions, power on/off interactions, cover on/off interactions, and hood up/down interactions, where solid lines represent a require pathway and a dashed line represents an optional path per hood memory.
- FIG. 194 illustrates a state cycle diagram 19400 of a privacy/security enclosure in accordance with some embodiments of the invention.
- the state cycle diagram 19400 can apply to any of the privacy/security enclosures disclosed herein.
- operational state 19440 can be indicated by icons 19446 based on interactions 19448, and parameters 19450.
- FIGS. 195A-195B illustrates partial interior perspective views of a privacy/security enclosure 19500 in accordance with some embodiments of the invention.
- portions of the privacy/security enclosure 19500 can be completely enclosed by separate and unattached other portions of the privacy/security enclosure (including for example base 19520 as coupled to the chassis 19505, with the combined enclosure providing different and/or increased levels of audio, video, RF and/or other types of sensor, drop, environmental or other types of protection.
- FIGS. 196- 198D Further internal structures, components and assembly can be seen in FIGS. 196- 198D.
- FIG. 196 illustrates a partial cut-away view of a privacy/security enclosure in accordance with some embodiments of the invention.
- Some embodiments include a cover Faraday assembly 19615, a base assembly 19620 with Faraday assembly 19630, and a DC pass-through assembly (shown in FIG. 197B as 19770), all supported in a privacy/security enclosure 19605.
- any RF gasket or seal (shown as 19610) of the privacy/security enclosure can include a conventional or custom fingerstock or any fingerstock or component gasket assembly described earlier.
- at least a portion of the fingerstock can comprise a metal or a metal alloy.
- at least a portion of the fingerstock can comprise copper or a copper alloy.
- at least a portion of the fingerstock can comprise iron or steel.
- at least a portion of the fingerstock can comprise nickel or a nickel alloy (e.g., a nickel-copper alloy), or an alloy of copper and tin.
- the fingerstock can comprise aluminum, magnesium, or mixtures or alloys thereof.
- the fingerstock can comprise beryllium copper ("BeCu") that can electrically couple the cover to the base, and when closing the case.
- the fingerstock can comprise a base metal (e.g., such as nickel) with varying thicknesses of plated metals, including, but not limited to gold, palladium nickel, and titanium blend plating options.
- Some embodiments of the invention can include one or multiple rows of fingerstock brazed soldered, welded, bonded with conductive adhesive, or otherwise conductively bonded into the cover assembly.
- a hollow or solid circular profile of extruded conductive elastomer can be used in each row of fingerstocks.
- the bearing surface on the base can be nickel-plated for conductivity and surface hardness.
- Some embodiments include openings in the RF cage that do not materially compromise RF attenuation performance.
- Some embodiments include a DC pass-through assembly 19770 that allows DC power to pass between boards on either side of the cage.
- one or more holes or windowed ports can allow light to pass to enable optical communication between boards (such as the main board and the interface board).
- Some embodiments include a RF pass-through for one or more frequency bands, while continuing to attenuate other frequency bands.
- base assembly 19620 and/or Faraday assembly 19630 can include an RF pass-through switch, which allows physical interaction/linking between inner and outer portions of the Faraday cage or privacy/security enclosure, without materially degrading RF protection/attenuation.
- FIGS. 197A-197B illustrates a close-up view of the partial cut-away view in FIG. 196 in accordance with some embodiments of the invention.
- the cap 19749 can comprise machined aluminum
- the cover body 19750 can comprise extruded and machined aluminum.
- the privacy/security enclosure can comprise inner and/or outer bezels (19752, 19754) comprising machined aluminum, and one or more inner and/or outer fingerstock (19756, 19757) such as a BeCu fingerstock or other such fingerstock or other RF gasket.
- the inner and/or outer fingerstock (19756, 19757) and/or interface can include a stepped landing.
- a stepped fingerstock interface can reduce the sliding distance that would be experienced by the leading row of the fingerstock. In some embodiments, reducing the sliding distance can both reduce the wear on the fingerstock, and reduce the wear on the fingerstock landing area (i.e., the rim). In some embodiments, the stepped profile can equalize the sliding distance experienced by the inner, outer or other such rows of fingerstock.
- the cap 19749, the cover body 19750, the inner and outer bezels (19752, 19754), and the inner and outer fingerstocks (19756, 19757) shown as 19764 can be coupled together (e.g., using welding, brazing, or other conventional joining methods). Further, some embodiments also include a Faraday rim 19762 and Faraday pan 19766. In some embodiments, the Faraday rim 19762 and Faraday pan 19766can be coupled together (e.g., using welding, brazing, or other conventional joining method). In some embodiments, the Faraday rim 19762 and Faraday pan 19766 can comprise aluminum.
- the Faraday rim 19762 can comprise machined aluminum, and the Faraday pan 19766 can comprise deep drawn aluminum.
- the DC pass-through assembly 19770 can comprise brass, aluminum, magnesium or a blended metal alloy assembly. Further, some embodiments include optical communication holes or ports 19621. In some embodiments, the DC pass-through assembly 19770 can be coupled to the base 19620 (shown as 19727) by soldering.
- acoustic security/protection can be achieved through audio masking.
- the audio masking noise can be emitted from the privacy/security enclosure proximate or adjacent the expected location of a microphone of an enclosed device, and/or in the general vicinity of the device.
- assemblies for masking noise can include one or more assemblies configured to emit noise for pickup up by front, rear, and/or bottom or any other microphones of an enclosed/protected device.
- FIGS. 198A-198D illustrate partial interior views of portions of a privacy/security enclosure in accordance with some embodiments of the invention showing masking module assemblies comprising at least one speaker driver, coupling, and seal.
- some embodiments include assemblies to mask a bottom microphone including a push-rod, bottom masking module (comprising a speaker driver, caliper, and seal), and a caliper boot.
- FIGS. 198A-198D illustrates partial interior views of portions of a privacy/security enclosure including the base 19620 described above.
- the privacy/security enclosure can include a plurality of sub-assemblies that can each be assembled individually before being assembled together to form the privacy/security enclosure.
- the major sub-assemblies can comprise a cover assembly that can form an outer cover, at least partially enclosing a chassis assembly.
- the chassis assembly can comprise the hood assembly (shown as 19812) and a base 19620).
- the base 19620 can comprise a Faraday base assembly 19630 as described earlier.
- the hood assembly 19812 can comprise a hood housing 19814 including a left and right hood shroud.
- the hood assembly 19812 can include a hood clamp that can be used to seal and unseal to the front and back microphones. Consequently, when the hood assembly 19812 or other such mechanism is raised and lowered, the rubbing/sliding/interaction of the sealing surface against the mating surface on/of the protected device(s) can be minimized or reduced thereby enabling a higher cycle count of hood assembly 19812 raises/lowers, reducing or mitigating wear of the gasket/seals).
- hood assembly 19812 when the hood assembly 19812 is lowered, tension or compression forces can cause the hood assembly to spring away from the surface of the enclosed device (similar to a binder clip in reverse) and as the hood assembly 19812 is raised, the seals lift. In some embodiments, when the hood assembly 19812 is lowered, ramps can compress the hood clip and force the seals against the microphone with the correct amount of compression to deliver the designed audio protection.
- Some embodiments include a different mechanism for the bottom or other microphone(s), the sealing/unsealing of which can be coordinated with the single motion of raising and lowering the hood, where the two or more mechanisms are coupled so that they function together.
- the seal to the bottom or other microphone(s) can include mechanisms that reduce the rubbing/sliding/physical interaction between the sealing path and the mating surface when the mechanism is engaged/dis engaged, reducing wear and increasing cycle life for such mechanisms.
- Some further embodiments include the design of sealing paths to various sensors on the protected device in order to enhance or improve the effectiveness, efficiency and/or usability of protection.
- the sealed or partially sealed path/channel from sound generators e.g. speakers or drivers
- the sealed or partially sealed path/channel from sound generators can increase the amount of acoustical energy reaching the microphone(s) of the protected devices, reducing power requirements and/or allowing the use of smaller and/or less powerful drivers/speakers when compared to the acoustical power that would be required to deliver an equivalent level of protection in an open or non-sealed/non partially sealed environment.
- the sealed or partially sealed path/channel from sound generators e.g.
- the sealed or partially sealed path/channel from sound generators reduces and/or attenuates outside signals/sounds/audio content from reaching the protected device(s)' microphone(s) and/or sensors, providing some level of protection and/or reducing the level of masking signal(s) required to deliver an equivalent level of protection when compared to an open or non-sealed/non partially sealed environment.
- the source and/or seed for random and/or other audio, actuator or other such masking signal(s) can be electrical components (such as a diode and/or the thermal noise of a resistor).
- such seed/source can be amplified in order to reach a desired level of protection.
- the seed, amplified and/or unamplified can be filtered and/or sculpted to a more desired noise profile for the audio or other such masking signal (e.g.
- less obtrusive and/or noticeable noise profiles can be created by lowering the frequency components/content above certain frequency levels (e.g. varying and/or different frequency levels typically ranging anywhere from between 300Hz to 3kHz) when compared to noise profiles that haven't been filtered/sculpted and/or modified for such purposes.
- the seed can be used as the seed for encryption key(s) and/or for generating the encryption key(s) for voice, data, video and/or other types of encryption implemented and/or supported by the privacy/security enclosure itself and/or by the hardware and/or software of device(s) protected by the privacy/security enclosure.
- a single and/or multiple audio masking signals can be used as the source for protection against one or more microphones and/or other sensors.
- separate and/or distinct audio masking signals can be used as the source for protection against one or more microphones and/or other sensors, including some embodiments where separate, dedicated audio masking signals can exist for each microphone of any device(s) protected by the privacy/security enclosure.
- separate and/or distinct random audio masking signals can be used for each microphone on a device(s) protected by the privacy/security enclosure, reducing the likelihood and/or ability of an authorized and/or unauthorized listener subtracting and/or otherwise using one signal against another in order to extract and/or process and/or otherwise attempt to recover protected audio content.
- the audio masking signal can be a combination of different types of filtered or sculpted noise profiles and/or can be a result of cycling through a variety of different noise signals.
- the thermal noise of a resistor can be amplified as the seed of a random acoustic noise source.
- other electrical components such as diodes could also serve as the base generator.
- the naturally broad noise can be filtered or sculpted to a custom "Pink" profile closely matching the spectral content of human voice.
- FIG. 206 illustrates a frequency profile 20610 of pink noise in accordance with some embodiments of the invention
- FIG. 207 illustrates a frequency profile 20710 of human voice in accordance with some embodiments of the invention.
- this method can provide a number of advantages including that the thermal noise is truly random and secure (i.e., it cannot be cracked).
- the custom pink profile can use the least amount of power to optimally mask voice.
- the pink noise can create the least obtrusive masking signal due to its relatively muted components above about 500 Hz.
- an independent noise generation circuit can be used for each microphone on an enclosed device(s). If only one source was used for multiple microphones, it could be possible to record the noise on a microphone that was less open to the voice signal (or via some other means of recording), and use that noise to cancel the noise detected by another microphone, increasing the likelihood of recovery of protected audio content.
- Some embodiments can include speaker(s)/driver(s) with no or reduced rear port(s) or opening(s).
- rear ports are common in speakers/drivers to help tune the fidelity of the speaker/driver, but thus provide a path for external sound to modulate the speaker/driver cone which in turn can couple to the protected microphone(s), serving to reduce masking effectiveness
- the privacy/security enclosure can use speakers/drivers with no ports and/or can close, block, seal, reduce, or otherwise obstruct ports in drivers/speakers that have them.
- Some further embodiments include one or more apertures (e.g., holes or slots) in the base portion of the case to allow more sound to reach the bottom microphone (or other microphone(s) accessible via such apertures in any other portions of the privacy/security enclosure) such microphone(s) are uncovered.
- the apertures can also allow sound from the speaker(s) accessible by such apertures to more effectively be heard. In some embodiments, this can provide the user with a good user experience if they are using their enclosed device(s) in speakerphone mode or with some other function that uses the bottom or other such speaker.
- the hood assembly can also include a speaker assembly including speaker drivers, driver mounts, and microphone seals.
- the shrouds can comprise DuPontTM Delrin ® acetal homopolymer resin and the hood housing can comprise aluminum.
- the driver mounts can comprise an acrylonitrile butadiene styrene ("ABS") polymer.
- ABS acrylonitrile butadiene styrene
- Some embodiments of the invention include microphone seals comprising a foam material (e.g., such as a polymer foam).
- a cover assembly In some embodiments, a cover spring can comprise stainless steel. In some embodiments, the cover sleeve can comprise polyethylene. In some embodiments, the environmental seal can comprise an ethylene propylene diene terpolymer, and the cover outer bezel can comprise an ABS-type polymer.
- FIGS. 199A-201E illustrate exterior views of a privacy/security enclosure in accordance with some embodiments of the invention. Some embodiments can include various configurations, branding placements, at least one layer forming the exterior of the privacy/security enclosure that can comprise at least one exterior surface material composition, and/or texture or finish.
- FIGS. 199A-199E illustrates exterior views of a privacy/security enclosure 19900 in accordance with some embodiments of the invention.
- the privacy/security enclosure 19900 can comprise housing assembly 19905, enclosure 19910, a removable case or cover 19915, base 19920, and hood 19930.
- FIGS. 200A-200D illustrates exterior views of a privacy/security enclosure 20000 in accordance with some embodiments of the invention.
- the privacy/security enclosure 19900 can comprise housing assembly 20005, enclosure 20010, a removable case or cover 20015, and base 20020.
- the base 20020 can include a pass-through button with hole (shown as 20025) to a main LED. Further, referring to FIG.
- FIGS. 201A-201E illustrates exterior views of a privacy/security enclosure 20100 in accordance with some embodiments of the invention.
- the privacy/security enclosure 20100 can comprise housing assembly 20105, enclosure 20110, a removable case or cover 20115, base 20120, and hood 20130.
- FIG 201A shows a front view
- FIG. 201B shows a side view
- FIG. 201C shows a front view with case or cover 20115 removed
- FIG. 201D shows a side view of the view of FIG. 201C
- FIG. 20 ID shows a rear view.
- the privacy/security enclosure can comprise a housing assembly that can include at least one logo (e.g., name, entity, and/or company emblems, representations, and/or descriptions), shown as 20142.
- the privacy/security enclosure can include a logo 20142 on any side or face, edge or other portion of the privacy/security enclosure 20100.
- the privacy/security enclosure 20100 includes at least one logo 20142 positioned on a moveable portion of the privacy/security enclosure (e.g., such as the hood 20130).
- the logos 20142 can be embossed, engraved, pressed, etched, printed, or formed by any suitable conventional method provided they do not compromise the shielding effectiveness of the privacy/security enclosure.
- the lower cover 20144 can comprise a different color, material, or texture than the other portion of the case or cover 201 15.
- the lower cover 20144 can comprise a medium gray anodized bead blast look.
- Some embodiments include a base trim 20148.
- a button and/or LED 20150 can be integrated with the base 20120.
- the button and/or LED can comprise a logo 20142.
- At least a portion of the housing assembly comprises a conductive material.
- at least a portion of the outer surface of the housing assembly includes a conductive material.
- the conductive material is positioned coupled with a non-conductive portion of the housing assembly.
- the housing assembly includes regions of conductive and non-conductive materials that are substantially seamlessly coupled.
- at least a portion of the exterior surface of the housing assembly can comprise an aluminum type surface finish, a brushed finish, a satin finish, an anodized finish, and/or a texturing finish.
- the outer surface can comprise at least one of a polymer, metal, or natural material such as wood or leather, or mixtures thereof.
- the housing assembly can include at least one exterior trim component forming an exterior surface of the privacy/security enclosure.
- the exterior trim can comprise a polymer, metal, wood, leather, or mixtures thereof.
- any portion of the exterior can comprise any color or combination of colors.
- a portion of the housing assembly can comprise at least one aperture.
- the at least one aperture can be aligned with at least a portion of a user interface.
- the at least one aperture can be aligned with at least a portion of the privacy/security enclosure comprising an indicator such as an LED.
- all of the RF protection can be positioned in a separate device and/or enclosure. In some embodiments, this can result in a reduction in the size, weight, and cost of the device.
- different sizes of Faraday covers or enclosures can be used to accommodate multiple types and sizes of enclosed device(s) cases (e.g., with some Faraday cases or privacy/security enclosures being capable of handling an Apple® iPhone 6+, a Samsung Galaxy® 6, and other large phone or other device models while a medium case would handle audio/video/other sensor protection enclosures for mid-size or other grouping of phones or other device(s) (e.g. tablets, laptops etc.). Galaxy® is a registered trademark of Samsung Electronics.
- the privacy/security enclosure can comprise a removable Faraday enclosure.
- some embodiments include a Faraday enclosure that can be added or removed from the privacy/security enclosure as a separate module.
- the Faraday enclosure can comprise of two or more parts that can or may not be physically linked/attached to each other.
- the use of one or more compression or other type of RF gaskets can be used to enhance the level of RF attenuation provided by the device.
- RF shielding and/or gasketing for the inner pod (which can provide audio and/or video and/or other sensor protection, but not native RF attenuation/protection.)
- a non-RF protective/privacy case can have a pass-through port to allow access to the headphone jack or other ports of the enclosed device.
- both RF and non-RF protective, native or pass-through button and/or switch access to the enclosed device's buttons/switches/controls can be provided.
- the Faraday bottom can include passive controls and indicators, and electronics for optional pass-through charging or controlling of the interior device's functions, and/or access/visibility to the interior device's LED's or other such status indicators.
- Some embodiments include LED pin-hole pass through that can be aligned with passive buttons as described earlier.
- FIG. 202A illustrates a privacy/security enclosure 20200 including removable Faraday enclosure 20250 in accordance with some embodiments of the invention.
- FIG. 202B a removable Faraday enclosure 20250 shown in FIG. 202A in accordance with some embodiments of the invention.
- some embodiments include a Faraday top (the housing assembly 20205 including enclosure 20210 and case or cover 20215 comprising a passive shell that can be coupled to a Faraday bottom (the Faraday enclosure 20250).
- the Faraday enclosure 20250 can comprise passive controls and indicators 20255 including, but not limited to LED pin-hole pass-through, and one or more passive buttons.
- FIG. 203 depicts an assembly view of the privacy/security enclosure 20200 including removable Faraday enclosure 20250 in accordance with some embodiments of the invention.
- FIGS. 204A-204C, and 205A-205F illustrate a privacy/security enclosures including removable Faraday enclosures and privacy/security enclosures that can be used with removable Faraday enclosures in accordance with some embodiments of the invention.
- FIG. 204A illustrate a privacy/security enclosure 2410 including a removable Faraday enclosure 20415.
- FIG. 204B shows a privacy/security enclosure 20420 with enclosure 20421, and base Faraday enclosure 20425.
- FIG. 204C shows a privacy/security enclosure 20430 including enclosure 20431 with attached base Faraday enclosure 20435.
- FIGS. 204A-204C, and 205A-205F illustrate a privacy/security enclosures including removable Faraday enclosures and privacy/security enclosures that can be used with removable Faraday enclosures in accordance with some embodiments of the invention.
- FIG. 204A illustrate a privacy/security enclosure 2410 including a removable Faraday enclosure 20415.
- FIG. 204B shows a privacy/
- FIGS. 205A-205F including privacy/security enclosure 20500 including enclosure 20510 and case or cover 20515, hood 20512 (shown in FIGS. 205B and 205C), and Faraday base 20520. Further, FIGS. 205D-205F shows privacy/security enclosure 20550 including enclosure 20555 and case or cover 20560, and hood 20557 (shown in FIG.205E in a lowered position, and FIG. 205C in a raised position).
- Some embodiments of the invention include charge sharing. Some embodiments include a button or switch that is externally accessible or accessible through an aperture (e.g., by inserting the end of a paper clip) that when actuated can enable a dump charge of the privacy case battery to the user's device. For example, in some embodiments, a fixed percentage (e.g., from about 10% to about 20%) of the charge can be transferred. Some embodiments can also include an emergency override that can transfer substantially all remaining charge from the battery).
- Some embodiments of the invention can include hardware and software control features to enable battery conservation. For example, some embodiments include a dim LED mode to indicate protection is active while not being distracting to the user in certain environments (e.g., such as during the night in a bedroom or in a darker environment such as a movie theater, etc.) Further, some embodiments include a bright LED mode to enable uses to know if their device is protected while in bright environments (e.g., such as outside on a sunny day or in some other such brightly lit environment.) Further, some embodiments enable the user cycle between various brightness modes (e.g., bright and dim modes, or other modes).
- various brightness modes e.g., bright and dim modes, or other modes.
- some embodiments include a status check feature where the user can either press a button to see a bright LED (for some portion of time) to provide an indication that they are being protected, and where the brightness level subsides to a lower level soon after. In some instances, this can happen by default including at any time after the LED state is changed and/or after audio protection is turned on. For example, if a user wakes up in the morning and wants to change from dim mode to a brighter mode, the user can press the button and the LED goes to 90% power for 10 seconds, then subsides to 25% power (which can be more visible than the dim mode, while not excessively draining the battery and reducing the length of time the privacy case can provide audio protection.
- various components include tamper-proof and/or tamper prevention mechanisms.
- portions of any of the housing assemblies and enclosures of any of the privacy/security enclosures illustrated in FIGS. 1- 205F can include one or more tamper-proof prevention mechanisms.
- internal components such as PCB assemblies can include tamper prevention mechanisms.
- the tamper prevention mechanisms can include one way tabs.
- the tamper prevention mechanism can include a protective layer or material.
- the privacy/security enclosure can protect against one or more gesture sensors and/or emitters.
- the privacy/security enclosure can protect against or reduce the effectiveness of a radar sensor/emitting assembly (e.g., such as a broad beam radar sensor) to measure Doppler image, IQ and spectrogram for use in gesture control of any enclosed device(s).
- a radar sensor/emitting assembly e.g., such as a broad beam radar sensor
- Some embodiments of the invention can utilize methods to optimize battery performance and longevity. Further, some embodiments can include a battery management profile. For example, some embodiments include a battery management profile that can resist the urge to "fully" charge the battery. In some embodiments, by doing this, the battery capacity fall-off exhibited by LilON cells can be reduced such that the battery can retain its required capacity through more charge cycles. In some embodiments, as disclosed in http://batteryuniversity.com/, in terms of longevity, the optimal charge voltage is 3.92 volts per cell. Battery experts believe that this threshold eliminates all voltage-related stresses, and going lower may not gain further benefits but induce other symptoms. Also disclosed is the following table that summarizes the capacity as a function of charge levels. All values are estimated.
- Table 1 capacity as a function of charge levels (from
- the any privacy/security enclosure described herein and shown in at least FIGS. 208-265B herein can be mounted or attached to a user's device.
- the user's device can comprise a display device such as a computer monitor or display, a smart display or television, or other audio-visual device.
- the user's device can also include an integrated display and computer.
- the display can include components of a computer so that the display functions as a computer.
- the "display”, “display device”, or “display monitor” can include example embodiments where the display is coupled to a computer and/or integrated with a computer.
- the user can position the privacy/security enclosure at least partially based on the structure of the user's device, and any structures, components, or devices that a user wishes to cover or otherwise make privatize (i.e., to privatize).
- the terms privatize or make private are intended to describe making substantially completely private or at least partially private.
- the privacy/security enclosure can be used to privatize a computer or display device that includes a camera and/or microphone.
- the user can modify the position of the privacy/security enclosure based on the location of the number and location of the structures, components, or devices that a user wishes to privatize.
- any privacy/security enclosure described herein and shown in at least FIGS. 208-265B can include a portion or section that can be moved by sliding, raising or lowering, pivoting or rotating, or flipping with respect to another portion or section of the privacy/security enclosure to adjust the level of privacy of the device.
- the privacy level of the privacy/security enclosure can be changed by sliding, raising or lowering, pivoting or rotating, or flipping at least a portion of the privacy/security enclosure with respect to another portion of the privacy/security enclosure.
- the privacy/security enclosure can comprise at least one portion that can be coupled to another portion by at least one hinge.
- the privacy level of the privacy/security enclosure can be changed by pivoting or rotating at least a portion of the privacy/security enclosure with respect to another portion of the privacy/security enclosure using the at least one hinge.
- any privacy/security enclosure described herein and shown in at least FIGS. 208-265B can privatize the underlying device.
- the privacy level of the privacy/security enclosure can be changed by sliding at least a portion of the privacy/security enclosure with respect to another portion of the privacy/security enclosure. For example, in some embodiments, by sliding a portion or section of the privacy/security enclosure, as the slidable portion or section of the privacy/security enclosure is slid away from an underlying aperture of a fixed portion of the privacy/security enclosure, the interior of the privacy/security enclosure can be revealed to a user, and potentially at least one sensor (such as a camera and/or microphone) can be uncovered and revealed.
- a sensor such as a camera and/or microphone
- the sliding can be enabled by one or more guides or tracks.
- the interior of the privacy/security enclosure can be color-coded to alert a user to a security threat that might be posed when the privacy/security enclosure is at least partially slid open.
- the user can use the slidable portion or section of the privacy/security enclosure to uncover one sensor versus the other (for example when a user prefers to use their computer's microphone to dial into a conference call, but not participate in a video portion.
- the user may want to use their video display to show something to other people during a teleconference call, but they may have dialed into the conference call on a land line, and prefer not to use the computer's microphone.
- the user may want all sensors to be uncovered (e.g., during a FaceTime® or Skype® call on a computer where both the camera and microphone will be used simultaneously).
- FaceTime® is a registered trademark of Apple, Inc.
- SKYPE® is a registered trademark of Microsoft Corporation.
- the interior of any privacy/security enclosure described herein and shown in at least FIGS. 208-265B can be color-coded to alert a user to a security threat that might be posed when the privacy/security enclosure is at least partially open.
- the interior can be colored red.
- the interior can be colored yellow, blue, or magenta.
- the interior can include switchable illumination to alert the user to at least partial lack of privacy.
- a mounted privacy/security enclosure 20800 can be coupled to the computer or display monitor (shown as user's device 1 1).
- the privacy/security enclosure can be mounted to any portion of the user's device 1 1.
- a user can position the privacy/security enclosure 20800 shown in FIG. 208 to any portion of the computer or display monitor shown in this example embodiment.
- the user can use the privacy/security enclosure 20800 to cover more than one portion, component or device of the user's device 11.
- the user can use more than one privacy/security enclosure 20800 to privatize the user's device 1 1.
- the privacy/security enclosure 20800 can be optionally configured to increase or reduce a level of privacy of a user's device 11. In some embodiments, this can be accomplished simply by positioning or repositioning the privacy/security enclosure 20800. In other embodiments, this can be accomplished by moving and/or adjusting a portion of the privacy/security enclosure 20800.
- the privacy/security enclosure 20800 can comprise a main housing 20810 including a movable portion, section, or hood 20850, and a couple or integrated moveable portion, section, window, door or shutter (shown as 20820).
- a privacy/security enclosure including a main housing 20810 and hood 20850 can be coupled to a computer and/or display.
- the main housing 20810 can remain stationary during operation, and the hood 20850 can move relative to the computer and/or display in order to seal and un-seal against the microphones of the user's device.
- FIG. 1 For example, FIG. 1
- the hood 20850 of the privacy/security enclosure 20800 can be moved with respect to another portion or section of the privacy/security enclosure 20800 (e.g., with respect to the main housing 20810 or other coupled component) to adjust the coverage (and therefore the privacy level) of the privacy/security enclosure 20800 mounted or coupled to the user's device 11 (e.g., a computer or display monitor as shown in the example embodiment of FIG. 208.)
- the privacy/security enclosure 20800 can also be used with other user devices such as laptops, tablets and devices that contain cameras, microphones or other such sensors.
- the level of privatization can be partial in that some components or devices of the user's device 1 1 can remain non-private and others are private.
- a hood 20850 of the privacy/security enclosure 20800 can be moved with respect to another portion or section of the privacy/security enclosure to cover and make private a webcam but leave open a microphone.
- FIG. 1 For example, example, FIG. 1
- FIG. 210 illustrates a close up front perspective view of a privacy/security enclosure 20800 in a covered and protected configuration 20802 in accordance with some embodiments of the invention.
- the hood 20850 is lowered into the main housing 20810.
- FIG. 21 1 illustrates a close up front perspective view of a privacy/security enclosure 20800 in an uncovered and unprotected configuration 20804 in accordance with some embodiments of the invention.
- This example embodiment shows the hood 20850 in a raised position.
- the main housing 20810 can contain one or more PCBs, electronics components, and at least one battery such as a Li-Ion battery for at least partially powering the privacy/security enclosure, one or more springs, and one or more latches, etc.
- the user's device can be attached by snapping it into the mounting plate.
- the mounting plate includes a release lever that can allow the device to be removed from the mounting plate. In some embodiments, this lever can also act as a spring to hold the device in place when it is attached.
- the hood 20850 can contain at least one sealing mechanism, one or more PCBs, and/or one or more LEDs, etc.
- the hood 20850 can be positioned in two positions (e.g., down and up).
- the hood 20850 when the hood 20850 is down, it can be fully seated into the main housing 20810, and any rubber seals can be in contact with the areas around the microphones to provide audio sealing.
- the seals when the hood 20850 is up, the seals may not be in contact with the computer and/or display, and hence the microphones can provide audio functionality.
- the hood 20850 or other moveable and/or upper portion can include a texture or pattern. In other embodiments, other portions of the main housing 20810 can include a texture or pattern. In some further embodiments, the hood 20850 or other movable upper portion can include an outer surface comprising a glossy surface. In some embodiments, other portions of the main housing 20810 can include a glossy outer surface. In some other embodiments, the movable upper portion can include an outer surface comprising a matte surface. In some embodiments, other portions of the main housing 20810 can include a matte outer surface.
- Some embodiments include one or more mechanisms for moving and/or closing portions of the privacy/security enclosure (e.g., a lower portion or base portion and an upper portion or lid or hood 20850).
- the privacy/security enclosure 20810 can be closed.
- the privacy/security enclosure 20810 can be opened.
- the user can push a closed lid or hood 20850 to open or release it from the main housing 20810.
- the user can push the hood 20850 down to lower it, and can push a button to raise the hood 20850 (uncovering one or more microphones).
- the button can be on the top of the privacy/security enclosure, the front of the privacy/security enclosure, or somewhere else on the device.
- the mechanisms that provide protection including protections against audio, video, and/or other sensors (i.e. gyroscope, accelerometers and/or any other sensor that is part of the enclosed/protected device(s) etc.) can be integrated into the core structure of the privacy/security enclosure (i.e. not require the described hood 20850 mechanism).
- sensors i.e. gyroscope, accelerometers and/or any other sensor that is part of the enclosed/protected device(s) etc.
- such mechanisms can be activated/deactivated with a slide, button, switch and/or other such physical and/or electromechanical feature, which feature can activate/deactivate the protection for zero, one or more microphone(s), camera(s) or other sensors for the enclosed device(s) in a single action/motion/interaction, while in other embodiments of the invention, such a feature can require two or more actions/motions/interactions (i.e. button press, switch slide, etc.).
- Some embodiments include one or more springs to help raise the hood 20850 up from the down position. Different types of springs with different spring rates and different dampening mechanisms can be used to give varying levels of tension and different mechanical feedback to the user for raising and lowering the hood 20850. In some embodiments, different types of material can also be used to change the sound the user hears when the hood 20850 raises or lowers.
- the privacy/security enclosure can include at least one latch that can be used to couple with the hood 20850 as it is lowered to the base. In some embodiments, a catch mechanism can be used with the latch. In some embodiments, the latch can be released from the catch using a release button. An embodiment including a latch is discussed further below in relation to FIG. 217C.
- the hood 20850 can include a push-pull action to open and close the hood 20850 with the main housing 20810.
- the hood 20850 can be pushed down by the user to translate one or more seal mechanisms from the open unsealed state to the closed sealed state.
- one or more internal latches can retain the hood 20850 in the closed position to maintain pressure on the seals.
- Some embodiments include internal rods that are mounted in the stationary main housing 20810, and guides in the hood 20850 couple with the rods to enable the rods to slide smoothly in the correct positions. In some embodiments, dual, triple or quadruple rods and corresponding guides can be used.
- the hood 20850 can be pulled up by the user to release the seals and move the hood 20850 to the open position.
- the retaining latch can be overpowered by the force of the user pulling up, and the hood 20850 can be moved until it reaches a peak position.
- the hood 20850 when released from the user's finger or hand, the hood 20850 can be maintained in the upright position by the retaining latch.
- Some further embodiments include the addition of at least one spring to provide a spring-assisted motion to the hood 20850.
- the user can perform a similar action to close the hood 20850 (i.e., by pushing down on the hood 20850).
- one or more conventional internal latches can be installed.
- the latch can couple onto the hood 20850, and when the full distance of the stroke is achieved, the user can release the hood 20850, and the hood 20850 can be retained in the sealed position.
- the latch can require an over travel of about 1-2 millimeters. In this instance, after reaching the fully depressed position and being released, the latch can allow the hood 20850 to return a couple of millimeters on the upward stroke before the mechanical lock can fully engage into a final position.
- the user in order to release the hood 20850 to the upright position, the user can again push down on the hood 20850 from the top. This movement actuates the latch and releases the hood 20850, and the hood 20850 can then move upward into a fully open position.
- the system can be spring loaded to provide an upward spring force on the hood 20850, driving the hood 20850 into the upright open position when it is released.
- the hood 20850 can be pushed down from the top to mechanically latch in place in a final sealed position.
- an internal custom-made latch can be positioned in the main housing 20810 to retain the hood 20850.
- over-travel is not required in this system.
- a push-button can be positioned on the front of the device.
- a user can push this button move the latch from the retaining feature and spring loaded hood 20850 lifts to an open position.
- the release of the latch can be actuated from a button on the side, or front, or back, or top of the device.
- a lever or pull-button, or other conventional actuator can be used in place of the button.
- the hood 20850 can be moved using an electronic and/or electro-mechanical assembly.
- the hood 20850 can be translated using a solenoid or small motor.
- these systems can involve the user pushing a button (on the device, or remote to the device, either tethered or wireless) that can actuate the motor/solenoid. This would translate the hood 20850 from the open to the closed position, or vice-versa.
- the button could be protected with an additional security layer, such as a ⁇ entry keypad, or fingerprint sensor, or other.
- the privacy/security enclosure 20800 can utilize various sub-assemblies and components that attach to and/or mechanically interact with the computer and/or display.
- some embodiments of the invention include one or more mounting plates.
- some embodiments include a molded plastic plate that can be aligned relative to the top, rear and/or other such microphones on the computer and/or display, and can be attached to the rear surface with an adhesive tape.
- Some embodiments include a v-notch in the center of the top portion of the plate that indicates where a specific microphone should be in relation to the plate.
- Some further embodiments include one or more upper alignment tabs (e.g., one on each side) of the mounting plate that can hang over the top edge of the computer and/or display to position the mounting plate vertically on the computer and/or display. Further, some embodiments include various features, detents, holes, etc., on the mounting plate that interact with the sealing mechanisms of the device. Some embodiments include a plurality of tabs on the mounting plate that act as features to guide and retain the device when it is mounted to the mounting plate. In some further embodiments, an adhesive foam tape can be positioned under the mounting plate to enable a mechanical attachment to the computer and/or display, while proving a substantially sealed audio coupling between the housing of the computer and/or display and the mounting plate.
- Substantially sealed as used herein means providing a seal sufficient to enable the privacy/security enclosure to minimize and/or reduce eavesdropping or the effectiveness of eavesdropping on or listening to communications. Gaskets can also be used to help improve the sealing characteristics as well.
- Embodiments of the invention include various sealing element geometries (e.g., flat, conical, round, o-ring, molded, etc.), and with various durometer values, and within various rubber materials (EPDM, polyurethane, etc.)
- the sealing element can be attached to the computer and/or display with adhesive tape.
- the sealing element can be attached to the hood 20850, and configured to couple to the computer and/or display when translated up and/or down. Perfect seals are impossible to create in these applications, of course, but seals suitable for the purposes of these embodiments are readily created using the disclosed structures. Accordingly, the term "seal" as used herein is not limited to a complete or perfect seal, but instead a seal that is sufficient to provide desired reduction or attenuation.
- the hood 20850 can house or integrate one or more speakers and PCB with the noise generators, an LED "on" light, and other electronic components.
- each of the speakers can be embedded in a molded sealing element that can act to partially seal out ambient noise from the speaker chamber.
- this sealing element is an intimate contact with the computer and/or display and/or the mounting plate, the speaker can partially isolated from the ambient noise, and a small column of air can be trapped between the microphone and the speaker.
- the speakers when the speakers are turned on, the microphones can primarily sense the noise that is being generated by the device.
- the sealing element, the sealing surface on the mounting plate, the seal between the mounting plate and the computer and/or display, and the locking force provided by the retaining features/latches/spring of the system can be factors in providing an adequate seal to the microphones.
- the upper microphone sealing mechanism can operate by applying downward force from the hood 20850, through the sealing element, to the surface of the computer and/or display around the top microphone.
- the compression force can be retained by the internal latch of the system.
- Some embodiments of the invention include a lever seal.
- some embodiments include a spring loaded lever that would normally pull the sealing element of the rear speaker to an upright, or open position.
- the lever when the hood 20850 is closed, the lever can be rotated into the closed position to provide the sealing force on the sealing element, where the lever or something coupled to the lever contacts a feature of the mounting plate as it reaches the sealing position.
- the spring force, the lever geometry and actuating feature geometry can function together to provide the timing and effectiveness of the seal.
- the system can be reversed, so that the lever can be spring loaded to be normally closed, and an actuating feature on the mounting plate can move the lever as the hood 20850 is raised to the open position.
- a spring loaded carrier can house the sealing element.
- the spring loaded mechanism can force the sealing element down normal to the mounting plate.
- the carrier can include multiple contact pins that serve to space the sealing element at a distance from the mounting plate. In some embodiments, this can ensure that when the hood 20850 is anywhere other than the final sealing location, the pins can lift the sealing element up off the mounting plate, and thus the microphones can offer normal functionality.
- Some further embodiments include one or more sealing paths to various sensors on the protected device in order to enhance or improve the effectiveness, efficiency and/or usability of protection.
- the sealed or partially sealed path/channel from sound generators e.g. speakers or drivers
- the sealed or partially sealed path/channel from sound generators can increase the amount of acoustical energy reaching the microphone(s) of the protected devices, reducing power requirements and/or allowing the use of smaller and/or less powerful drivers/speakers when compared to the acoustical power that would be required to deliver an equivalent level of protection in an open or non-sealed/non partially sealed environment.
- the sealed or partially sealed path/channel from sound generators e.g.
- speakers or drivers can reduce and/or attenuate the amount of masking signal(s) reaching outside of the path/channel, thereby reducing the detectability and/or obtrusiveness of such signal to the outside environment.
- the sealed or partially sealed path/channel from sound generators e.g. speakers or drivers
- the sealed or partially sealed path/channel from sound generators can reduce and/or attenuate outside signals/sounds reaching the protected device(s) microphone(s) and/or sensors, providing some level of protection and/or also reducing the level of masking signal (s) required to deliver an equivalent level of protection in an open or non-sealed/non partially sealed environment.
- the source and/or seed for random audio masking signal(s) can be electrical components such as a diode and/or the thermal noise of a resistor.
- such random noise seed/source can be amplified in order to reach a desired level of protection.
- the noise seed, amplified and/or unamplified can be filtered and/or sculpted to a more desired noise profile for the audio masking signal (e.g.
- less obtrusive and/or noticeable noise profiles can be created by lowering the frequency components/content above certain frequency levels (e.g. varying and/or different frequency levels typically ranging anywhere from between 300Hz to 3kHz) when compared to noise profiles that haven't been filtered/sculpted and/or modified for such purposes.
- the random seed can be used as the seed for being and/or generating encryption keys for voice, data, video and/or other types of encryption implemented or supported by the privacy/security enclosure itself and/or the hardware and/or software of device(s) protected by the privacy/security enclosure.
- a single and/or multiple audio masking signals can be used as the source for protection against one or more microphones and/or other sensors.
- separate and/or distinct audio masking signals can be used as the source for protection against one or more microphones and/or other sensors, including some embodiments where separate, dedicated audio masking signals can exist for each microphone of any device(s) protected by the privacy/security enclosure.
- separate and/or distinct random audio masking signals can be used for each for each microphone on a device(s) protected by the privacy/security enclosure, reducing the likelihood and/or ability of an authorized and/or unauthorized listener from subtracting and/or otherwise using one signal against another in order to extract and/or process and/or otherwise attempt to recover protected audio content.
- the audio masking signal(s) can be a combination of different types of filtered/sculpted noise profiles or they can be a result from cycling through a variety of different noise signals.
- the volume and/or power level of some and/or all audio masking signals can be varied, with resulting effects such as the increase and/or decrease in the level of audio masking effectiveness in masking signal detectability, etc.
- the variation in audio masking signal power can be performed without user interaction/input while in other embodiments of the invention the user can control such variation with buttons, knobs, dials, sliders, software and/or other user input/output/interaction mechanisms.
- the hood 20850 and/or the main housing 20810 can contain a sensor system (such as a sensor coupled to a controller) that interacts to determine if the hood 20850 is at least partially open or in a sealed position.
- a sensor system such as a sensor coupled to a controller
- a magnet can be attached to the main housing 20810, and a Hall-effect sensor can be coupled to the hood 20850.
- the magnet when the hood 20850 is closed, the magnet can be sensed by the Hall-effect sensor, and the system can determine that the hood 20850 is in the closed position. In some embodiments, this event can cause the system to turn on or off and/or activate and/or deactivate the noise speaker(s).
- the system when the hood 20850 moves from the closed position, the system (using the Hall-effect sensor) can sense the absence of the magnet, and the system can turn off. In some embodiments, this can be done with a reed sensor in place of a Hall-effect sensor, or with a mechanical switch actuated when the hood 20850 moves. In some embodiments, by sensing when the hood 20850 is in the closed position, the user interface can be simplified because there is no "on-off ' switch. Moreover, it ensures that the system is turned on when the hood 20850 is in position, so the user is prevented from forgetting to turn the audio masking on.
- the privacy/security enclosure can include an alternative hood 20850 sensor that allows to the user to determine when the hood 20850 is in the raised versus lowered position.
- the hood sensor can be used by a control system to automatically turn off any current audio masking signal when the hood 20850 is raised, and automatically turn the signal back on when the hood 20850 is lowered).
- the hood 20850 can provide enhanced audio when it is raised.
- any cavities created when the hood 20850 is raised can be shaped or curved to modify and/or enhance the amount and/or quality of sound that reaches the microphone(s) when the hood 20850 is raised.
- well-known sound enhancing shapes can be provided in the hood 20850.
- the creation and/or shape of the cavities can be used to enhance noise reduction/cancellation and/or echo cancellation technologies using the various uncovered microphones.
- the privacy/security enclosure can include one or more gesture sensors and/or emitters.
- the privacy/security enclosure can include a radar sensor/emitting assembly (e.g., such as a broad beam radar sensor) to measure Doppler image, IQ and spectrogram for use in gesture control of the privacy/security enclosure and/or any user device contained within the privacy/security enclosure.
- a radar sensor/emitting assembly e.g., such as a broad beam radar sensor
- FIGS. 212A-212C illustrate an internal architecture view of a privacy/security enclosure 21200 in accordance with some embodiments of the invention.
- the privacy/security enclosure 21200 and other example embodiments including privacy/security enclosures shown in FIGS. 213A-265B can include any of the features and functions described above, including those described for privacy/security enclosure 20800 in the preceding paragraphs.
- the privacy/security enclosure 21200 can include a main housing 21210 enclosing various operation components of the privacy/security enclosure.
- the privacy/security enclosure 21200 can comprise a main housing 21210 and a moveable hood 21250.
- the privacy/security enclosure 21200 can include a webcam 21220.
- the privacy/security enclosure 21200 can include an aperture providing adjustable access to a webcam of a user's device 1 1.
- the privacy/security enclosure 21200 can include at least one PCB and electronics component 21230, at least one battery (such as battery 21235 comprising a 450mAh Li-ion battery, and a battery 21240 such as a 600mAh Li-ion battery) for at least partially powering the privacy/security enclosure.
- the main housing 21210 can include at least one movable portion (e.g., hood 21250) for covering a component or device such as a webcam and/or a microphone.
- the privacy/security enclosure 21200 can include integrated speakers 21245 configured to emit sound.
- the privacy/security enclosure 21200 can include integrated microphones 21248 configured to sense sound.
- FIGS. 213A-213B illustrate front and rear perspective views of a privacy/security enclosure 21300 in accordance with some embodiments of the invention.
- the privacy/security enclosure 21300 can comprise at least one universal mount 21318 for coupling the privacy/security enclosure to a user device.
- the at least one universal mount 21318 can comprise a VHB mount clip, slide on, snap-on, and/or a magnetic mount.
- the privacy/security enclosure can include a custom mount specific to one or more computers or computer displays.
- some embodiments include one or more custom components for coupling to various surfaces or edges of the computer or computer display.
- the privacy/security enclosure 21300 can comprise a main housing 21310 that comprises or includes the at least one universal mount 21318. Further, the main housing 21310 can include a coupled camera shutter 21320 and a camera shutter button 21325 for operating the camera shutter 21320. The privacy/security enclosure 21300 can also include at least one visual indicator of operation such as one or more LED indicators 21330, along with an LED dimmer button 21335.
- the hood 21350 can comprise a microphone seal 21340 that can be used to seal with the inner region 21342 of the main housing 21310. Further, in some embodiments, the hood 21350 can be operational to form a microphone seal engagement using finger grip, button release and push-down, and/or pen style push and release. Data, power, or other connectivity can be accomplished through cable management 21345 (e.g. a USB cable management).
- the privacy/security enclosure can include USB cable management comprising magnetic control management, and/or color coded management, and/or at least one visual cue.
- FIGS. 265A-265B illustrate rear perspective views of computer or display mounted privacy/security enclosure 26500 including hood 26550 with cable management 26570 in accordance with some embodiments of the invention.
- cable power and/or communication cables can be routed away from the privacy/security enclosure to a USB and/or power connection in various adjustable directions using a wire routing coupler(s) coupled to the computer or display.
- some portion of the privacy/security enclosure can include an alignment marking or notch.
- the marking or notch can assist the user to position the cover or mount to a specific location.
- Some embodiments can also include an aperture that can be aligned with and/or placed over one or more microphones of the device (e.g., such as a top and/or rear facing microphone).
- the privacy/security enclosure can include one or more mounting tabs that can be used for attachment to a computer and/or display.
- Some embodiments can include moveable release mechanisms to enable attachment or release of the privacy/security enclosure.
- the mounting bracket or feature can include mechanical structures and/or mating, sealing and/or other such materials that aid in the creation of a sealed path/channel between any speaker(s) of the privacy/security enclosure and microphone(s) of the protected device(s).
- the privacy/security enclosure can include at least one microphone seal.
- Some embodiments include a microphone seal that comprises a vertical slide.
- the microphone seal can comprise a flip, pivot, or rotating seal that can flip, pivot, or rotate from the main body of the privacy/security enclosure to provide effective sealing that is durable over a larger number of sealing and unsealing cycles than many conventional sliding seals.
- engagement of the microphone seal can be accomplished using a finger grip.
- a user can engage the microphone seal using a button release and combined push down.
- Some further embodiments can comprise a pen-style push and release (e.g., such a conventional spring-loaded push down and release mechanism used in a conventional pen).
- Some embodiments include LED indicators. Some embodiments can include one or more logos and/or brand images, including logos and/or brand images that comprise LED indicators. Some embodiments include a light pipe as at least a portion of an indicator.
- the privacy/security enclosure can include a light pipe to allow ambient light through the privacy/security enclosure so that the automated screen brightness function of the enclosed user device (if it has one) continues to function even though at least a portion of the privacy/security enclosure is at least partially covering the user's device.
- the privacy/security enclosure can comprise an LED dimmer button.
- the button can comprise a capacitive touch button, a round button, or a square button.
- the privacy/security enclosure can be configurable or reconfigurable to adjust the level of privacy.
- the privacy/security enclosure can include a removable portion or section that can be added or removed with respect to another portion or section of the privacy/security enclosure to adjust the level of privacy of the device.
- the privacy/security enclosure can include a movable portion or section that can be moved with respect to another portion or section of the privacy/security enclosure to adjust the level of privacy of the device.
- Some embodiments of the invention can comprise at least one surface provided with an adhesive (e.g., such as an adhesive tape) to couple the privacy/security enclosure to a surface of the user's device.
- an adhesive e.g., such as an adhesive tape
- other conventional attachment mechanisms can be used including, but not limited to clips, guides or sliders, snap-on mounts, magnetic mounts, and Velcro® mounts.
- the privacy/security enclosure can be coupled to a computer and/or display using double-sided adhesive.
- FIG. 214 depicts a reconfiguration of a mounted privacy/security enclosure and includes an adhesively mounted portion 21420.
- the privacy/security enclosure 21400 can comprise a main housing 21410 that can be attached to the mounting portion 21420 (e.g., using adhesive 21425).
- the privacy/security enclosure 21400 can be move, slid, repositioned on the mounted portion 21420. Further, the privacy/security enclosure 21400 can be positioned on the mounted portion 21420 to align the aperture 21415 with the hood 21450. Power and/or data can be fed and/or managed through cable management 21430.
- the privacy level of the privacy/security enclosure 21400 can be modified by sliding the slidable main housing 21410 so that the aperture 21452 of the main housing 21400 and aperture 21415 at least partially overlap. In other embodiments, the privacy level of the privacy/security enclosure 21400 can be increased by sliding the slidable main housing 21410 so that the aperture 21452 of the main housing 21410 and aperture 21415 do not overlap.
- FIG. 215 depicts a reconfiguration of a mounted privacy/security enclosure in accordance with another embodiment of the invention.
- the privacy/security enclosure 21500 includes main housing 21510, and a mounting portion 21520 with aperture 21515. Using the adhesive 21525, the mounting portion 21520 can be coupled to the user's device 11. Once mounted, the privacy/security enclosure 21500 repositioned on the mounted portion 21520. Further, the privacy/security enclosure 21500 can be positioned on the mounted portion 21520 to align the aperture 21515 with the hood 21550. Power and/or data can be fed and/or managed through cable management 21530.
- the privacy level of the privacy/security enclosure 21500 can be modified by positioning the slidable main housing 21510 so that the aperture 21552 of the main housing 21500 and aperture 21515 at least partially overlap. In other embodiments, the privacy level of the privacy/security enclosure 21500 can be increased by positioning the main housing 21510 so that the aperture 21552 of the main housing 21510 and aperture 21515 do not overlap.
- the privacy/security enclosure can include a movable portion or section that can be moved by rotating or pivoting with respect to another portion or section of the privacy/security enclosure to adjust the level of privacy of the device.
- FIG. 216 illustrates architecture views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 216 illustrates architecture views of a privacy/security enclosure 21600 in accordance with some embodiments of the invention.
- the mounting portions 21425, 21525 can comprise the enclosure 21600.
- the privacy/security enclosure 21600 can comprise a main body 21649 that can comprise a front surface 21647 and a rear surface 21645 folded from a surface 21640 defined between edges 21615. Initially the privacy/security enclosure 21600 can be formed or assembled as shown in FIG. 16 by folding about hinges 21603a, 21603b (thus forming edges 21615 and the surface 21640).
- the privacy/security enclosure 21600 can also comprise at least one aperture including, but not limited to, a webcam alignment aperture 21630 and a microphone alignment aperture 21620.
- a section or portion of the privacy/security enclosure can be raised or lowered to alter the privacy level of the privacy/security enclosure.
- Various seals can be engaged and disengaged during this process including seals to microphones, speakers, sensors and optical capture devices.
- FIGS. 217A-217C illustrates views of a privacy/security enclosure 21700 in accordance with some embodiments of the invention
- FIGS. 218A-218C illustrates views of a privacy/security enclosure 21800 in accordance with some further embodiments of the invention.
- FIG. 217A shows the privacy/security enclosure 21700 including main housing 21710 and movable hood 21750.
- the privacy/security enclosure 21700 in a lowered position (shown in FIG. 217B), can privatize the underlying device.
- one or more rubber seals 21715 can coupled to one or more microphones 21717.
- the main housing 21710 can include at least one sound tube 21719 coupled to at least one speaker 21721.
- FIG. 2171C shows the privacy/security enclosure 21700 with hood 21750 raised, and depicts sound 21752a, 21752b directed to microphones 21717a, 21717b open to the sound.
- the privacy/security enclosure 21800 can comprise a latch to enable the hood 21750 of the privacy/security enclosure 21700 to be decoupled from the unmoved portion (main housing 21710) of the privacy/security enclosure 21700.
- the hood 21750 of the privacy/security enclosure is moved away from the main housing 21710, the interior of the privacy/security enclosure can be revealed to a user.
- the latch that retains the hood 21750 in place.
- a latch 21713 can be coupled to the main housing 21700 positioned to couple to the hood 21750 when the hood 21750 is lowered into the main housing 21710.
- FIGS. 218A-218C illustrates views of a privacy/security enclosure in accordance with some embodiments of the invention.
- FIG. 218A shows the privacy/security enclosure 21800 including main housing 21810 and movable hood 21850.
- the privacy/security enclosure 21800 in a raised position (shown in FIG. 218B), can privatize the underlying device.
- one or more rubber seals 21815 can coupled to one or more microphones 21817.
- the main housing 21810 can include at least one sound tube 21819 coupled to at least one speaker 21821.
- hinge 21723 can be coupled to the main housing 21800 and the hood 21850 positioned to enable the hood 21750 to be lowered and raised by rotating about the hinge 21723.
- any of the privacy/security enclosures shown and described in FIGS. 208-265B can suppress or attenuate sound to reduce the ease and/or effectiveness of eavesdropping.
- one or more o-rings or gaskets can be used to attenuate or partially block sound.
- the cover can include sound dampening layers/materials.
- any of the privacy/security enclosures shown and described in FIGS. 208-265B can partially block and/or damp the signals reaching audio sensors and/or microphones within the user's device.
- the privacy/security enclosure can include audio blocking/reducing/confusing capabilities so that typical conversation-level audio outside the privacy/security enclosure will be partially or substantially unintelligible or indiscernible by the enclosed device's microphone.
- Some embodiments of the invention can include one or more microphone attachment and/or sealing mechanisms.
- a physical element of the privacy/security enclosure architecture can be placed against the surface of the device at location at or near where the microphones that are being protected are located. In some embodiments, this physical element can comprise a seal or gasket that minimizes the passage of sound.
- Some embodiments of the invention include active sound masking. Some embodiments of the invention include a noise delivery system that takes the masking signal generated by one or more speakers within the privacy/security enclosure and delivers it to one or more of the various microphones that can be covered and/or protected by the privacy/security enclosure. In some embodiments, any of the privacy/security enclosures shown and described in FIGS. 208-265B can play one or more masking signals to muffle, overwhelm, confuse or mask sounds being picked up by one or more microphones of the user device. Further, some embodiments of the invention include listen and respond capabilities. Some embodiments enable the privacy/security enclosure to use one or more microphones to listen to the environment and play one or more masking signals when sound is detected. Some embodiments include a privacy/security enclosure that comprises one or more microphones that are band limited to specific frequencies that are associated with voice. In this instance, the microphones have a lowered noise floor that is below the threshold of microphones in the enclosed user device.
- the privacy/security enclosure can comprise one microphone in the middle of the low frequency of the common voice frequency band and another in the middle of the medium frequency voice band.
- the presence of speech can be detected (while not capturing the voice content) while ensuring privacy/security enclosure protection is activated.
- Some embodiments include a random masking signal.
- one or more speakers can be used to cover one or more microphones to create a separate random, pseudo-random or other type of noise source and separate speaker for each microphone in a protected device.
- Some embodiments of the invention include specialized speaker and/or speaker driver selection.
- Some embodiments include a privacy/security enclosure that can produce one or more specific waveforms to mask human speech.
- some embodiments include speakers that can produce the desired waveforms with relatively low power consumption. For example, some waveforms can be produced with power consumption less than 850uA.
- the privacy/security enclosure can change and/or delay a starting time for the masking signal.
- the privacy/security enclosure includes a control system that enables the system and/or the user to select and vary the amount of time between speech detection and masking signal activation.
- any of the privacy/security enclosures shown and described in FIGS. 208-265B can change the masking signal tail time.
- the control system can stop the transmission of the masking signal substantially immediately.
- the control system can include a transmission of the masking signal that comprises a tail (i.e. a transmission for a certain period of time after speech ceases). In some embodiments, this can minimize obtrusiveness as testing indicates that a constant start/stop is more obtrusive than continuous transmission.
- tuning the tail can allow substantially continuous broadcast through the normal starts and stops and pauses that are a part of human conversation.
- the volume of the masking signal can be varying. In some embodiments, the control system or the user can vary the volume of the masking signal based on the volume of the detected sound (e.g. such as a human voice).
- any of the privacy/security enclosures shown and described in FIGS. 208-265B can include an obfuscation and/or randomness setting.
- the privacy/security enclosure can prevent or reduce the ability of an authorized and/or unauthorized listener from detecting the presence of speech, or, if the presence of speech can be detected, reducing or eliminating the intelligibility of such speech.
- the privacy/security enclosure in the obfuscation and/or randomness mode, can randomly broadcast to provide protection even if no one is speaking, thereby diminishing the ability of an authorized and/or unauthorized listener of detecting when there is actual speech by a user using the system.
- Some embodiments of the invention include an always on mode.
- the privacy/security enclosure includes active audio masking that is always on.
- the privacy/security enclosure can broadcast at least one masking/obfuscation signal(s) as long as there is power to the device or enough charge in one or more batteries (if included) to power the transmission of such signal(s).
- FIG. 219 illustrates an operational view of a privacy/security enclosure 21900 in accordance with some embodiments of the invention.
- the privacy/security enclosure 21900 can comprise a main housing 21910 mountable to a user device 1 1.
- Part of the housing 21900 includes a moveable portion or hood 21950 that can be moved away from the housing wall 21912 to lower a privacy level, or can be coupled to the housing wall 21912 to raise or set a privacy level.
- surfaces 21915 and/or 21955 can be color coded and/or illuminated to warn or caution a user of a non-private configuration or a lower privacy setting.
- FIG. 220 illustrates an operational view of a privacy/security enclosure 22000 in accordance with some further embodiments of the invention.
- Some embodiments of the invention include a privacy/security enclosure 22000 comprising a main housing 22010 including a coupled hood 22050.
- the main housing 22010 can include a shutter aperture 22020 and an actuable shutter 22030.
- the shutter 22030 can be actuated by a user using an integrated shutter actuator 22040.
- the shutter 22030 can be manually or automatically actuated.
- a user can close the shutter 22030 by sliding the slider insert 22040.
- the shutter 22030 can be opened by moving the slider insert 22040 in the reverse direction.
- regions of the privacy/security enclosure that can be used for user interaction can include tabs or raised areas (e.g., ramps etc.) that can enable the user to more easily move the portion of the device that needs to be moved, and also to provide a cue as to where and how they should actuate such a mechanism.
- Some embodiments include textured surfaces or materials/coatings that make such surfaces less slippery to the user.
- FIG. 221 illustrates an operational view of a privacy/security enclosure 22100 in accordance with some embodiments of the invention.
- a privacy/security enclosure 22100 comprising a main housing 221 10 including a coupled hood 22150.
- the main housing 221 10 can include a shutter aperture 22120 and an actuable shutter 22130.
- the shutter 22130 can be actuated by a user using an integrated shutter grip surface 22140.
- the shutter 22130 can be manually or automatically actuated.
- a user can close the shutter 22130 by pushing the shutter 22130 aided by the grip surface 22140.
- the grip surface 22140 can comprise an uneven or textured surface.
- the grip surface 22140 can comprise at least one notch or at least one extension.
- a user can activate a portion of the privacy/security enclosure to privatize the underlying device.
- the privacy level of the privacy/security enclosure can be changed by opening at least a portion of the privacy/security enclosure (such as a shutter) with respect to another portion of the privacy/security enclosure.
- the privacy/security enclosure can comprise a button-activated aperture such as a shutter.
- the camera shutter can comprise an iris.
- the camera shutter can comprise a horizontal shutter. In some further embodiments, the camera shutter can comprise a vertical shutter.
- the privacy/security enclosure can comprise a camera shutter operating mechanism.
- the camera shutter can comprise a push-button mechanism.
- the camera shutter can comprise a slider, such as a slide positioned in one or more guides.
- FIG. 222 illustrating an operational view of a privacy/security enclosure 22200 in accordance with some further embodiments of the invention
- by activating a button positioned on the fixed body of the privacy/security enclosure at least a portion or section of the privacy/security enclosure can be opened or slid away from an underlying aperture of a fixed portion of the privacy/security enclosure.
- the interior of the privacy/security enclosure can be revealed to a user, and potentially at least one sensor (such as a camera and/or microphone) can be uncovered and revealed.
- the interior of the privacy/security enclosure can be color-coded to alert a user to a security threat that might be posed when the privacy/security enclosure includes a shutter that is at least partially slid open.
- a privacy/security enclosure 22200 comprising a main housing 22210 including a coupled hood 22250.
- the main housing 22210 can include a shutter aperture 22220 and an actuable shutter 22230.
- the shutter 22230 can be actuated by a user using an integrated shutter actuator button 22240.
- the shutter 22230 can be manually or automatically actuated.
- a user can close the shutter 22230 by actuating the shutter actuator button 22240.
- the shutter 22230 can be opened by actuating the shutter actuator button 22240.
- a user can close an open shutter by sliding the shutter to a closed position.
- Some embodiments of the invention include a privacy/security enclosure 22300 comprising a main housing 22310 including a coupled hood 22350.
- the main housing 22310 can include a shutter aperture 22320 and an actuable shutter 22330.
- the shutter 22330 can be actuated by a user using an integrated shutter actuator button 22340. In some embodiments, the shutter 22330 can be manually actuated after actuation of the button 22340.
- a user can close the shutter 22330 by actuating the shutter actuator button 22340, and pushing the shutter 22340 towards the button 22340.
- the shutter 22330 can be opened by actuating the shutter actuator button 22340.
- the shutter can then either automatically open, or the user can pull or push-open the shutter 22330.
- the button can be positioned on the sliding shutter.
- Some embodiments of the invention include a privacy/security enclosure 22400 comprising a main housing 22410 including a coupled hood 22450.
- the main housing 22410 can include a shutter aperture 22420 and an actuable shutter 22430.
- the shutter 22430 can be actuated by a user using an integrated shutter actuator button 22440 that is positioned on the shutter 22430.
- the shutter 22430 can be manually or automatically actuated.
- a user can close the shutter 22430 by actuating the shutter actuator button 22440. When closed, the shutter 22430 can be opened by actuating the shutter actuator button 22440. In either case, actuation of the button 22440 can release the shutter 22430 for movement manually or automatically (e.g., using a conventional spring actuation or motor).
- the privacy/security enclosure can include one or more logos and/or brand images.
- the privacy logos and/or brand images can comprise an LED dimmer button.
- the button can comprise a capacitive touch button.
- some embodiments of the invention include a privacy/security enclosure 22500 comprising a main housing 22510 including a coupled hood 22550.
- the main housing 22510 can include a shutter aperture 22520 and an actuable shutter 22530.
- the shutter 22530 can be actuated by a user using an integrated slider 22540.
- the shutter 22530 can be manually or automatically actuated. When closed, the shutter 22530 can be opened by moving the slider integrated slider 22540 in the reverse direction.
- the main housing 22510 can comprise an LED dimmer, and/or a backlit logo (shown as 22548).
- some embodiments of the invention include a privacy/security enclosure 22600 comprising a main housing 22610 including a coupled hood 22650.
- the main housing 22610 can include a shutter aperture 22620 and an actuable shutter 22630.
- the shutter 22630 can be actuated by a user using an integrated shutter actuator button 22640.
- the shutter 22630 can be manually or automatically actuated.
- a user can close the shutter 22630 by actuating the shutter actuator button 22640.
- the shutter 22630 can be opened by actuating the shutter actuator button 22640.
- the main housing 22510 can comprise an LED dimmer, and/or a backlit logo (shown as 22648).
- the privacy/security enclosure can include at least one external connector such as a USB or micro-USB connector.
- the external connector can include a coupled lead such a USB or micro-USB lead.
- the coupled lead can provide power to the privacy/security enclosure.
- a USB wall charger can be used to couple to the USB to provide power to the privacy/security enclosure.
- the external connector and/or external lead can be positioned adjacent one end of the privacy/security enclosure. In other embodiments, the external connector and/or external lead can be positioned between the ends of the privacy/security enclosure. In some embodiments of the invention, the external connector and/or external lead can be positioned at the rear of the privacy/security enclosure.
- FIG. 227 illustrates a rear view of a privacy/security enclosure 227 comprising a main housing 22710 in accordance with some embodiments of the invention. In some embodiments, the external connector 22735 and/or external lead can include a color accent 22745. Further, FIG.
- 228 illustrates a rear view of a privacy/security enclosure 22800 comprising main housing 22810 in accordance with some embodiments of the invention, and shows the external connector 22830 and/or external lead can include a color accent 22845.
- the external connector and/or external lead 22735, 22845 can include internal illumination.
- FIG. 229 illustrates a front view of a privacy/security enclosure 22900 in accordance with some embodiments of the invention
- FIG. 230 illustrates a side view of a privacy/security enclosure 22900 in accordance with some embodiments of the invention.
- the privacy/security enclosure 22900 can comprise a main housing 22910 that can include a main section 22911 housing electronics 22930 and at least one battery 22935, and a secondary section including an upper portion 22920 including at least one extension or flange 22915.
- the upper portion 22920 can house at least one speaker 22960.
- a user can clip the extension or flange 22915 over and/or around a device to be privatized, and position the privacy/security enclosure 22900 to at least partially align the at least one speaker 22960 with at least one microphone of the user's device.
- a privacy/security enclosure can include at least one speaker mounted in the main section of the main housing and positioned proximate the inner surface of the main portion of the main housing, and at least one speaker mounted in the upper portion of the main housing, and positioned proximate the inner surface of the upper portion.
- FIG. 231 illustrates a side view of a privacy/security enclosure 23100 in accordance with some embodiments of the invention.
- the privacy/security enclosure 23100 can comprise a main housing 22310 that can include a main section 2231 1 housing and a secondary section including an upper portion 23120 including at least one extension or flange 223122.
- the upper portion 22920 can house at least one speaker 23165 coupled to a seal 23175, and the main section 231 1 1 can include at least one speaker 23160 coupled to a seal 23170.
- a user can clip the extension or flange 23122 over a device to be privatized, and position the privacy/security enclosure 23100 to at least partially align the at least one speaker 23165, 23160 with at least one microphone of the user's device and seal at least one of the seals 23175, 23170.
- FIGS. 232A-245C illustrate various views of privacy/security enclosures in accordance with some embodiments of the invention.
- the privacy/security enclosure in addition to or in place of the color coded interior of the privacy/security enclosure alerting to a potential non-privacy, can include one or more active visual indications of potential non-privacy.
- a movable portion or shutter of an extension or flange can be positioned in a frame.
- FIGS. 232A-232C illustrate views of a privacy/security enclosure showing an embodiment including a webcam LED.
- FIG. 232A shows a front perspective view
- FIG. 232A shows a front perspective view
- FIG. 232A shows a front perspective view
- the privacy/security enclosure 23200 can comprise a main housing 23210 with an extendable hood 23250. At least one logo 23212, 23260 can be positioned on the main housing including a logo 23212 positioned on the main section, and logo 23260 positioned on the secondary section 23215.
- the privacy/security enclosure 23200 can include a shutter aperture 23225 including slidable shutter 23220.
- the slidable shutter 23220 includes an LED lightpipe 23222 that can be configured to block at least one camera of the user's device.
- the webcam LED assembly 23222 can illuminate based on the position of the movable cover, the shutter, or both. Further, as also shown in FIGS. 233A-236C, in some embodiments, LED assembly 23222 can include an LED light- pipe that can be positioned to block a camera of the user's device.
- some embodiments include a privacy/security enclosure 23300 comprising a main housing 23310 including a main section 23320, and secondary section 23325, and hood 23350.
- raising the hood 23350 can expose a color accent warning 23330.
- the shutter 23335 can include an LED assembly and/or LED lightpipe 23337.
- the main housing 23310 can include at least one backlit capacitive touch control 23352.
- FIGS. 234A-234C illustrate perspective views of a privacy/security enclosure 23400 comprising a main housing 23410 including a main section 23415 and secondary section 23420, and hood 23450.
- raising the hood 23450 can expose a color accent warning 23430.
- the shutter 23420 can be positioned within the frame 23455, and can include an LED assembly and/or LED lightpipe 23425. Further, in some embodiments, the main housing 23410 can include at least one backlit jewel button 23452.
- one or more lightpipes can be used to enable a user to view at least a portion of the display or other structure of the user's device.
- a lightpipe can include an optical pass-through function to enable the LED signal of the underlying device to pass-through to the user. For example, if the user's device has display or LED that is lit (e.g., indicating that the device's camera is recording), even though a portion of the privacy device can actually be covering or partially obstructing such LED.
- a privacy/security enclosure 23500 can comprise a main housing 23510 including a main section 23520, and secondary section 23525, and hood 23550.
- raising the hood 23550 can expose a microphone opening 23535 and a color accent warning 23530.
- the shutter 23560 can include an LED assembly and/or LED lightpipe 23565 in some embodiments.
- the hood 23550 can include at least one backlit capacitive touch control 23552.
- FIGS. 236A-236C illustrate perspective views of a privacy/security enclosure 23600 in accordance with some embodiments of the invention.
- a privacy/security enclosure 23600 comprising a main housing 23610 including a main section 23615, secondary section 23625, and hood 23650.
- raising the hood 23650 can expose a color accent warning 23635.
- the shutter 23645 can include a webcam LED assembly 23670 and/or LED lightpipe 23660.
- the main housing 23610 can include at least one backlit capacitive touch control 23695 and/or at least one illuminated or non-illuminated logo 23690.
- the frame 23622 can form part of the secondary section 23625, supporting the shutter 23645.
- FIGS. 237A-237C illustrate perspective views of a privacy/security enclosure 23700 in accordance with some embodiments of the invention.
- the privacy/security enclosure 23700 can comprise a main housing 23710 including a hood 23750, shutter aperture 23720 and a shutter slider 23730.
- the privacy/security enclosure 23700 can comprise a main housing 23710 that includes at least one glossy surface.
- an end portion 23710a of the privacy/security enclosure 23700 can comprise a glossy outer surface.
- the privacy/security enclosure 23700 can comprise an outer surface that includes at least one non-glossy or matte surface 23710b.
- the privacy/security enclosure 23700 can comprise an outer surface that includes at least one patterned or textured outer surface. In some embodiments, raising the hood 23750 can expose a color accent warning. Further, in some embodiments, the main housing 23710 can include at least one capacitive touch control 23712. In some embodiments, the main housing 23710 can include one or more logos 23711. Further, in some embodiments, a micro-USB connector can be coupled into the main housing 23710.
- a movable portion (such as the angled microphone seal 23880) of the privacy/security enclosure 23800 can comprise a capacitive touch button 23805.
- a user can touch the capacitive touch button 23805 to extend the movable portion 23880 from the main housing 23810 to open the privacy/security enclosure 23800 (i.e. the movable portion 23880 can rise to open).
- a shutter slider 23830 can be integrated into the main housing 23810.
- the privacy/security enclosure 23800 can include an internal color warning accent 23885.
- FIGS. 239A-239C illustrate perspective views of a privacy/security enclosure 23900 in accordance with some embodiments of the invention.
- the privacy/security enclosure 23900 can include a shutter 23935 that can be flipped by rotating or pivoting with respect to the main housing 23910 of the privacy/security enclosure 23900 to adjust the level of privacy of the user's device 1 1.
- the shutter 23935 of the privacy/security enclosure 23900 by rotating or pivoting the shutter 23935 of the privacy/security enclosure 23900, at least one sensor (such as a camera and/or microphone 23930) can be uncovered and revealed.
- the rotation or pivoting can be enabled by one or more hinges 23925 and/or other conventional mechanisms.
- the interior of the privacy/security enclosure e.g., such as an inner surface 23935a of the shutter 23935, shutter aperture 23922 or surface 23923
- the shutter 23935 can include a warning notification comprising a text warning 23935b.
- the privacy/security enclosure 23900 can include a hood 23950 of the privacy/security enclosure 23900 can comprise a capacitive touch button 23955.
- FIGS. 239A-239C illustrate a shutter 23935 that can be flipped by rotating or pivoting left or right, with an axis of rotation generally parallel with the end of the privacy/security enclosure 23900.
- a privacy/security enclosure can include a shutter that can be flipped by rotating or pivoting left or right, with an axis of rotation generally perpendicular to the end of the privacy/security enclosure.
- FIG. 240A-240C illustrates perspective views of a privacy/security enclosure in accordance with some further embodiments of the invention showing the portion or section that can be flipped by rotating or pivoting up or down with an axis of rotation generally parallel with the upper and lower surfaces of the privacy/security enclosure.
- FIG. 240A-240C illustrates perspective views of a privacy/security enclosure 24000 in accordance with some embodiments of the invention.
- the privacy/security enclosure 24000 can include a shutter 24035 that can be flipped by rotating or pivoting with respect to the main housing 24010 of the privacy/security enclosure 24000 to adjust the level of privacy of the user's device 1 1.
- at least one sensor such as a camera and/or microphone 24030
- the rotation or pivoting can be enabled by one or more hinges 24025 and/or other conventional mechanism.
- the interior of the privacy/security enclosure (e.g., such as an inner surface 24035a of the shutter 24035, shutter aperture 24022 or surface 24023) can be color-coded to alert a user to a security threat that might be posed when the privacy/security enclosure 24000 is at least partially open.
- the shutter 24035 can include a warning notification comprising a text warning 24035b.
- the privacy/security enclosure 24000 can include a hood 24050 of the privacy/security enclosure 24000 can comprise a capacitive touch button 24055.
- the front face 241 15 of the privacy/security enclosure 24100 can comprise at least one shutter slider 24140.
- the shutter slider 24140 can comprise a color accent 24140a.
- the privacy/security enclosure 24100 can comprise an external connector and lead 24170 that include a color accent 24175.
- the color accents of the shutter slide and the connector and lead can be matched.
- the privacy/security enclosure 24100 can comprise a main housing 24110 including a hood 24150, and shutter aperture 24120. In some embodiments, raising the hood 24150 can expose a color accent warning.
- the main housing 241 10 can include at least one capacitive touch control or logo 24155. In some embodiments, the main housing 241 10 can include one or more logos.
- the hood 24250 can include at least one textured surface 24255.
- the hood 24250 can include a capacitive touch button including an LED indicator 24212.
- the front facing surface 24251 of the hood 24250 can comprise a textured surface 24214 (such as textured touch points).
- the privacy/security enclosure 24200 can also include a shutter 24235 positioned in a shutter aperture 24220 in the main housing 24210.
- the shutter 24235 can comprise a vertical shutter.
- the shutter 24235 can include a colored or textured surface 24235a.
- the privacy/security enclosure 24200 can comprise an external connector and lead 24270.
- the lead 24270 can include a color accent.
- the shutter of a privacy/security enclosure can be moved by a user using an extension or slider at one end of the privacy/security enclosure.
- the extension or slider can extend from a side of one end of the privacy/security enclosure.
- the extension or slider can be moved upwards or downwards (i.e., generally along an axis parallel with the end of the privacy/security enclosure) to move the shutter upwards or downwards respectively.
- the privacy/security enclosure 24300 can comprise a main housing 24310 including a primary portion 24312 coupled to an end of an upper portion 24314.
- a secondary portion 24315 of the main housing 24310 can couple to an opposite end of the upper portion 24314.
- the privacy/security enclosure 24300 can include an extendible hood 24350 that can extend out from the upper portion 24314 of the main housing 24310.
- the privacy/security enclosure 24300 can include a shutter aperture 24320 positioned in the secondary portion 24315.
- a shutter 24330 can be positioned within the aperture 24320.
- a shutter slide 24340 can be positioned extending from a side of the main housing 24310, and can be configured to enable a user to move the shutter 24330 by moving the slide 24340 away from or towards the upper portion 24314 of the main housing 24310.
- FIG. 244A-244C illustrates perspective views of a privacy/security enclosure 24400 in accordance with some embodiments of the invention.
- the privacy/security enclosure 24400 can comprise a main housing 24410 including a primary portion 24413 coupled to an end of an upper portion 24414.
- a secondary portion 24415 of the main housing 24410 can couple to an opposite end of the upper portion 24414.
- the privacy/security enclosure 24400 can include an extendible hood 24450 that can extend out from the upper portion 24414 of the main housing 24410.
- the privacy/security enclosure 24400 can include a shutter aperture 24420 positioned in the secondary portion 24415.
- a shutter 24430 can be positioned within the aperture 24420.
- a shutter slide 24440 can be positioned extending from a side of the main housing 24410, and can be configured to enable a user to move the shutter 24430 by moving the slide 24440 away from or towards the upper portion 24414 of the main housing 24410.
- the upper portion 24414 and/or the hood 24450 can include a capacitive touch switch 24412.
- the switch 24412 can be configured to raise and/or lower the hood 24450.
- the privacy/security enclosure 24550 can include at least one LED indicator 24515.
- the indicator 24515 can traverse around at least a portion of the main housing 24510.
- the privacy/security enclosure 24515 can comprise at least one LED indicator 24515 that can extend around the privacy/security enclosure 24500 extending from an upper surface 24552 to a lower surface 24512 on both sides of the privacy/security enclosure 24500.
- the LED indicator 24515 can extend around a push button release 24665 positioned on the upper surface 24552 of the main housing 24510.
- the at least one LED indicator 24515 can comprise a color that is substantially the same as the color accent of a coupled extension and lead 24580.
- the color of the interior surface 24570 of the privacy/security enclosure 24500 can comprise a privacy alert color that matches the accent color.
- the privacy/security enclosure 24500 can include a capacitive touch arm 24545 positioned on a front face portion 24517 of the main housing 24510.
- the use of the LED indicator(s) such LED indicator 24515 and others described herein can include indicating that certain types of privacy protection are active (i.e. the active audio masking signal is being transmitted), the battery status (if a battery in included) and maintenance or alert signals of different types.
- the LED indicators could also be decorative in nature.
- the main housing can be customized.
- FIG. 246A-246D illustrates perspective views of a privacy/security enclosure 24600 and accent covers 24612, 24614 in accordance with some embodiments of the invention showing at least one customizable component.
- the main housing 24610 of the privacy/security enclosure 24600 can comprise an outer face plate 24611 that can be customized (e.g., customized by a user or purchaser of the privacy/security enclosure).
- the outer face plate 24611 shown positioned on the main housing 24610 of the privacy/security enclosure 24600 can be customized to be replaced with or coupled to a glossy face plate 24612 (FIG. 246B) or a textured faceplate 24614 (FIG.
- the outer face plate 24611 can comprise a matt, textured, or patterned face plate.
- the outer face plate 2461 1 can be positioned adjacent or proximate the aperture 24620.
- the outer face plate 2461 1 can include an aperture generally matched in size and geometry to the aperture 24620.
- the outer face plate 2461 1 can be positioned adjacent or proximate the hood 24650.
- the outer face plate 2461 1 can positioned at least partially around the hood 24650.
- the privacy/security enclosure can be mounted to a surface by coupling to an adapter.
- the adapter can be configured specifically for a user device (such as a 21" or 27" computer or display).
- the adapter can be coupled to the user device using one or more adhesive strips.
- the privacy/security enclosure can be mounted to the user device by coupling the privacy/security enclosure with the adapter.
- the privacy/security enclosure can be mounted to the adapter, and the privacy/security enclosure with adapter can be mounted to the user device.
- FIG. 247 illustrates a privacy/security enclosure mounting assembly view in accordance with some embodiments of the invention.
- the privacy/security enclosure 24700 can be assembled and attached to the user device 1 1 using either one of adapters 24718, 24720.
- the adapter 24718 can be coupled to the inner surface 2471 1 of the main housing 24710 of the privacy/security enclosure 24700.
- the adapter 24720 can be coupled to the inner surface 2471 1 of the main housing 24710 of the privacy/security enclosure 24700 as determined by the size and/or geometry of the user's device 1 1.
- the privacy/security enclosure 24700 can be hung over an edge and/or top of the device 1 1 placing the primary portion 24715 of the main housing over or against one side or portion of the device 11 and the secondary portion 24717 of the main housing over another side or portion of the device 1 1.
- the privacy/security enclosure 24700 and adapters 24718, 24725 can be adapted, shaped, and sized to be used with a 21" diagonal display or a 27" diagonal display.
- the privacy/security enclosure embodiments 24800 can be mounted to a user device.
- FIG. 248 illustrates a front perspective view of a privacy/security enclosure 24800 in accordance with some embodiments of the invention
- FIG. 249 illustrates a rear perspective view of the privacy/security enclosure 24800 of FIG. 248 mounted to a computer or display (user device 11) in accordance with some embodiments of the invention.
- the privacy/security enclosure 24800 can comprise a main housing 24810 including secondary portion 24815 including a shutter 24830.
- the secondary portion 24815 can be mounted over the device 1 1 on one side, and the main section 24811 can be mounted over an opposite side of the device 1 1.
- Power and/or data can be coupled to the privacy/security enclosure 24800 through the connector 24870 on the side of the device 11 opposite the secondary portion 24815 as shown.
- FIG. 250 illustrates a front perspective view of a privacy/security enclosure 25000 in accordance with some embodiments of the invention
- FIG. 251 illustrates a rear perspective view of the privacy/security enclosure 25000 of FIG. 250 mounted to a computer or display device in accordance with some embodiments of the invention.
- the privacy/security enclosure 25000 can comprise a main housing 25010 including secondary portion 25015 including a shutter 25030.
- the secondary portion 25015 can be mounted over the device 11 on one side, and the main section 25011 can be mounted over an opposite side of the device 1 1.
- Power and/or data can be coupled to the privacy/security enclosure 25000 through the connector 25070 on the side of the device 11 opposite the secondary section 25015 as shown.
- the privacy/security enclosure embodiments 25200 can be mounted to a user device.
- FIG. 252 illustrates a front perspective view of a privacy/security enclosure 25200 in accordance with some embodiments of the invention
- FIG. 249 illustrates a rear perspective view of the privacy/security enclosure 25200 of FIG. 252 mounted to a computer or display (user device 11) in accordance with some embodiments of the invention.
- the privacy/security enclosure 25200 can comprise a main housing 25210 including secondary portion 25215 including a shutter 25230.
- the secondary portion 25215 can be mounted over the device 1 1 on one side, and the main section 25211 can be mounted over an opposite side of the device 1 1.
- FIG. 254 illustrates a front perspective view of a privacy/security enclosure 25400 in accordance with some embodiments of the invention
- FIG. 251 illustrates a rear perspective view of the privacy/security enclosure 25400 of FIG. 254 mounted to a computer or display device in accordance with some embodiments of the invention
- the privacy/security enclosure 25400 can comprise a main housing 25410 including secondary portion 25415 including a shutter 25430.
- the secondary portion 25415 can be mounted over the device 1 1 on one side, and the main section 25411 can be mounted over an opposite side of the device 11.
- Power and/or data can be coupled to the privacy/security enclosure 25400 through the connector 25470 on the side of the device 1 1 opposite the secondary section 25415 as shown.
- the privacy/security enclosure 25200 can comprise at least one logo and/or at least one button or capacitive control or arm.
- the privacy/security enclosure 25200 can comprise a at least one button or capacitive control or arm 25275 and/or at least one logo 25285.
- the privacy/security enclosure 25400 can comprise a at least one button or capacitive control or arm 25475 and/or at least one logo 25485.
- FIGS. 256-258 illustrate views of a privacy/security enclosure 25600 in accordance with some embodiments of the invention.
- the privacy/security enclosure 25600 can comprise a main housing 25610 including secondary portion 25615 including a shutter 25630.
- the secondary portion 25615 can be mounted over the device 11 on one side (shown in FIG. 256), and the main section 25611 can be mounted over an opposite side of the device 1 1 (shown in perspective view in FIG. 257, and in side view in FIG. 258).
- Power and/or data can be coupled to the privacy/security enclosure 25600 on the side of the device 1 1 opposite the secondary section 25615.
- the privacy/security enclosure 25600 can comprise at least one logo 25657 and/or at least one button or capacitive control or arm 25655. Further, in some embodiments, the privacy/security enclosure 25600 can comprise a at least one button or capacitive control 25610 for actuation of the shutter 25630.
- the partial inner view of FIG. 258 depicts an internal actuator assembly.
- the actuator assembly can comprise an internal release assembly 25690 including at least one internal release mechanism configured to enable the hood 25650 to be raised and lowered within the main housing 25610.
- the inner view shown in FIGS. 257 shows internal release mechanisms 25691, 25692.
- Example internal release mechanisms suitable for internal release mechanisms 25691, 25692 for use in any of the privacy/security enclosure embodiments disclosed herein are also shown in FIGS. 259, 259A, 259B, 260, 260A, 260B, 261, 261A.
- Some embodiments include one or more push-rods that can be actuated by a user to operate a release catch, seal, or other conventional latching mechanism.
- Some embodiments include a combination of at least one push or pull rods and a slidable latch, catch, or conventional holding or sealing mechanism.
- some embodiments can utilize a push latch or panel access mechanism from GBK-UK (e.g., such as push latch - small reference code 41002).
- FIGS. 259, 259A, 259B, 260, 260A, 260B, 261, 261A illustrates internal release mechanisms in accordance with some embodiments of the invention.
- some embodiments include at least one release rod 25910 coupled to at least one control spring 25912.
- a latch 25930 (shown in perspective in FIG. 259B) can control release and capture of the at least one release rod 25910.
- Some embodiments also include one or more seals (shown in FIGS 259A, 260A, and 261A).
- some embodiments include a seal 25960, 26010, 261 10.
- a release rod 25910 can be used in conjunction with a tension spring 26120 to provide a push and pull type action to raising and lowering of a hood of a privacy/security enclosure.
- FIGS. 262-263 illustrate rear perspective views of computer or display mounted privacy/security enclosures in accordance with some embodiments of the invention.
- the privacy/security enclosure 26200 can be mounted on a user device 1 1 including connector and lead 26210.
- FIGS. 264A-264B illustrating rear perspective views of privacy/security enclosures 26400, 26401, including textures 26430, 26455, in some embodiments, connector and lead 24670 (used in either of the privacy/security enclosures 26400, 26401) can comprise any of the leads and/or connectors described herein.
- FIG. 266 illustrates a front perspective view of a privacy/security enclosure 26600 according to some embodiments of the invention.
- the privacy/security enclosure 26600 can comprise a main housing 26610 including a coupled hood cover assembly 26615 and an enclosure 26605.
- the privacy/security enclosure 26600 can also include a base assembly 26620 that can comprise a Faraday base as described in preceding embodiments.
- the hood cover assembly 26615 can include a reversible cover 26620a.
- the privacy/security enclosure 26600 can include one or more surface facets 26625 extending at least a partial length of the privacy/security enclosure.
- the facets 26625 can be formed in the hood cover assembly 26615 and/or in the base assembly 26620.
- the hood cover assembly 26615 and base assembly 26620 can include facets 26626, 26621.
- the geometry of the facets 26626 in the hood cover assembly can complement the facets 26621 of the base assembly thereby providing a seamless outer structure extending the length and width of the privacy/security enclosure.
- the facets 26625 can extend to the outer edge surfaces of the hood cover assembly and/or the base assembly.
- the geometry of the facets 26626 of the hood cover assembly and/or the facets 26621 of the base assembly can complement facets on the outer edge surfaces (such as outer edge surfaces 26617b), thereby providing a seamless outer structure extending the length and width of the privacy/security enclosure including the outer edge surfaces.
- the hood cover assembly 26615 and/or the base assembly 26620 can comprise one or more product logos, markings, signs, or graphics (e.g., such as logo 26670 show on the hood cover assembly 26615).
- a hood cover or enclosure/cover 26615a can be coupled with an internal case or device in multiple orientations, including, but not limited to, a 180 degree or reversible orientation.
- features of the internal case or enclosed/covered device can be accessible, visible or be able to be activated or deactivated, tuned, adjusted, or changed via various devices and/or assemblies, including, but not limited to light pipes, buttons, switches, controls, transparent, translucent or otherwise light, texture and/or touch sensitive/passing materials and/or surfaces.
- the passing of sensor information, data communication via wired or wireless technologies and/or other types of energy or information transfer can be allowed in at least one direction to or from, through or to the inside and outside of the privacy/security enclosure 26600.
- a port or mechanism for data transfer can be included to allow power passing and/or charging of batteries.
- ports or mechanisms to pass other forms of energy such as sound, light, pressure, heat and others can be included.
- any information or energy passing to/from or through any cover or enclosure of the privacy/security enclosure 26600 can be modified, changed, obfuscated, amplified, attenuated or blocked for a particular purpose.
- a port or other mechanism can be included such that sensors (including, but not limited to barometric, echo location/sonar, motion, heat, light, RF, video or sound sensors) can operate within the cover or enclosure.
- the port or other mechanism can be sealable/closable to a full or partial percentage to content/information passing through the port, another mechanism or the cover or enclosure itself can be modified or changed by features or functions built into or around the cover or enclosure, making it either easier or more difficult for the sensor or impacted capability to operate or to record/capture information as compared to the absence of such port, mechanism, seal, repeater, amplification, modification, masking, obfuscation or other capability.
- FIG. 266 shows an embodiment of a hood cover with a pass-through button 26680 that allows LED or other optical signaling/feedback information to pass through the hood cover, while simultaneously providing a button by which a user can activate, deactivate or otherwise tune audio masking/jamming or other capabilities of the internal case or device.
- the capabilities described can be asymmetrically provided in the cover or enclosure.
- FIG. 266 depicts a transfer button and LED pass- through capability (shown as 26680) on one side of a reversible cover 26620a.
- a user can select or vary functionality by choosing the desired orientation of the cover or enclosure (i.e., the reverse side of the cover 26620a is devoid of the pass-through button 26680.
- Some embodiments can include an enclosure that can be at least partially opened or closed by a user, and/or can include a portion that can be moved, adjusted, opened or closed by a user to adjust a level of privacy/security.
- at least a portion of the housing assembly can be moved with respect to another portion of the housing assembly, or can comprise one or more separable and/or moveable portions.
- FIG. 267 illustrates a front perspective view of the privacy/security enclosure 26600 with a hood or cover portion with a hood cover assembly 26615 removed according to some embodiments of the invention.
- a base assembly 26625 including a Faraday base assembly 26627 can be seen at the base end of the enclosure, and a hood assembly 26630 can be seen at the other end of the enclosure 26625. All of these components and assemblies can be coupled to form the housing assembly 26701.
- the structure including enclosure 26605 shown in FIG. 267 can form a cradle or enclosure for one or more user devices (such as a user device 10).
- the inner surface 26607 of the cradle or enclosure 26606 of the enclosure 26605 can include a patterned surface 26609. Further, in some embodiments, the inner surface 26607 can comprise one or more product logos, markings, signs, or graphics 26611.
- FIG. 268 illustrates an exploded assembly view 26801 of portions of the privacy/security enclosure 26600 in accordance with some embodiments of the invention.
- various structural, functional, and aesthetic components can be assembled and coupled to form at least a portion of the housing assembly 26701, including for example, the hood cover assembly 26615, a base assembly 26625 including a Faraday base assembly 26627, and a hood assembly 26630.
- embodiments of the housing assembly 26701 can include a variety of components and sub-assemblies including a hood arm 26810, hood mask 26823, hood arm lid 26825, hood cap 26827, slider 26829, hood spring 26821, and hood clamp 26816.
- Some embodiments of the invention can include various electrical and electronic components, in addition to various structures and materials for housing and/or protecting the components.
- some embodiments include a phone detect switch 26818, a speaker flex board 26918, speaker drivers 26814, and acoustic seals 26812.
- FIG. 269 illustrates components of the Faraday base assembly 26627 including, but not limited to, a lower portion comprising a Faraday pan 26915, and an upper portion forming a Faraday rim 26910.
- the Faraday pan 26915 and Faraday rim 26910 can be coupled to form part of the base assembly 26625 illustrated in FIG. 267.
- a DC pass-through assembly 26920 can be housed within the base assembly 26625. In this instance, the DC pass-through assembly 26920 can be coupled to the Faraday pan 26915 and/or coupled to the Faraday rim 26915.
- FIG. 270 Further components of the base assembly 26625 can be seen in FIG. 270, illustrating an exploded assembly view of portions of the base assembly 26625 in accordance with some embodiments of the invention.
- the Faraday base assembly 27010 can be coupled to a housing sub-assembly forming an end portion of the privacy/security enclosure 26600 (or other privacy/security enclosure described herein).
- the Faraday base assembly 27010 can be coupled to a removable main base 27025.
- the main base 27025 can form a structurally supporting portion of the housing assembly 26701, while also forming a portion of the coupled hood cover assembly 26615 and an enclosure 26605 of the privacy/security enclosure 26600.
- various functional components can be coupled and/or integrated to the Faraday base assembly 27010 and/or the main base 27025, when the Faraday base assembly 27010 is coupled to the main base 27025.
- some embodiments include an interface board 27015.
- one or more components can extend through the main base 27025.
- a control button assembly 27020 can be positioned in the main base 27025, including a portion (i.e., a button 27021) that extends through an aperture 27026 in the main base 27025 to enable access and control of at least one function of the privacy/security enclosure 26600 by the user.
- Other embodiments can include one or more light-pipe assemblies 27030 positioned within the main base 27025 to enable optical transfer.
- the main board assembly with the base assembly can also be seen in FIG. 271, illustrating an exploded assembly view 27101 of portions of the privacy/security enclosure 26600 in accordance with some embodiments of the invention.
- the exploded assembly view 27101 can include assembly of components and sub-assemblies comprising enclosure 27105, hood assembly 27107, detent wear inserts 27109, battery wear sheet 2711 1, and miscellaneous screws and screw covers or other fasteners 27113.
- some components include battery 27117, battery door 271 19, base assembly 27121, and main board 27123.
- other components coupled to the main board 27123 include an Apple LightningTM connector pivot 27115 and lower acoustic seal 27125.
- the assembly of the base assembly 27121 with the aforementioned hood assembly 26630 can be seen in the example embodiments. LightningTM is a registered trademark of Apple, Inc. of Cupertino, California.
- FIG. 272 illustrates an exploded assembly view 27201 of portions of the privacy/security enclosure 26600 in accordance with some embodiments of the invention.
- the privacy/security enclosure 26600 can include a Faraday tube or canister 27207 and/or a Faraday cover assembly 27209, and outer shell 27205.
- the privacy/security enclosure 26600 can include the Faraday tube or canister 27027 and/or the outer shell 27205 coupled to the metal bezel 2721 1.
- wear strips 27221 can be assembled into the privacy/security enclosure 26600 to prevent or limit wear caused by movable portions or sections of the privacy/security enclosure 26600.
- some embodiments include one or more conductive o-rings 27215 and one or more fingerstock 27213 coupled between the metal bezel 2721 1 and the main base (27025 shown in FIG. 270). Some embodiments also include various components to cover or protect the privacy/security enclosure including a cover bumper 27219 and/or an environmental seal 27217. Some embodiments include one or more detents to enable one or more components (e.g., such as outer shell 27205) to be added or removed while creating an audible sound and/or vibration that appears satisfying to a user.
- one or more components e.g., such as outer shell 27205
- Some embodiments of the invention include systems and methods for obscuration or elimination of the detection of human voice using any sensor within a mobile communication device.
- obscuration can prevent or disrupt the ability of a sensor such as an accelerometer and gyroscope to detect the presence of a human voice, discriminate the gender of a spoken human voice, and/or understand the content and meaning spoken by a human voice (i.e., the recorded communication is not intelligible.)
- FIGS. 273-276 illustrate perspective views of privacy/security enclosures including mechanical isolation structures and functions in accordance with some embodiments of the invention.
- some embodiments include an assembly 27300 that can include mechanical isolation of the mobile phone from the enclosure.
- the mobile phone (user device 10) can be isolated from the enclosure 27310 using one or more suspension elements 27320.
- the suspension elements 27320 can be mounted at both the top and bottom interfaces, and/or at both ends.
- the suspension elements 27320 can be mounted at least one interface and/or at one end of the enclosure 27310.
- one or more suspension elements 27320 can comprise any compliant and/or sprung material including a spring or other material that can provide vibration damping.
- some embodiments can include mechanical isolation of the enclosure from the external environment.
- the enclosure 27400 can be mechanically isolated from the external environment (when placed on a surface 27405 while containing a user device 10 as shown).
- Some embodiments include suspension elements 27410 mounted at both the top and bottom interfaces, and at both ends of the enclosure 27400. In some further embodiments, the suspension elements 27410 can be mounted at one interface and/or at one end of the enclosure 27400.
- some embodiments include mechanical isolation of the enclosure 27510 from the case 27500.
- the enclosure 27510 is mechanically isolated from the case 27500 when placed within the case 27500, and the user device 10 is contained within the enclosure 27510.
- Some embodiments include suspension elements 27520 mounted at both the top and bottom interfaces, and at both ends of the enclosure 27510. In some further embodiments, the suspension elements 27520 can be mounted at one interface and/or at one end of the enclosure 27520.
- the case 27600 can be mechanically isolated from the external environment (placed on a surface while containing the enclosure 27510 containing the user device 10).
- Suspension elements 27520 can isolate the enclosure 27510 from the case 27600, while suspension elements 27614 and/or 27612 can isolate the case 27600 and the enclosure 27510 from an external surface.
- FIG. 277 illustrates an end view of a privacy/security enclosure 27700 including broadband vibration in accordance with some embodiments of the invention.
- Some embodiments include a system for creating broadband vibration at the surface (or other portion) of a user device 10 positioned within the enclosure 27705 for use as a mask or obscuration of audio reception or passage of vibrations caused by audio or the human voice.
- an actuator 27710 can be electronically driven using a broadband signal to provide the broadband vibration described above.
- some embodiments include signal spectral output that is matched or otherwise tailored to mask audio frequencies of interest.
- Some embodiments of the invention include integrated vibrators or actuators designed to mask, reduce, confuse, trick, send false or misleading information or prevent the ability of gyroscopes, accelerometers or other sensors to provide movement and/or location information. For example, in some cases, given a known or approximated starting location, even in the absence of location tracking capabilities provided by cellular triangulation, GPS capabilities, WiFi, beacon or other technologies, gyroscopes, accelerometers or other such sensors can be able to provide general or specific movement information such that when an ending location is known or approximated, movements between the starting and ending location can be determined, either roughly or specifically.
- Some embodiments of the invention can use signals such as pulsed, random, pseudo-random, deterministic, broadband, tuned and/or otherwise tailored signals to drive vibrators and/or actuators in such a way that masks, confuses, misleads, reduces or prevents the ability of sensors to determine movement and/or location information.
- Such vibrators and/or actuators can be coupled to the user device 10 in conventional ways or as described above.
- Some embodiments of the invention can use the motion of the enclosed user device 10 or of the enclosure itself as an input/variable used in determining the signal driving the vibrators/actuators.
- a sensor can be used to measure vibrational energy at the surface of the user device 10, and an actuator is used to create a compensating vibration at the surface of the user device 10.
- a processing element can receive signals from a sensor.
- the processing element sends a drive signal to an actuator to indicate that the sensed vibrations are compensated within the audio bandwidth. In this instance, the resulting vibration at the surface of the phone is changed, reduced or practically eliminated.
- the sensing and actuating elements can be the same (e.g. piezoelectric drive/piezoelectric sensing). In some other embodiments, the sensing and actuating elements can be different. For example, FIG.
- the privacy/security enclosure 27800 can comprise a system 27850 configured for active vibration cancelling that can be used to reduce, change or eliminate vibration at the surface of a user device 10.
- some embodiments include an enclosure 27805 with a system 27850 comprising at least one actuator 27810 and at least one sensor 27830 coupled with close loop processing control of the at least one actuator 27810 based at least in part on a signal from sensor 27830.
- FIG. 279 illustrates an internal cross-sectional view of a privacy/security enclosure 27900 with a light pipe 27910.
- a light pipe 27910 can be placed directly above a conventional ambient light sensor.
- a light pipe 27910 can be proximate a speaker slot 27920.
- FIG. 280 shows an example assembly of shells parts 28020 and spring parts 28010, and light pipes 28005 with minimal space and tight assembly tolerances.
- 281-282, and 283-284 illustrate light pipe structures (28100, 28200, 28300, 28400) arranged in a periscope-like configuration (light transfer element 28201 coupled to light transfer element 28203 coupled to light transfer element 28205) for use in light transmission within a privacy/security enclosure in accordance with some embodiments of the invention.
- the placement and collecting area of the ambient light gathering portion of the light pipe can be placed in order to minimize visibility of the light pipe by users of the privacy/security enclosure.
- the collecting surface area and the reflecting and/or transit surface areas and/or volumes can be designed, engineered and/or optimized such that light sensors of protected devices can operate as if they were not being blocked, or so that the light provided to them via the light pipe only results in a reduction of 10% - 30%.
- users of the privacy/security enclosure can be minimally aware or unaware that the native light sensor(s) of protected devices are covered by the privacy/security enclosure.
- the privacy/security enclosure can include an adjustable aperture for use in covering and uncovering a portion of the user's device while attached or coupled to the user's device.
- the user's device can include at least one window.
- the window can be slid open and closed to uncover or cover a portion of the user's device (e.g., such as a camera or other sensor).
- the window can be attached or clipped on.
- the window can comprise a compliant material that can be folded or wrapped (e.g., such as a flap or curtain).
- devices such as mobile communication and computing devices including cellular phones, smart phones, computer laptops and tablets etc., desktop computers, gaming consoles, wearable devices such as smart watches and Google Glass® can be rendered at least partially private using one or more of the disclosed privacy/security enclosures.
- embodiment 28505 illustrated in FIG. 285B shows an adhesively attachable shutter 28507.
- embodiment 28505 illustrated in FIG. 285A shows a sliding shutter 28510.
- embodiment 28520 illustrated in FIG. 285C shows a flappable shutter 28530.
- the embodiment 28540 illustrated in FIG. 285D shows a magnetic coupling and a foldable shutter 28550.
- embodiment 28560 illustrated in FIG. 285E depicts a clip-on shutter.
- the privacy/security enclosure can comprise a structure that accommodates a user using the privacy/security enclosure as a sleeve to protect or make private one or more user devices.
- the privacy/security enclosure can be wrapped, attached, secured, or otherwise coupled to the user's device.
- FIG. 286 illustrates a privacy/security enclosure including a Faraday sleeve 28600 in accordance with some embodiments of the invention.
- an enclosure 28610 can be inserted into the Faraday sleeve 28600 to enhance the privacy of the user's device.
- the privacy/security enclosure can be coupled to the user's device using a conventional adhesive.
- the attached, secured, or otherwise coupled device can be coupled to the user's device using any suitable conventional device, component or materials including, but not limited to a "snap-on" assembly, Velcro, clip, screw, magnet, or combination thereof.
- the privacy/security enclosure can be clipped around portions of the case or housing of a user's device (e.g., such as a laptop case or shell).
- the privacy/security enclosure can include one or more separate portions clipped to the user's device.
- the user can attach more than one privacy/security enclosure to various areas of the user's device.
- FIGS. 287A-287B illustrate privacy/security enclosures 28700, 28710 for use with device cases and user devices 15 in accordance with some embodiments of the invention.
- the privacy/security enclosure 28700, 28710 can wrap and/or attach to the user device 15.
- the privacy/security enclosure can communicate to the user's device though this connection and/or receive power from this connection.
- the privacy/security enclosure can control one or more components of the user's device through the device's USB, micro-USB or other port and/or while coupled to the device's USB, micro-USB or other port.
- the privacy/security enclosure can physically cover or electronically control one or more sensors of the user's device including, but not limited to, a camera or microphone.
- the privacy/security enclosure can couple to a USB, micro-USB or other port/connector of a user's device.
- FIG. 288 illustrates a USB-powered active portion 28805 of a privacy/security enclosure 28800 in accordance with some embodiments of the invention.
- the portion 28805 can be coupled to the USB port 15a of a device 15 to alter the privacy level of the device 15.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Set Structure (AREA)
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562100462P | 2015-01-06 | 2015-01-06 | |
US201562161759P | 2015-05-14 | 2015-05-14 | |
US201562195903P | 2015-07-23 | 2015-07-23 | |
US201562198635P | 2015-07-29 | 2015-07-29 | |
US201562209249P | 2015-08-24 | 2015-08-24 | |
PCT/US2015/050054 WO2016111727A1 (en) | 2015-01-06 | 2015-09-14 | Privacy and security systems and methods of use |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3243160A1 true EP3243160A1 (de) | 2017-11-15 |
Family
ID=56356270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP15877281.4A Withdrawn EP3243160A1 (de) | 2015-01-06 | 2015-09-14 | Privatsphären- und sicherheitssysteme und verfahren zur verwendung |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP3243160A1 (de) |
WO (2) | WO2016111728A1 (de) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110036349B (zh) | 2017-02-16 | 2024-01-30 | 华为技术有限公司 | 一种可穿戴设备 |
EP3574634A4 (de) | 2017-07-28 | 2020-08-19 | Hewlett-Packard Development Company, L.P. | Interferenzerzeugung |
US10992662B2 (en) | 2017-10-09 | 2021-04-27 | International Business Machines Corporation | Enabling/disabling applications using face authentication |
CN109168151B (zh) * | 2018-08-27 | 2021-02-09 | 丸方精密机械(上海)有限公司 | 一种便携式电子通信辅助装置 |
GB2582258A (en) * | 2019-02-26 | 2020-09-23 | Jaguar Land Rover Ltd | Portable device isolation system, device and method |
US11320250B2 (en) * | 2019-12-27 | 2022-05-03 | Thales Dis Cpl Usa, Inc. | Assembly for detecting an intrusion into an appliance and a corresponding appliance |
DE102020133648A1 (de) * | 2020-12-16 | 2022-06-23 | Audi Aktiengesellschaft | Verfahren zur Abhörsicherung einer Stimme |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070259704A1 (en) * | 2006-05-08 | 2007-11-08 | Shiou-Jen Jung | Mobile phone receiving bag for shielding electromagnetic wave |
WO2008099384A2 (en) * | 2007-02-13 | 2008-08-21 | Modu Ltd. | Modular wireless communicator |
US8101872B2 (en) * | 2007-06-13 | 2012-01-24 | Malone William G | Mobile sound and light resistant electromagnetic isolation chamber |
US9655419B2 (en) * | 2010-09-07 | 2017-05-23 | Michael J. Nash | Data signal blocking personal communication device holder |
US20120308064A1 (en) * | 2011-06-03 | 2012-12-06 | Demitrius Matthews | Mobile Device Protective Case with Built-in Speaker System |
US9345178B2 (en) * | 2012-01-20 | 2016-05-17 | Paul Fitzgerald Davis | Configurable shield for hand-held electronic device |
TW201406216A (zh) * | 2012-07-20 | 2014-02-01 | Ta Er Innovation Co Ltd | 具背蓋行動電源的通訊裝置保護框用轉接器及該保護框 |
US9761930B2 (en) * | 2012-11-24 | 2017-09-12 | Erin Finegold | Radio frequency emission guard for portable wireless electronic device |
US20140284095A1 (en) * | 2013-01-25 | 2014-09-25 | Scott Behuniak | Device for eliminating cell phone tracking |
-
2015
- 2015-09-14 EP EP15877281.4A patent/EP3243160A1/de not_active Withdrawn
- 2015-09-14 WO PCT/US2015/050055 patent/WO2016111728A1/en active Application Filing
- 2015-09-14 WO PCT/US2015/050054 patent/WO2016111727A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2016111727A1 (en) | 2016-07-14 |
WO2016111728A1 (en) | 2016-07-14 |
WO2016111728A9 (en) | 2016-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10128890B2 (en) | Privacy and security systems and methods of use | |
WO2016111727A1 (en) | Privacy and security systems and methods of use | |
US11600905B2 (en) | Mobile terminal | |
CN107026326B (zh) | 移动终端 | |
EP3461111B1 (de) | Mobiles endgerät | |
US11189929B2 (en) | Mobile terminal | |
CN104935686B (zh) | 移动终端 | |
EP3208700B1 (de) | Iot-vorrichtung, mobiles endgerät und verfahren zur steuerung der iot-vorrichtung mit vibrationspaarung | |
CN108512954B (zh) | 移动终端及其控制方法 | |
CN106559526B (zh) | 移动终端 | |
US7180735B2 (en) | Protective enclosure and watertight adapter for an interactive flat-panel controlled device | |
US20170180984A1 (en) | Enpoint security appliance/sensor platform | |
CN107343061B (zh) | 移动终端 | |
JP3866724B2 (ja) | 車両用娯楽システム | |
US11281259B2 (en) | Mobile terminal | |
CN110249482A (zh) | 移动终端 | |
KR20190125461A (ko) | Pcb 적층 구조체와 이를 포함하는 이동 단말기 | |
WO2004103773A3 (en) | Rearview mirror assemblies incorporating hands-free telephone components | |
EP2560352B1 (de) | Mobiles Endgerät und Schwingungsverfahren dafür | |
US10063975B2 (en) | Mobile terminal | |
CN103229387A (zh) | 车载充电设备和安装该充电设备的车辆 | |
CN109597464A (zh) | 移动终端及其操作方法 | |
US9525763B1 (en) | Mobile terminal and assembling method thereof | |
US10917510B1 (en) | Mobile terminal and assistance device coupled to the same | |
GB2582258A (en) | Portable device isolation system, device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20170807 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20180404 |