GB2338744A - Security device for a computer - Google Patents

Security device for a computer Download PDF

Info

Publication number
GB2338744A
GB2338744A GB9914797A GB9914797A GB2338744A GB 2338744 A GB2338744 A GB 2338744A GB 9914797 A GB9914797 A GB 9914797A GB 9914797 A GB9914797 A GB 9914797A GB 2338744 A GB2338744 A GB 2338744A
Authority
GB
United Kingdom
Prior art keywords
bar
sleeve
nut
security arrangement
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9914797A
Other versions
GB9914797D0 (en
Inventor
Christoher John Kendall
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of GB9914797D0 publication Critical patent/GB9914797D0/en
Publication of GB2338744A publication Critical patent/GB2338744A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B73/00Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices
    • E05B73/0082Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices for office machines, e.g. PC's, portable computers, typewriters, calculators

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Casings For Electric Apparatus (AREA)

Abstract

The device of specification GB2320739 is modified by replacing the bolt with a threaded rod 20, which can be inserted upwards to engage a nut 21 secured inside the computer.

Description

SECURITY ARRANGEMENT, METHOD AND DEVICE
FIELD, OF THE INVENTION
2338744 This invention relates to a security arrangement, method and device, and in particular to a security arrangement for a portable unit such as a desk-top computer.
BACKGROUND TO THE INVENTION
Desk-top computers are in widespread commercial use. Current models are relatively light-weight and so can be unlawfully removed by someone acting alone i.e. they can individually be lifted from the respective work surface or desk and carried away by one person. Such theft is a recognised problem from offices to which the public have access.
Furthermore, with the need to teach the practical use of a range of computers to a wider public by means of a "handson" approach, the theft of (unattended) computers from schools, colleges and libraries is of particular concern.
Separate external components such as computer monitors, printers and the like may also need to be secured against (independent) unauthorised removal.
DISCLOSURE OF THE PRIOR ART
One known computer security arrangement utilises a metal plate which can be both bonded and screwed to the computer base, being fitted in use adjacent to one edge of the base so that a part of the plate projects outwardly from the base. This projecting part can be slidingly received in a key-operated lock secured to the worksurface. A disadvantage of this edge-fitted security arrangement is that in use the computer is held at a position outside the computer periphery, so that unauthorised breaking of the security arrangement (as by lifting of the opposite side of the computer is made easier i.e considerable leverage can be 5 exerted, by way of the full length of the computer base.
Another known security arrangement utilises a braided metal wire, one end of which is locked to a surface of a workbench or the like; the other end of which is headed, this headed end being retained behind a metal hoop secured to an outer surface of the computer casing. One disadvantage of this arrangement is that the method of retaining the wire is clearly visible, so that a would-be thief can judge the tools required (wire-cutters etc.) and if these are not readily available the theft can be delayed until they are to hand.
Yet another known security arrangement utilises telescopic struts which are secured in channels bolted through the work surface, the computer base resting on the channels and/or struts. The struts have upstanding arms which when properly adjusted can grip the sides of the computer casing; one upstanding arm has an adjustable L- shaped extension with a hand part which extends at right-angles to the upstanding arm and which can fit over the computer casing. In use, the upstanding arm can be key-locked, with the hand part pressing against the computer casing. One disadvantage of this arrangement is that four related bolt holes (at least) need to be drilled through the work surface. A f urther disadvantage is that the computer is lifted well above the work surface upon the channels/struts, so allowing the insertion of a large cross- section lever between the work surface and computer. Another disadvantage is that it is difficult, if not impossible, to arrange for a tight grip of the computer by the upstanding arms and/or the hand part, so that the computer retains some play and can be damaged by attempts to break the security arrangement by manual manoeuvring of the computer.
1 A common disadvantage of the known security arrangements described is that they are relatively complicated to fit and costly to purchase. Furthermore, Subsequent authorised computer removal requires use of a dedicated key. These security arrangements utilise an area of the work surface additional to that required by the computer itself, with a larger resulting "footprint".
US patent 4,856,305 (Adams) discloses a security device for office machines. The device comprises a bolt fitted to the machine and projecting through a desk top or the like. The accessible end of the bolt can be covered by a housing which in the fitted condition can rotate about the bolt to reduce the likelihood of unauthorised removal. The housing can be closed by a lock which obscures the (otherwise accessible) end of the bolt. In a first embodiment a tapped hole is provided in the bottom of the machine and the threaded end of the bolt cooperates therewith. In a second embodiment, the bolt is fitted to the office machine by way of a plain hole in the base of the machine, the bolt head being located within the machine with its shank projecting through the hole. In a third embodiment, the bolt head is secured by way of a locking plate to the underside of the machine.
The first embodiment would not be acceptable for a significant majority of office machines since the distance by which the bolt projects into the machine is determined in large part by the thickness of the desk top; the likelihood of the bolt engaging and damaging components inside the machine is considerable. In addition, the bolt is not locked in any way to the machine, so that a "constant pull" unscrewing action would likely remove it from the hole.
The second embodiment has the disadvantage that access to the inside of the machine is required (not just for the bolt itself but also for a spanner or the like to hold the bolt whilst the nut is tightened thereonto). The obtaining of such access may invalidate the machine warranty. In any event, such access is likely to be severely restricted.
The third embodiment (and usually also the second embodiment) has the disadvantage that the bolt is permanently projecting from the bottom of the machine, so that if the machine is moved from its location it cannot rest normally on another desk top until a hole for the bolt has been drilled thereinto; clearly this presents a particular disadvantage if the machine is required to be moved between locations, for example it is to be sold, serviced, returned to the manufacturer, temporarily repositioned, or stacked in storage. In addition, if the machine is to be re-sited on a different-thickness desk top there is no means of lengthening the bolt, and shortening it is difficult and may cause damage to the machine.
The second and third embodiments (and to some extent also the first embodiment) also share the disadvantage that the thickness of the desk top is critical in ensuring correct fitment, i.e. for a given length of bolt there is only a small tolerance within the housing which can accommodate variations in thickness of the desk top, i. e. the desk top cannot be significantly thicker than shown without the engagement between the bolt and its nut being reduced or even prevented, whilst a slightly thinner desk top will result in the bolt fouling the lock.
DISCLOSURE OF THE INVENTION
We now propose a security arrangement for desk top computers and the like which seeks to overcome disadvantages of the known prior art of which we are aware.
1 we thus propose a security arrangement for a portable unit such as a desk top computer which includes a threaded bar, the bar being securable to the unit with a part projecting - therefrom, a sleeve having an internal diameter greater than that of the bar, and means to mount the sleeve about the part of the bar, said means allowing rotation of the sleeve relative to the bar.
We also propose a security arrangement for a portable unit such as a desk top computer which includes a threaded bar, the bar being securable to the unit with a part projecting therefrom, means to hold the bar against rotation relative to the unit, a sleeve having an internal diameter greater than that of the bar, and means to mount the sleeve about the part of the bar, said means allowing rotation of the sleeve relative to the bar.
Since the sleeve can rotate relative to the bar, the unauthorised removal of the unit (such as a computer) is hindered or prevented because it is difficult or impossible to impart rotational force to the bar or to the means to mount the sleeve.
The bar can be secured to the unit by way of a threaded connection to a nut or the like mounted in or upon the unit. Preferably, a lock nut or the like provides further security between the bar and the unit.
The unit can have a base with a preformed opening, the bar passing through the opening and into cooperating engagement with a nut (and perhaps also a strengthening plate) secured within the unit. Thus the unit can have a casing including a base, with the bar secured to the base and projecting downwardly in the fitted condition of use, with the nut to which the bar is secured being located inside the casing. Alternatively the nut (and plate) may be mechanically fixed, or chemically bonded, to the outside of the casing.
It will be understood that the threaded connection between the bar and the nut allows some adjustment in the "free" length of the bar, so that the bar can (within limits) be adjusted to the thickness of the desk top or the like. In addition, notwithstanding that the nut (and plate) may be fitted to the inside of the unit (by the unit manufacturer), the bar is always f itted from the outside of the unit, so that no warranty or access issues arise, and the bar can be removed when the unit is away from its security location.
Preferably, the means to mount the sleeve will allow rotation of the sleeve about the longitudinal axis of the bar, but alternatively the sleeve rotation could be about an axis parallel to the bar axis, or nearly so. Preferably also the sleeve at one end will have an annular cap through which can pass at least part of the bar. In use the cap may be positioned adjacent the underside of a work surface, but there may be a washer provided between the cap and the work surface for a purpose to be described below. Usefully the cap will be of significantly larger outer diameter than the sleeve so that any attempt to lever against the cap will result in the opposed side of the cap fouling the work surface, to inhibit further angular cap or sleeve movement.
The bar will terminate short of that end of the sleeve remote f rom the cap so that the end of the bar (remote from the base) is difficult to access, for instance to prevent attempted manipulation of the bar end.
In a useful arrangement the free end of the sleeve can be protected by a secured cross-strut, preferably by a padlock arm passed through aligned holes in the sleeve sidewalls, or by a lockable end cap, perhaps using a sleeve lock.
Preferably, the means to mount the sleeve about a part of the bar includes at least one nut and at least one washer. There may be two nuts and two washers, one of the nuts acting as a lock nut; alternatively there may be a single self-locking nut of the "NylocC (TM) type.
In addition, a disc can be fed into the sleeve to conceal the nut or nuts, adding to the difficulty of an intending thief deciding which tools to use or to fetch, with the disc being retained by the cross-strut or by the bar.
Thus we also propose a security arrangement for a portable unit such as a desk top computer which includes a threaded bar, the bar being securable to the computer casing, means to hold the bar against rotation relative to the casing, a sleeve having an internal diameter greater than that of the bar, a cap for the sleeve, the cap having a hole larger than that of the bar but smaller than the internal diameter of the sleeve, and means to mount the sleeve about the bar with part of the bar passing through the hole in the cap and with a further part within the sleeve, said means allowing rotation of the cap and thus of the sleeve relative to the bar.
In one method of assembling a security arrangement according to the invention a hole will be formed in (for example drilled through) the work surface, of a size to accommodate the bar. The bar will be, or will already have been, secured to the computer (or the like) outer casing with a portion of the bar projecting away from the casing. Then that projecting portion of the bar will be fed through the hole in the work surface, and will have been selected to be of a length so that a portion projects beyond the other side of the work surface. The sleeve will be fed over the projecting bar portion, cap first, and rotatably secured about the bar.
Usefully all of the bar will be threaded, though only the ends must be. As above indicated, the bar can receive a f irst nut and washer, and a second nut and washer, with at least the f irst washer being of larger outer diameter than the hole in the cap so as to hold the cap between the other side of the work surface and the first nut and washer. In one method of fitting, the first nut is tightened until the 8 - cap is tightly sandwiched between the f irst washer and the other side of the work surface (and so prevented from rotating relative to the worksurface), and then untightened by one half-turn or as much as necessary to permit the cap (and thus the sleeve) to rotate substantially freely; the second nut and washer combination is then screwed along the bar until the second washer is in locking engagement with the first nut.
We also propose a security device for use in an arrangement as herein defined, the device comprising a threaded bar, a sleeve, and means to mount the sleeve to a part of the bar, said means allowing rotation of the sleeve relative to the bar.
is We believe we have thus provided a security arrangement which will deter opportunistic thieves, which authorised personnel can readily retro-fit to existing equipment, which can be fitted within the footprint of a computer being protected to leave free the maximum working area, and which uses available pieces to reduce cost to a level acceptable to e.g. educational establishments.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will be further described by way of examplie with reference to the accompanying schematic drawings in which: - m m a Fig. 1 Fig. 2 is a plan view of a computer with the upper cover removed to reveal the base; is a side view of part of a computer casing, with a bar non-ro'tatably secured in accordance with a first embodiment of the invention; 9 Fig. 3 is a side view of part of a computer casing, with a bar non- rotatably secured in accordance with a second embodiment of the invention; 5 Fig.4 is an exploded perspective view of a sleeve, of the first and second nut and washer combinations, and of the concealment disc; and Fig. 5 is is sectional side view of the f irst embodiment of security arrangement according to the invention securing a computer base.
DESCRIPTION OF THE EXEMPLARY EMBODIMENTS
The computer 10 (Fig.1) has a base 11 which carries known components such as the processor 12, memory 13 and modem 14. The base 11 has location points 15 at each corner for a cover (not shown).
In the base 11 of the computer is a through-hole 16, spaced from the computer components. This hole 16 will preferably be provided by the computer supplier, but can alternatively (though less preferably) be drilled by the computer owner or a colleague, including for instance a school or college laboratory technical assistant. Although shown offset from the centre of the base 11, the hole 16 will in a preferred embodiment be as near to the base centre as is practical, in accordance with the layout of the components.
As shown in Fig.2, secured within the computer 10, adjacent the hole 16, is a nut 21 and strengthening plate 25. The nut 21 and plate 25 will preferably be secured to the inside of the computer base 11 by the computer manufacturer, before the components 12,13 and 14 have been inserted, so that no warranty or access issues arise. The plate 25 may be secured to the base, and the nut 21 secured to the plate 25, by any suitable method, including welding and adhesive bonding. The purpose of the strengthening plate is to add strength to the base 11 adjacent the hole 16; the plate 25 is of a thickness and area suited to the particular application.
One end of the threaded bar 20 can cooperate with the nut 21, so that when fitted a large portion of the bar 20 projects from the bottom of the computer 10, as shown in Fig.2.
As shown, the nut 21 has a domed head 22, so that the bar 20 can only be inserted to a certain point. Thus, the nut 21 prevents the bar from projecting into the casing and perhaps engaging and damaging components therewithin. Clearly, in embodiments in which the hole 16 is positioned so that the bar cannot engage any internal components, the nut need not be domed, so that if desired the bar can pass therethrough.
To the lower side (as viewed in Fig.2) of the computer base 20 11 there is a lock-nut 24, which is tightened firmly against the computer base 11 and effectively locks the bar 20 against rotation.
In the embodiment of Fig. 3, the nut 121 is secured (as by welding) to a plate 122, which plate is then secured (as by adhesive bonding) to the lower surface of the computer base ill. In this embodiment, which may be preferred by some users, it is not necessary to provide a hole in the computer base.
As with the embodiment of Fig.2, the bar 120 can be screwed into the nut 121 (the insertion being limited by engagement with the plate 122). Thereafter, lock nut 124 is firmly tightened against the nut 121, effectively locking the bar 120, so that, as with the first embodiment of Fig.2, the bolt 120 cannot rotate relative to the base.
- 11 it will be seen in Fig.3 that the combined thickness of the plate 122, nut 121, and lock nut 124 is greater than the length of the foot 125, so that for the computer to rest upon its feet a recess 126 has been formed in the desk top 127. Clearly, it may be that the feet 125 are long enough (or are lengthened to be long enough), or the plate and nuts are chosen to be thin enough, so that a recess in not required. However, this embodiment has the additional advantage that a person intent on removing the computer who might seek to insert a hacksaw into the gap between the computer and the desk top not only has to saw through the bar 120, but also a part of the nut 121 or 124, so reducing the likelihood of such unauthorised removal method being successful, or even being attempted.
is A hole 26 (and perhaps recess 126, if required) is drilled or otherwise formed through desk top 27,127, of a diameter to receive bar 20,120. The bar projects below the desk top 27,127, with a projecting length for a purpose to be described below.
First nut 30 (Fig.4) can cooperate with the bar thread 23, through the f ree end 36 of the sleeve 35, as can second (lock) nut 32. First nut 30 can thus move first washer 31 into engagement with the undersurface of annular cap or endpiece 34 (see also Fig.5), which in this embodiment is integral with the sleeve 35 but in an alternative embodiment is otherwise non-rotatably secured thereto. Second nut 32 can move second washer 33 into engagement with first nut 30, to help lock first nut 30 against rotation i.e. against unthreading along bolt thread 23.
Endpiece 34 of the sleeve 35 has an opening sized slightly larger than the diameter of the bar 20,120, so that the sleeve 35 can be placed over the projecting end of the bar and retained thereon by the nuts 30 and 32.
In an alternative embodiment a single locking nut, e.g. a "Nylock" nut, can be used in place of the first and second nuts 30,32 and the second washer 33, However, first washer 31 is still preferably retained, to facilitate substantially free rotation of the sleeve 35 about the bar 20, 120.
In the preferred embodiment, the sleeve 35 is of greater length than the projecting length of the bar 20 (see Fig.5), so that when the sleeve 35 is fitted over and around the projecting length of the bar 20,120 the projecting length stops short of the f ree end 36 of the sleeve 35. In these embodiments a concealment disc 37 is placed within sleeve 35 so that the f irst nut 30 and f irst washer 31 combination, and the second nut 32 and second washer 33 combination cannot be seen from the free end 36 of sleeve 35. The disc 37 has a central threaded hole, with a bladed slot 39 to receive a screwdriver or the like. Thus, the disc can be threadedly retained upon the free end of the bar; in an alternative embodiment the disc 37 will be a press fit in the sleeve 35, and have a recess or slot in its outer periphery permitting the disc to be withdrawn from the sleeve by a dedicated tool, when authorised removal of the computer is desired. In an alternative embodiment the concealment disc 37 is replaced by a locking end i.e. a disc which fits within the end of the shaft and which has arms which can be moved outwardly into gripping engagement with the shaft by a key, preferably by a rotatable key; the lock may be selected such that the key can only be removed when in the non-operative position i.e. to help prevent the key being left in the lock when the lock is held against the inner surface of the shaft.
In a further alternative embodiment the disc 37 is replaced by a "clinch nuC or the like, which can be relatively easily tightened upon bolt 20, but which is relatively difficult to untighten, for example requiring a specialised removal tool.
To prevent unauthorised removal of the disc 37, adjacent the free end 36 of the sleeve are aligned apertures 38 through which a locking bar, for instance a padlock staple can be passed; thus the padlock would need to be disabled before the first nut and washer combination could be accessed. The padlock has the incidental additional advantage of helping to conceal the disc 37 whereby to render the method of securement more difficult for an opportunistic thief to understand.
In use, the washer 40 and subsequently the sleeve 35 are placed over the projecting end of the bar 20,120. The first nut 30 is then threaded along bar thread 23 until first washer 31 presses the endpiece 34 into tight engagement with washer 40. The nut 30 is then unscrewed, for instance by half of one turn (180 degrees) until the sleeve can be freely rotated by hand about the bar 20,120. The second nut 32 is then fed along thread 23 until washer 33 engages the first nut to lock first nut 30 against rotation about bar 20,120. In this condition attempted removal of the sleeve by rotation (about the bolt axis) of sleeve 35 is ineffective, since the relatively free rotation of the sleeve does not cause corresponding rotation of the" bolt 20,120 or of the nuts 30,32.
Alternatively, the nuts 30,32 after securement are concealed by an end closure cap having a solid bottom which closes off the free end 36 of the sleeve 35. The end closure cap preferably has apertures which can be aligned with respective apertures 38 of the sleeve 35, and so can also be held by the padlock or the like against unauthorised removal.
It will be noted that the embodiments herein described overcome the above-stated disadvantages of the prior art in that the threaded connection of the bar with the nut located within or upon the unit allows some adjustment in the free length of the bar. In addition, the length of the sleeve 14 - makes the length of the bar less critical than in the Adams embodiments. In addition, since the bar is inserted from outside the unit, and is never secured permanently to the unit, it may be removed by an authorised individual at any 5 time and if necessary replaced with a different- length bar.
Furthermore, both the bar and the lock nut are fitted from outside of the unit, so that access to within the unit is not required.
Thus we believe we have provided a cheap but practical and effective solution to a problem which has long been of concern both to educationalists and to those responsible for the costs of providing education and training to those needing computer and similar skills. The solution is particularly advantageous because it does not demand extra desk space or work surface area in addition to that required by the computer itself, and does not present a permanent projection from the computer.
- 15

Claims (18)

  1. A security arrangement for a portable unit such as a desk top computer which includes a threaded bar, the bar being securable to the unit with a part projecting therefrom, a sleeve having an internal diameter greater than that of the bar, and means to mount the sleeve about the part of the bar, said means allowing rotation of the sleeve relative to the bar.
  2. 2. A security arrangement according to claim 1 having means to hold the bar against rotation relative to the unit.
  3. A security arrangement according to claim 1 or claim'2 in which the bar is secured to the unit by way of a threaded connection to a nut or the like mounted in or upon the unit.
  4. 4. A security arrangement according to claim 3 in which a lock nut or the like provides further security between the bar and the unit.
  5. A security arrangement according to any of claims 1-4 in which the unit has a base with a preformed opening, the bar being adapted to pass through the opening and into cooperating engagement with a nut secured within the unit.
  6. 6. A security arrangement according to claim 5 in which a strengthening plate is secured to the unit adjacent the opening.
  7. 7. A security arrangement according to any of claims 1-6 in which the sleeve has an annular cap with an opening through which can pass at least part of the bar.
  8. 8. A security arrangement according to claim 7 in which the cap is of significantly larger outer dimensions than the sleeve.
  9. 9. A security arrangement according to any of claims 1-8 in which the sleeve has aligned holes in its sidewalls, the holes being adapted to receive a padlock or other locking means for hindering access to the components within the sleeve.
  10. 10. A security arrangement according to any of claims 1-9 in which the the means to mount the sleeve about a part of the bar includes at least one nut and at least one washer.
  11. 11. A security arrangement for a portable unit such as a desk top computer which includes a threaded bar, the bar being securable to the computer casing, means to hold the bar against rotation relative to the casing, a sleeve having an internal diameter greater than that of the bar, a cap for the sleeve, the cap having an opening larger than the diameter of the bar but smaller than the internal dimension of the sleeve, and means to mount the sleeve about the bar with part of the bar passing through the hole in the cap and with a further part within the sleeve, said means allowing rotation of the cap and thus of the sleeve relative to the bar.
  12. 12. A method of assembling a security arrangement according to any of claims 1-11 comprising the following steps: fi) forming a hole in a work surface, of a size to accommodate the bar, {ii) securing the bar to the unit outer casing with a portion of the bar projecting away from the casing, {iii} feeding that projecting portion of the bar through the hole in the work surface, so that a part of the bar projects beyond the other side of the work surface, {iv} feeding the sleeve over the projecting bar portion, and {v} securing the sleeve to - 17 the bar so as to permit substantially free rotation of the sleeve about the bar.
  13. 13. A method according to claim 12 in which the sleeve is secured to the bar by the following steps: fi} a first washer is fed onto the bar, fii} a first nut is subsequently tightened upon the bar until the cap is tightly sandwiched between the first washer and the other side of the work surface, and {iii} untightening the first nut sufficiently to permit the sleeve to rotate substantially freely about the bar.
  14. 14. A method according to claim 13 in which a second nut and washer combination is subsequently screwed along the bar until the second washer is in locking engagement with the first nut.
  15. A method according to any of claims 12-14 in which the bar terminates short of the free end of the sleeve.
  16. A security device for use in an arrangement according to any of claims 111, or in the method according to any of claims 12-15, the device comprising a threaded bar, a sleeve, and means to mount the sleeve to a part of the bar, said means being adapted to allow rotation of the sleeve relative to the bar.
  17. 17. A security arrangement substantially as described with reference to Fig.2 and Fig.5 of the accompanying drawings.
  18. 18. A security arrangement substantially as described with reference to Fig.3 of the accompanying drawings.
GB9914797A 1998-06-26 1999-06-25 Security device for a computer Withdrawn GB2338744A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB9813747.4A GB9813747D0 (en) 1998-06-26 1998-06-26 Security arrangement and device

Publications (2)

Publication Number Publication Date
GB9914797D0 GB9914797D0 (en) 1999-08-25
GB2338744A true GB2338744A (en) 1999-12-29

Family

ID=10834383

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB9813747.4A Ceased GB9813747D0 (en) 1998-06-26 1998-06-26 Security arrangement and device
GB9914797A Withdrawn GB2338744A (en) 1998-06-26 1999-06-25 Security device for a computer

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB9813747.4A Ceased GB9813747D0 (en) 1998-06-26 1998-06-26 Security arrangement and device

Country Status (1)

Country Link
GB (2) GB9813747D0 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1726755A1 (en) * 2005-05-05 2006-11-29 Tatung Co., Ltd. Security structure of portable hard disk drive
US20120006084A1 (en) * 2008-06-23 2012-01-12 Paul Joseph Weber Electronic article security system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4856305A (en) * 1986-07-28 1989-08-15 Adams Michael W Office machine security system
GB2320739A (en) * 1996-12-24 1998-07-01 Christopher John Kendall Security arrangement and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4856305A (en) * 1986-07-28 1989-08-15 Adams Michael W Office machine security system
GB2320739A (en) * 1996-12-24 1998-07-01 Christopher John Kendall Security arrangement and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1726755A1 (en) * 2005-05-05 2006-11-29 Tatung Co., Ltd. Security structure of portable hard disk drive
US20120006084A1 (en) * 2008-06-23 2012-01-12 Paul Joseph Weber Electronic article security system

Also Published As

Publication number Publication date
GB9813747D0 (en) 1998-08-26
GB9914797D0 (en) 1999-08-25

Similar Documents

Publication Publication Date Title
US4856305A (en) Office machine security system
US20080232059A1 (en) Protruding lock for notebook computer or other personal electronic device
US20060176661A1 (en) Lock for notebook computer or other personal electronic device
US5381685A (en) Computer physical security device
US3910079A (en) Equipment security locking device
US5447044A (en) Apparatus for locking a notebook computer on a computer support
US7315443B2 (en) Notebook computer locking base
US4656848A (en) Security device for personal computers
US3990276A (en) Theft protection device for appliances and portable office equipment
US4007613A (en) Equipment security locking device
US5558349A (en) Self-locking bicycle
US6112562A (en) Computer physical security device
US5904383A (en) Anti-theft bolt guard
US4912949A (en) Lock clamp
JPH0710054A (en) Quick release device capable of being locked
US6257542B1 (en) Theft prevention clamp
US5863166A (en) Anti-theft locking device
US7243514B2 (en) Method and device for securing an electronic instrument to a bracket
EP0791123B1 (en) Computer physical security device
US4562707A (en) Outboard motor assembly locking system
GB2338744A (en) Security device for a computer
CA2519843A1 (en) Locking system with hidden keyed access
US5704655A (en) Anti-theft hose lock
GB2320739A (en) Security arrangement and device
US4942745A (en) Locking security arrangement

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)