GB2437108A - Security device for a computer - Google Patents

Security device for a computer Download PDF

Info

Publication number
GB2437108A
GB2437108A GB0606934A GB0606934A GB2437108A GB 2437108 A GB2437108 A GB 2437108A GB 0606934 A GB0606934 A GB 0606934A GB 0606934 A GB0606934 A GB 0606934A GB 2437108 A GB2437108 A GB 2437108A
Authority
GB
United Kingdom
Prior art keywords
security
lock
tag
computer
slot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0606934A
Other versions
GB0606934D0 (en
Inventor
Richard Bawamia
Scott Brothers
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TAG Co
Original Assignee
TAG Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TAG Co filed Critical TAG Co
Priority to GB0606934A priority Critical patent/GB2437108A/en
Publication of GB0606934D0 publication Critical patent/GB0606934D0/en
Publication of GB2437108A publication Critical patent/GB2437108A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B73/00Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices
    • E05B73/0017Anti-theft devices, e.g. tags or monitors, fixed to articles, e.g. clothes, and to be removed at the check-out of shops
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B73/00Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices
    • E05B73/0082Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices for office machines, e.g. PC's, portable computers, typewriters, calculators
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V15/00Tags attached to, or associated with, an object, in order to enable detection of the object
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • Geophysics (AREA)
  • Human Computer Interaction (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A security device 12 for computer equipment, comprises: a lock having a body (14, fig 3) and a T-shaped cam element (16, fig 3) engageable in a slot in the equipment body 10 and lockable in a rotated position to prevent removal from the slot; and an electronic security tag (18, fig 2) connected to the lock body such (14, fig 2) such that the tag is secured to the computer 10 when the lock element is locked in its rotated position in the slot. A security system comprises one or more detectors located at the or each entry point to a building, and a series of such security devices configured so as to activate an alarm when a detector detects removal of a device from the building.

Description

<p>1 2437108</p>
<p>Description</p>
<p>COMPUTER SECURITY TAG</p>
<p>Technical field</p>
<p>[0001] This invention relates to security devices for use with computers, especially laptop computers, and other electrical devices.</p>
<p>Background art</p>
<p>[0002] One problem with computers such as laptop computers is that their small size and portability makes it relatively easy for them to be stolen. Since it is common that such computers are used in an environment where it is impossible for a user to be able to see them at all times, it is desirable for physical security means to be provided to allow the computer to be fixed to a large and/or relatively immovable object.</p>
<p>[0003] One widely used security device is the Kensington lock which involves a cylindrical lock mechanism with a 1-shaped locking cam that engages in a slot provided in the chassis of the computer. A wire cable is typically attached to the lock which allows it to be secured by wrapping the cable around an object such as a table top or leg before it is locked to the computer. Examples of such a system are found in US 5327752 and US 5400629.</p>
<p>[0004] The use of Kensington lock has become so widespread that appropriate slots are found in many computers.</p>
<p>[0005] The development of wireless networks and smaller computers means that it is now common to be able to move computers around within a building or site. This means that the physical lock with a cable described above becomes inconvenient to use when moving around in a wireless environment.</p>
<p>[0006] While it has become easier to move around within a building or site, it is now often that case that security at access points (doors and gates) has increased with access often being by use of card keys and the like. It is now becoming more common to have electronic security systems at such access points.</p>
<p>[0007] It is an object of the invention to provide an electronic security system that makes use of existing physical security features found in computers.</p>
<p>Disclosure of the invention</p>
<p>[0008] One aspect of the invention comprises a security device for computer equipment, comprising: -a lock having a body and a T-shaped cam element engageable in a slot in the equipment body and lockable in a rotated position to prevent removal from the slot; and -an electronic security tag connected to the lock body such that the tag is secured to the computer when the lock element is locked in its rotated position in the slot.</p>
<p>[0009] The security device preferably comprises an electronic article surveillance tag or an RFID tag.</p>
<p>[0010] The electronic security tag can be releasably connected to the lock body, for example by a magnetically or mechanically releasable clutch.</p>
<p>[0011] A particularly preferred form of lock is an axial pin tumbler lock such as a Kensington lock.</p>
<p>[0012] Another aspect of the invention comprises a security system comprising one or more detectors located at the or each entry point to a building, and a series of security devices as claimed in any of claims 1-4 configured so as to activate an alarm when a detector detects removal of a device from the building.</p>
<p>[0013] The term computer equipment' encompasses laptop and desktop computers, peripherals such as printers, scanners, displays and projectors, and other such devices incorporating a chassis or body having a suitable slot accessible from the outside for receiving the lockable cam element.</p>
<p>Brief description of the drawings</p>
<p>[0014] Figure 1 shows a side view of a computer having a device according to an embodiment of the invention secured thereto; Figure 2 shows a side view of a first embodiment of a security device according to the invention; and Figure 3 shows a side view of a second embodiment of a security device according to an embodiment of the invention.</p>
<p>Mode(s) for carrying out the invention [0015] This invention provides a new security tag that utilises an existing security feature that is currently featured in many laptops, portable printers, and other IT peripherals including projection equipment. The Kensington lock is a device that locks into a small rectangular slot in the side or rear of such equipment. The embodiment of the invention described below utilises a Kensington lock. However, it will be appreciated that locks from other suppliers or other similar locks can be used.</p>
<p>[0016] The device shown in the drawings incorporates an encapsulated electronic article surveillance (EAS) tag that can operate at any of the EAS frequencies currently used, or can incorporate an RFID tag for improved asset tracking and management.</p>
<p>[0017] Figure 1 shows a laptop computer 10 having a device according to an embodiment of the invention 12 attached to the slot (not shown). The security device 12 comprises a Kensington axial pin tumbler lock having a lock body 14 and a T-shaped locking cam 16 for engagement in the slot normally used for attachment to a Kensington lock. The lock operates substantially as described in US 5327752 and US 5400629 (while no wire cable is provided or needed to operate the present invention, one can be provided for added security, if desired). An elongate electronic security tag 18 is connected to the lock body 14 such that when the lock is secured to the laptop, the tag 18 is locked onto the protected device via the locking cam 16. The lock can be removed by means of a typical flat or barrel type key, but can also be removed by using a clutch device such as is common for EAS tags in commercial applications, e.g. mechanical keyed clutch releases, magnetic clutch releases, or a combination of both mechanical and magnetic release (shielding or careful location of the magnetic clutch, if used, is necessary to avoid interference with electronic components such as the hard disk inside the computer). Figure 2 shows a side view of a lock with a clutch release 20.</p>
<p>[0018] The security tag 18 typically employs a live EAS elements within the encapsulated tag body. These elements can operate at RF frequencies (e.g. 8.2MHz, 2MHz, 4,2MHz, etc.), AM frequencies (e.g. 58 KHz) and RFID frequencies. One particularly preferred form of the tag employs both EAS and RFID elements.</p>
<p>[0019] A security system according to the invention comprises one or more EAS reader units located at doors, gates or other access point to a building or site in which the computer equipment is used. As each computer or piece of equipment enters the building, a security device of the type described above is attached by inserting the locking cam into the slot and operation the key. The equipment can then be moved around the site to any desired location for use. However, if it is attempted to move the equipment from the site without removing the security device, the reader units will detect this and sound an alarm. This is effective for both accidental and deliberate removal of the equipment.</p>
<p>[0020] Various changes can be made while staying within the scope of the invention. For example, the body containing the electronic element can have various shapes to reduce possibility of it being levered off the lock without removing the lock from the equipment. The mode or frequency of operation of the element can be selected according to requirements.</p>

Claims (1)

  1. <p>Claims 1. A security device for a computer, comprising: -a lock having
    a body and a T-shaped cam element engageable in a slot in the computer body and lockable in a rotated position to prevent removal from the slot; and -an electronic security tag connected to the lock body such that the tag is secured to the computer when the lock element is locked in its rotated position in the slot.</p>
    <p>2. A security device as claimed in claim 1, wherein the security device comprises an electronic article surveillance tag or an RFID tag.</p>
    <p>3. A device as claimed in claim I or 2, wherein the electronic security tag is releasably connected to the lock body.</p>
    <p>4. A device as claimed in claim 3, wherein the security tag is secured by a magnetically or mechanically releasable clutch.</p>
    <p>5. A security system comprising one or more detectors located at the or each entry point to a building, and a series of security devices as claimed in any of claims 1-4 configured so as to activate an alarm when a detector detects removal of a device from the building.</p>
GB0606934A 2006-04-06 2006-04-06 Security device for a computer Withdrawn GB2437108A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0606934A GB2437108A (en) 2006-04-06 2006-04-06 Security device for a computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0606934A GB2437108A (en) 2006-04-06 2006-04-06 Security device for a computer

Publications (2)

Publication Number Publication Date
GB0606934D0 GB0606934D0 (en) 2006-05-17
GB2437108A true GB2437108A (en) 2007-10-17

Family

ID=36539447

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0606934A Withdrawn GB2437108A (en) 2006-04-06 2006-04-06 Security device for a computer

Country Status (1)

Country Link
GB (1) GB2437108A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7515048B1 (en) 2008-05-20 2009-04-07 International Business Machines Corporation Method and system for using RFID to automatically lock and unlock a mobile computing device
WO2008153372A3 (en) * 2007-06-13 2009-09-11 Rfid Mexico S.A. De C.V Electronic identification and security device for portable devices

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5327752A (en) * 1992-06-01 1994-07-12 Kensington Microwave Limited Computer equipment lock
US6137409A (en) * 1998-08-28 2000-10-24 Stephens; Bruce Randall Computer anti-theft system
WO2001071132A1 (en) * 2000-03-22 2001-09-27 Acco Brands, Inc. Slot adapter
US20030218383A1 (en) * 2002-05-21 2003-11-27 Milojicic Dejan S. Locking mechanism for locking electonic devices
US20040155777A1 (en) * 2003-01-24 2004-08-12 Stelix Technologies Corp. Apparatus and methods for protecting valuables
US20050237185A1 (en) * 2004-03-05 2005-10-27 Simon Fraser University Wireless computer monitoring device with automatic arming and disarming

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5327752A (en) * 1992-06-01 1994-07-12 Kensington Microwave Limited Computer equipment lock
US6137409A (en) * 1998-08-28 2000-10-24 Stephens; Bruce Randall Computer anti-theft system
WO2001071132A1 (en) * 2000-03-22 2001-09-27 Acco Brands, Inc. Slot adapter
US20030218383A1 (en) * 2002-05-21 2003-11-27 Milojicic Dejan S. Locking mechanism for locking electonic devices
US20040155777A1 (en) * 2003-01-24 2004-08-12 Stelix Technologies Corp. Apparatus and methods for protecting valuables
US20050237185A1 (en) * 2004-03-05 2005-10-27 Simon Fraser University Wireless computer monitoring device with automatic arming and disarming

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008153372A3 (en) * 2007-06-13 2009-09-11 Rfid Mexico S.A. De C.V Electronic identification and security device for portable devices
US7515048B1 (en) 2008-05-20 2009-04-07 International Business Machines Corporation Method and system for using RFID to automatically lock and unlock a mobile computing device

Also Published As

Publication number Publication date
GB0606934D0 (en) 2006-05-17

Similar Documents

Publication Publication Date Title
US5625534A (en) Portable computer having a data card reader apparatus associated therewith
US6588241B1 (en) Computer physical security device
TW523649B (en) System for detecting tamper events and capturing the time of their occurrence
AU2006332553B2 (en) Systems and methods for providing universal security for items
TW452743B (en) Low noise signal generator for use with an RFID system
US7100403B2 (en) Computer physical security device
JP6153926B2 (en) Security system tag magnetic clutch and method
US20030029208A1 (en) Portable electronic device physical security
WO2007010484A3 (en) Software-controlled mechanical lock for portable electronic devices
JP2009529164A (en) HARD SECURITY TAG, LOCK SYSTEM, AND STRUCTURE PROTECTION METHOD EQUIPPED WITH RADIO FREQUENCY ELECTRIC RELEASE
US10721444B2 (en) Lock system including automation notification and surveillance integration
US9153109B1 (en) Mobile device cover with theft protection
TW200536184A (en) Multi-loop antenna for radio frequency identification (RFID) communication
BR112014017152B1 (en) method and system for nfc security
US20060232926A1 (en) Security lock
GB2437108A (en) Security device for a computer
WO2016038459A1 (en) Pcb mounted security slot
KR20080109654A (en) Computer system protection
WO2008056093A1 (en) Detacher
US8081451B1 (en) Port locking device
TWI470472B (en) Anti-theft device and method and related computer system
US11893877B2 (en) Security system including automation notification and surveillance integration
GB2387744A (en) Transponder alarm system
JP2007219807A (en) Communication jamming rf tag and communication jamming method
JP4524628B2 (en) Carry-in / out management system and information management method for information processing equipment

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)