US20090263993A1 - Locking Seal for Data Ports and Associated Methods - Google Patents
Locking Seal for Data Ports and Associated Methods Download PDFInfo
- Publication number
- US20090263993A1 US20090263993A1 US12/464,269 US46426909A US2009263993A1 US 20090263993 A1 US20090263993 A1 US 20090263993A1 US 46426909 A US46426909 A US 46426909A US 2009263993 A1 US2009263993 A1 US 2009263993A1
- Authority
- US
- United States
- Prior art keywords
- port
- base
- height
- ramped
- recited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01R—ELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
- H01R13/00—Details of coupling devices of the kinds covered by groups H01R12/70 or H01R24/00 - H01R33/00
- H01R13/62—Means for facilitating engagement or disengagement of coupling parts or for holding them in engagement
- H01R13/639—Additional means for holding or locking coupling parts together, after engagement, e.g. separate keylock, retainer strap
- H01R13/6397—Additional means for holding or locking coupling parts together, after engagement, e.g. separate keylock, retainer strap with means for preventing unauthorised use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01R—ELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
- H01R24/00—Two-part coupling devices, or either of their cooperating parts, characterised by their overall structure
- H01R24/60—Contacts spaced along planar side wall transverse to longitudinal axis of engagement
- H01R24/62—Sliding engagements with one side only, e.g. modular jack coupling devices
- H01R24/64—Sliding engagements with one side only, e.g. modular jack coupling devices for high frequency, e.g. RJ 45
Definitions
- the present invention relates to devices and methods for securing access to data and telephone lines, and, more particularly, to such devices and methods for securing access to data via data ports and to telephone lines via telephone jacks.
- Data ports are frequently sprinkled about business sites for ease of access. However, the proliferation of such ports can provide the possibility of a security breach into a site network. Further, telephone jacks can also be situated for ease of use by authorized personnel, but may be desired to be protected from unauthorized use.
- the present invention is directed in one aspect to a device for limiting access into a jack port.
- the jack port can include, for example, a telephone jack port or a data port.
- the device can comprise a jack body that has a plug section having a distal portion that is dimensioned for insertion into a jack port.
- the plug section has an aperture thereinto that extends from a proximal end and is defined by an upper wall and a lower wall.
- a protrusion extends into the aperture from the lower wall and is positioned in spaced relation from the proximal end.
- the jack body further has a spring element that has a distal end affixed to the plug section's distal portion and a proximal end extending above the plug section's distal portion.
- the spring element is dimensioned for snapping into an upper section of the jack port and for, upon a depression thereof, releasing the plug section from the jack port.
- a locking body has a lower section that has a protrusion extending from a bottom face thereof and is dimensioned for insertion into the jack body's aperture.
- An upper section is dimensioned so that a distal portion thereof is extendible between the jack body's plug section and the spring element's proximal end.
- the upper section is also dimensioned so that, when so positioned, a depression of the spring element sufficient to release the plug section from the jack port is prevented.
- a notch extends from a distal end between the lower section and the upper section and is dimensioned to admit the plug section's upper wall.
- the locking body's lower section is insertable into the plug section's aperture, and the lower section's protrusion is snappable over the plug portion's protrusion so as to prevent a removal of the locking body from the plug section's aperture.
- the notch is positioned to encompass a portion of the plug section's upper wall, and the locking body's upper section is positionable between the plug section's upper wall and the spring element, so as to prevent a removal of the plug section from a jack port.
- a method for using the device of the present invention wherein the device is positioned into a jack port desired to be protected from unauthorized entry.
- the device has affixed thereto or imprinted thereon unique indicia so that, if the device is destroyed upon an unauthorized removal from the jack port, a reconstruction of the device is not possible, and the removal is detectable.
- the device may also have operatively associated therewith an electronically pollable sensor for detecting a presence of the device in a jack port over a network.
- the device comprises a base having a top and two sides. Each side has an upper edge meeting a side edge of the top and a longitudinal slot therein open at a front end and terminating forward of a rear edge of the respective side. Each slot communicates with a base inner space defined by the top and two sides and has a bottom edge that is substantially parallel with the respective side upper edge. A protrusion extends upwardly from the slot's bottom edge into the slot in spaced relation from the respective side front edge. The top is downwardly compressible relative to the sides so that the slot has a first width in a released position and a second width less than the first width in a compressed position.
- a ramped element is atop the base top and has a first height at a front end joined to the base top adjacent a front edge thereof and a second height rearward of the front edge.
- the second height is greater than the first height, and the back end is substantially aligned vertically with the slot protrusion.
- a stop element is also atop the base top.
- the stop element has a third height greater than the second height, and is positioned rearward of and in spaced relation from the ramped element.
- a front portion of the device in the compressed position is dimensioned for insertion into a target port to a sufficient distance that the ramped element is retained within the port when device is in the released position.
- the slot's upward protrusion prevents sufficient slot compression to remove the device from the port, and the stop element is positioned to prevent access into the port.
- the device is removable from the port only by destroying the device's integrity.
- a third embodiment comprises a base, the shape of which is substantially irrelevant.
- a distal portion comprises a dual-prong element having a generally “U” shape in side cross-section, with outwardly flaring wings.
- the prong element and the wings together are dimensioned and have sufficient compressibility for insertion into a jack port, and are biased to open upon entering the port, so that the wings retain the device within the port like a barb. The device then cannot be removed from the port without being broken.
- a serial number can again be provided for tracking purposes.
- FIG. 1 is a side view of the plug section of a first embodiment of the device.
- FIG. 2 is a side view of the locking body of the device of FIG. 1 .
- FIG. 3 is a side view of the locking body of FIG. 2 joined with the plug section.
- FIG. 4 is top plan view of a matching device and jack port.
- FIG. 5 is a top/side perspective view of a second embodiment of a locking body.
- FIG. 6 is a top/side perspective view of a third embodiment of the device.
- FIGS. 1-6 A description of the preferred embodiments of the present invention will now be presented with reference to FIGS. 1-6 .
- the jack port 33 can include, for example, a telephone jack port or a data port, although these are not intended as limitations.
- the type of jack port 33 envisioned in a preferred embodiment of the invention includes those such as known in the art having an aperture thereinto shaped as a rectangle with an upper notch for admitting a retaining/releasing spring element.
- the device 10 can comprise a jack body 11 ( FIG. 1 ) that has a plug section 12 having a distal portion 13 that is dimensioned for insertion into a jack port 33 .
- Contacts 34 in the jack port 33 are positioned for making contact with contacts 35 on the jack body 11 for passing signals therebetween.
- the plug section 12 has an aperture 14 thereinto that extends from a proximal end 15 and is defined by an upper wall 16 , a lower wall 17 , and two side walls.
- a protrusion such as an upwardly extending ridge 19 that is perpendicular 5 to the longitudinal axis, extends into the aperture 14 from the lower wall 17 and is positioned in spaced relation from the proximal end 15 .
- a valley 20 is positioned distal of the ridge 19 and is substantially parallel to the ridge 19 .
- the jack body 11 further has a spring element 21 that has a distal end 22 affixed to the plug section's distal portion 13 and a proximal end 23 that extends above the plug section's distal portion 13 .
- the spring element 21 is dimensioned for snapping into the upper notch of the jack port 33 and for, upon a depression thereof, releasing the plug section 12 from the jack port 33 .
- a locking body 24 of the device 10 ( FIG. 2 ) has a lower section 25 that has a protrusion extending from a bottom face 16 thereof.
- the protrusion can take the form, for example, of a downwardly extending ridge 26 .
- the ridge 26 is dimensioned for, when the locking body's lower section 25 is inserted into the jack body's aperture 14 , snapping past the plug section's ridge 19 , and snapping into the valley 20 . Once thus positioned, the elements are dimensioned so that the locking body 24 cannot be removed from the aperture 14 without being destroyed.
- the locking body 24 has an upper section 27 that is dimensioned so that a distal portion 28 thereof is extendible between the jack body's plug section 12 and the spring element's proximal end 23 .
- the upper section 27 is also dimensioned so that, when so positioned, a depression of the spring element 21 that is sufficient to release the plug section 12 from the jack port 33 is prevented.
- a notch 29 extends from a distal end 30 between the lower section 25 and the upper section 27 and is dimensioned to admit the plug section's upper wall 16 .
- the locking body's lower section 25 is insertable into the plug section's aperture 14 , and the lower section's ridge 26 is snappable over the plug portion's ridge 19 so as to prevent a removal of the locking body 24 from the plug section's aperture 14 .
- the notch 29 is positioned to encompass a portion of the plug section's upper wall 16
- the locking body's upper section 27 is positionable between the plug section's upper wall 16 and the spring element 21 , so as to prevent a removal of the jack body 11 from a jack port 33 .
- the jack port 33 may be of the type that is in signal communication with a network 36 monitored by a processor 37 .
- a connection or lack thereof between the contacts 34 , 35 can thereby be monitored by the processor 37 .
- the device 10 can include an electronic pollable sensor 38 monitored by hardware or software on the network 36 that can indicate a loss of signal or connection to the device 10 , indicating that the device 10 has been compromised.
- a method of the present invention for preventing unauthorized access to a jack port includes providing a device 10 such as described above.
- the device 10 will typically be provided as a plurality of devices, each bearing indicia 31 thereon ( FIG. 4 ).
- a matching indicium 32 can be provided for affixing to the jack port 33 into which the device 10 is inserted. As discussed above, the device 10 , once inserted into a jack port 33 , cannot be removed without destroying the device 10 .
- security personnel can monitor jack ports 33 to ensure that none of the devices 10 has been removed, and ascertain that the indicia 31 , 32 at each jack port 33 match.
- the processor 37 can also monitor jack ports 33 via the network 36 to ensure that none of the devices 10 has been removed with the use, for example, of the sensor 38 .
- the device 60 includes a base 61 having a top 62 and two sides 63 .
- Each side 63 has an upper edge 64 meeting a side edge 65 of the top 62 and a longitudinal slot 66 therein open at a front end 67 and terminating forward of a rear edge 68 of the respective side 63 .
- Each slot 66 communicates with a base inner space 69 defined by the top 62 and two sides 63 and has a bottom edge 70 that is substantially parallel with the respective side upper edge 64 .
- a protrusion 71 extends upwardly from the slot's bottom edge 70 into the slot 66 in spaced relation from a respective side front edge 72 .
- the top 62 is downwardly compressible relative to the sides 63 so that the slot 66 has a first width in a released position and a second width less than the first width in a compressed position.
- a back end 73 of the slot 66 is widened for facilitating access thereto by a cutting device for removing the device 60 from a port 33 .
- the base 61 further comprises a bracing element 74 extending laterally through the inner space 69 in bridging relation to the two sides 63 for providing stability to the device 60 .
- a ramped element 75 is positioned atop the base top 62 and has a first height at a front end 76 adjacent a front edge 77 of the base top 62 and a second height at a back end 78 thereof in spaced relation from the base top's front edge 77 .
- the second height is greater than the first height, and the back end 78 is substantially aligned vertically with the slot protrusion 71 .
- the ramped element's back end 78 has a rear face 79 that is substantially perpendicular to the base top 62 .
- the ramped element's back end 78 is in spaced relation from the base top 62 and is compressible theretoward with the top 62 in the compressed position.
- a stop element 80 is also positioned atop the base top 62 .
- the stop element 80 has a third height greater than the second height, and is positioned rearward of and in spaced relation from the ramped element 75 .
- the stop element 80 comprises a substantially rectangular element 81 positioned substantially perpendicular to the base top 62 and is dimensioned to substantially cover the port 33 when the device 60 is retained therein.
- the stop element 80 further comprises a triangular brace 82 positioned with a front face 83 against a rear face 84 of the rectangular element 81 and a bottom face 85 against the base top 62 , with a substantial right angle between the rectangular element's rear face 84 and the base top 62 .
- a front portion of the device 60 in the compressed position is dimensioned for insertion into a target port 33 to a sufficient distance that the ramped element 75 is retained within the port 33 when device 60 is in the released position.
- the slot's upward protrusion 71 prevents sufficient slot compression to remove the device 60 from the port 33
- the stop element 80 is positioned to prevent access into the port 33 .
- the device 60 is removable from the port 33 only by destroying the device's integrity, such as by cutting through the sides 63 adjacent the slot's back end 73 .
- a serial number 86 can again be provided for tracking purposes, the serial number 86 unique to a particular device 60 .
- a particular site could be provided with a plurality of devices 60 , each having a different serial number 86 , so that a device 60 could not be destroyed and then replaced without substituting a device 60 having a different serial number 86 , thereby indicating tampering.
- tampering can also be monitored with the use of a sensor in signal communication with a network monitored by a processor, for indicating a loss of integrity in the device's signal.
- the device 90 comprises a one-piece element that does not interface with a jack 11 .
- This embodiment 90 comprises a base 91 , the shape here being shown as a substantially rectinlineal, solid element suitable for grasping. This shape is to be understood by one of skill in the art as exemplary, and a person of skill in the art could envision many different shapes therefor.
- a distal portion 92 of the device 90 comprises a dual-prong element having a generally “U” shape in side cross-section, with an upper 93 and a lower 94 portion separated by a first distance 95 to which the upper 93 and lower portions 94 are biased.
- the terms “upper” and “lower” are merely used for ease of visualization, since the device 92 can be symmetrical, and, in this case, be insertable into a jack port in either orientation.
- the distal portion 92 further comprises an outwardly flaring wing 96 extending away from each of the upper 93 and the lower 94 wing.
- the wings 96 are biased to the outwardly flaring configuration.
- the upper 93 and lower 94 portions further have an outer surface 97 that is inwardly stepped 98 proximal of a proximal end 99 of the wings 96 .
- the upper 93 and lower 94 portions and the wings 96 together are dimensioned and have sufficient compressibility for insertion into a jack port by forcing the upper 93 and lower 94 portions closer together, and forcing the wings 96 closer to the stepped portion 98 of the upper 93 and lower 94 portions.
- the biasing of these elements 93 , 94 , 96 causes them to open upon entering the port, so that the wings 96 retain the device 90 within the port like a barb. The device 90 then cannot be removed from the port without being broken.
- a serial number 100 can again be provided for tracking purposes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Details Of Connecting Devices For Male And Female Coupling (AREA)
- Connector Housings Or Holding Contact Members (AREA)
Abstract
A jack port locking device includes a base having side longitudinal slots. A protrusion extends upwardly into the slot. The base's top is compressible between a released and a compressed position. A ramp slopes upward from the front end. A stop higher than the ramp is positioned rearward of the ramp. A front portion of the device in the compressed position is dimensioned for insertion into a port so that the ramp is retained within the port when the device is in the released position. When the device is retained within the port, the protrusion prevents sufficient compression to remove the device from the port, and the stop is positioned to prevent access into the port. Preferably, the device is removable only by destroying the device's integrity. The device may have an electronically pollable sensor for detecting the device's presence in a port over a network.
Description
- This application is a continuation of application Ser. No. 11/844,388, now issued U.S. Pat. No. 7,530,824, issued May 12, 2009, which itself claimed priority to provisional applications Ser. No. 60/824,518, filed Sep. 5, 2006, and Ser. No. 60/938,060, filed May 15, 2007.
- 1. Field of the Invention
- The present invention relates to devices and methods for securing access to data and telephone lines, and, more particularly, to such devices and methods for securing access to data via data ports and to telephone lines via telephone jacks.
- 2. Description of Related Art
- Data ports are frequently sprinkled about business sites for ease of access. However, the proliferation of such ports can provide the possibility of a security breach into a site network. Further, telephone jacks can also be situated for ease of use by authorized personnel, but may be desired to be protected from unauthorized use.
- Therefore, it would be desirable to provide a device and system for limiting access to data ports and telephone jacks, and to determine whether security into those ports has been breached.
- The present invention is directed in one aspect to a device for limiting access into a jack port. The jack port can include, for example, a telephone jack port or a data port. The device can comprise a jack body that has a plug section having a distal portion that is dimensioned for insertion into a jack port. The plug section has an aperture thereinto that extends from a proximal end and is defined by an upper wall and a lower wall. A protrusion extends into the aperture from the lower wall and is positioned in spaced relation from the proximal end.
- The jack body further has a spring element that has a distal end affixed to the plug section's distal portion and a proximal end extending above the plug section's distal portion. The spring element is dimensioned for snapping into an upper section of the jack port and for, upon a depression thereof, releasing the plug section from the jack port.
- A locking body has a lower section that has a protrusion extending from a bottom face thereof and is dimensioned for insertion into the jack body's aperture. An upper section is dimensioned so that a distal portion thereof is extendible between the jack body's plug section and the spring element's proximal end. The upper section is also dimensioned so that, when so positioned, a depression of the spring element sufficient to release the plug section from the jack port is prevented. A notch extends from a distal end between the lower section and the upper section and is dimensioned to admit the plug section's upper wall.
- In use, the locking body's lower section is insertable into the plug section's aperture, and the lower section's protrusion is snappable over the plug portion's protrusion so as to prevent a removal of the locking body from the plug section's aperture. In this position, the notch is positioned to encompass a portion of the plug section's upper wall, and the locking body's upper section is positionable between the plug section's upper wall and the spring element, so as to prevent a removal of the plug section from a jack port.
- A method is also provided for using the device of the present invention wherein the device is positioned into a jack port desired to be protected from unauthorized entry. The device has affixed thereto or imprinted thereon unique indicia so that, if the device is destroyed upon an unauthorized removal from the jack port, a reconstruction of the device is not possible, and the removal is detectable. The device may also have operatively associated therewith an electronically pollable sensor for detecting a presence of the device in a jack port over a network.
- In a second embodiment, the device comprises a base having a top and two sides. Each side has an upper edge meeting a side edge of the top and a longitudinal slot therein open at a front end and terminating forward of a rear edge of the respective side. Each slot communicates with a base inner space defined by the top and two sides and has a bottom edge that is substantially parallel with the respective side upper edge. A protrusion extends upwardly from the slot's bottom edge into the slot in spaced relation from the respective side front edge. The top is downwardly compressible relative to the sides so that the slot has a first width in a released position and a second width less than the first width in a compressed position.
- A ramped element is atop the base top and has a first height at a front end joined to the base top adjacent a front edge thereof and a second height rearward of the front edge. The second height is greater than the first height, and the back end is substantially aligned vertically with the slot protrusion.
- A stop element is also atop the base top. The stop element has a third height greater than the second height, and is positioned rearward of and in spaced relation from the ramped element.
- A front portion of the device in the compressed position is dimensioned for insertion into a target port to a sufficient distance that the ramped element is retained within the port when device is in the released position. When the device is retained within the port, the slot's upward protrusion prevents sufficient slot compression to remove the device from the port, and the stop element is positioned to prevent access into the port. Preferably, the device is removable from the port only by destroying the device's integrity.
- A third embodiment comprises a base, the shape of which is substantially irrelevant. A distal portion comprises a dual-prong element having a generally “U” shape in side cross-section, with outwardly flaring wings. The prong element and the wings together are dimensioned and have sufficient compressibility for insertion into a jack port, and are biased to open upon entering the port, so that the wings retain the device within the port like a barb. The device then cannot be removed from the port without being broken. A serial number can again be provided for tracking purposes.
- The features that characterize the invention, both as to organization and method of operation, together with further objects and advantages thereof, will be better understood from the following description used in conjunction with the accompanying drawing. It is to be expressly understood that the drawing is for the purpose of illustration and description and is not intended as a definition of the limits of the invention. These and other objects attained, and advantages offered, by the present invention will become more fully apparent as the description that now follows is read in conjunction with the accompanying drawing.
-
FIG. 1 is a side view of the plug section of a first embodiment of the device. -
FIG. 2 is a side view of the locking body of the device ofFIG. 1 . -
FIG. 3 is a side view of the locking body ofFIG. 2 joined with the plug section. -
FIG. 4 is top plan view of a matching device and jack port. -
FIG. 5 is a top/side perspective view of a second embodiment of a locking body. -
FIG. 6 is a top/side perspective view of a third embodiment of the device. - A description of the preferred embodiments of the present invention will now be presented with reference to
FIGS. 1-6 . - A
device 10 for limiting access into ajack port 33 is provided. Thejack port 33 can include, for example, a telephone jack port or a data port, although these are not intended as limitations. The type ofjack port 33 envisioned in a preferred embodiment of the invention includes those such as known in the art having an aperture thereinto shaped as a rectangle with an upper notch for admitting a retaining/releasing spring element. - The
device 10 can comprise a jack body 11 (FIG. 1 ) that has aplug section 12 having adistal portion 13 that is dimensioned for insertion into ajack port 33. Contacts 34 in thejack port 33 are positioned for making contact withcontacts 35 on thejack body 11 for passing signals therebetween. Theplug section 12 has anaperture 14 thereinto that extends from aproximal end 15 and is defined by anupper wall 16, alower wall 17, and two side walls. A protrusion, such as an upwardly extendingridge 19 that is perpendicular 5 to the longitudinal axis, extends into theaperture 14 from thelower wall 17 and is positioned in spaced relation from theproximal end 15. Avalley 20 is positioned distal of theridge 19 and is substantially parallel to theridge 19. - The
jack body 11 further has aspring element 21 that has adistal end 22 affixed to the plug section'sdistal portion 13 and aproximal end 23 that extends above the plug section'sdistal portion 13. Thespring element 21 is dimensioned for snapping into the upper notch of thejack port 33 and for, upon a depression thereof, releasing theplug section 12 from thejack port 33. - A locking
body 24 of the device 10 (FIG. 2 ) has alower section 25 that has a protrusion extending from abottom face 16 thereof. The protrusion can take the form, for example, of a downwardly extendingridge 26. Theridge 26 is dimensioned for, when the locking body'slower section 25 is inserted into the jack body'saperture 14, snapping past the plug section'sridge 19, and snapping into thevalley 20. Once thus positioned, the elements are dimensioned so that the lockingbody 24 cannot be removed from theaperture 14 without being destroyed. - The locking
body 24 has anupper section 27 that is dimensioned so that adistal portion 28 thereof is extendible between the jack body'splug section 12 and the spring element'sproximal end 23. Theupper section 27 is also dimensioned so that, when so positioned, a depression of thespring element 21 that is sufficient to release theplug section 12 from thejack port 33 is prevented. Anotch 29 extends from adistal end 30 between thelower section 25 and theupper section 27 and is dimensioned to admit the plug section'supper wall 16. - In use (
FIG. 3 ), the locking body'slower section 25 is insertable into the plug section'saperture 14, and the lower section'sridge 26 is snappable over the plug portion'sridge 19 so as to prevent a removal of the lockingbody 24 from the plug section'saperture 14. In this position, thenotch 29 is positioned to encompass a portion of the plug section'supper wall 16, and the locking body'supper section 27 is positionable between the plug section'supper wall 16 and thespring element 21, so as to prevent a removal of thejack body 11 from ajack port 33. - The
jack port 33 may be of the type that is in signal communication with anetwork 36 monitored by aprocessor 37. A connection or lack thereof between thecontacts 34,35 can thereby be monitored by theprocessor 37. For example, thedevice 10 can include an electronicpollable sensor 38 monitored by hardware or software on thenetwork 36 that can indicate a loss of signal or connection to thedevice 10, indicating that thedevice 10 has been compromised. - A method of the present invention for preventing unauthorized access to a jack port includes providing a
device 10 such as described above. Thedevice 10 will typically be provided as a plurality of devices, each bearing indicia 31 thereon (FIG. 4 ). A matchingindicium 32 can be provided for affixing to thejack port 33 into which thedevice 10 is inserted. As discussed above, thedevice 10, once inserted into ajack port 33, cannot be removed without destroying thedevice 10. - In use, security personnel can monitor
jack ports 33 to ensure that none of thedevices 10 has been removed, and ascertain that theindicia jack port 33 match. Theprocessor 37 can also monitorjack ports 33 via thenetwork 36 to ensure that none of thedevices 10 has been removed with the use, for example, of thesensor 38. - In another embodiment (
FIG. 5 ), believed at the time of filing to represent the best mode, thedevice 60 includes a base 61 having a top 62 and twosides 63. Eachside 63 has anupper edge 64 meeting aside edge 65 of the top 62 and a longitudinal slot 66 therein open at afront end 67 and terminating forward of arear edge 68 of therespective side 63. Each slot 66 communicates with a baseinner space 69 defined by the top 62 and twosides 63 and has abottom edge 70 that is substantially parallel with the respective sideupper edge 64. Aprotrusion 71 extends upwardly from the slot'sbottom edge 70 into the slot 66 in spaced relation from a respective sidefront edge 72. - The top 62 is downwardly compressible relative to the
sides 63 so that the slot 66 has a first width in a released position and a second width less than the first width in a compressed position. Aback end 73 of the slot 66 is widened for facilitating access thereto by a cutting device for removing thedevice 60 from aport 33. - The base 61 further comprises a bracing
element 74 extending laterally through theinner space 69 in bridging relation to the twosides 63 for providing stability to thedevice 60. - A ramped
element 75 is positioned atop the base top 62 and has a first height at a front end 76 adjacent afront edge 77 of the base top 62 and a second height at aback end 78 thereof in spaced relation from the base top'sfront edge 77. The second height is greater than the first height, and theback end 78 is substantially aligned vertically with theslot protrusion 71. The ramped element'sback end 78 has a rear face 79 that is substantially perpendicular to the base top 62. The ramped element'sback end 78 is in spaced relation from the base top 62 and is compressible theretoward with the top 62 in the compressed position. - A
stop element 80 is also positioned atop the base top 62. Thestop element 80 has a third height greater than the second height, and is positioned rearward of and in spaced relation from the rampedelement 75. Thestop element 80 comprises a substantiallyrectangular element 81 positioned substantially perpendicular to the base top 62 and is dimensioned to substantially cover theport 33 when thedevice 60 is retained therein. Thestop element 80 further comprises atriangular brace 82 positioned with afront face 83 against arear face 84 of therectangular element 81 and abottom face 85 against the base top 62, with a substantial right angle between the rectangular element'srear face 84 and the base top 62. - A front portion of the
device 60 in the compressed position is dimensioned for insertion into atarget port 33 to a sufficient distance that the rampedelement 75 is retained within theport 33 whendevice 60 is in the released position. When thedevice 60 is retained within theport 33, the slot'supward protrusion 71 prevents sufficient slot compression to remove thedevice 60 from theport 33, and thestop element 80 is positioned to prevent access into theport 33. Preferably, thedevice 60 is removable from theport 33 only by destroying the device's integrity, such as by cutting through thesides 63 adjacent the slot'sback end 73. - Indicia in the form of a
serial number 86 can again be provided for tracking purposes, theserial number 86 unique to aparticular device 60. For example, a particular site could be provided with a plurality ofdevices 60, each having a differentserial number 86, so that adevice 60 could not be destroyed and then replaced without substituting adevice 60 having a differentserial number 86, thereby indicating tampering. - As above, tampering can also be monitored with the use of a sensor in signal communication with a network monitored by a processor, for indicating a loss of integrity in the device's signal.
- In yet another embodiment (
FIG. 6 ), thedevice 90 comprises a one-piece element that does not interface with ajack 11. Thisembodiment 90 comprises abase 91, the shape here being shown as a substantially rectinlineal, solid element suitable for grasping. This shape is to be understood by one of skill in the art as exemplary, and a person of skill in the art could envision many different shapes therefor. - A
distal portion 92 of thedevice 90 comprises a dual-prong element having a generally “U” shape in side cross-section, with an upper 93 and a lower 94 portion separated by afirst distance 95 to which the upper 93 andlower portions 94 are biased. The terms “upper” and “lower” are merely used for ease of visualization, since thedevice 92 can be symmetrical, and, in this case, be insertable into a jack port in either orientation. Thedistal portion 92 further comprises an outwardly flaringwing 96 extending away from each of the upper 93 and the lower 94 wing. Thewings 96 are biased to the outwardly flaring configuration. The upper 93 and lower 94 portions further have anouter surface 97 that is inwardly stepped 98 proximal of aproximal end 99 of thewings 96. - The upper 93 and lower 94 portions and the
wings 96 together are dimensioned and have sufficient compressibility for insertion into a jack port by forcing the upper 93 and lower 94 portions closer together, and forcing thewings 96 closer to the steppedportion 98 of the upper 93 and lower 94 portions. The biasing of theseelements wings 96 retain thedevice 90 within the port like a barb. Thedevice 90 then cannot be removed from the port without being broken. Aserial number 100 can again be provided for tracking purposes. - The features that characterize the invention, both as to organization and method of operation, together with further objects and advantages thereof, will be better understood from the following description used in conjunction with the accompanying drawing. It is to be expressly understood that the drawing is for the purpose of illustration and description and is not intended as a definition of the limits of the invention. These and other objects attained, and advantages offered, by the present invention will become more fully apparent as the description that now follows is read in conjunction with the accompanying drawing.
- Having now described the invention, the construction, the operation and use of preferred embodiments thereof, and the advantageous new and useful results obtained thereby, the new and useful constructions, and reasonable mechanical equivalents thereof obvious to those skilled in the art, are set forth in the appended claims.
Claims (14)
1. A device for securing a jack or a data port against access comprising:
a base having a top and two sides defining an inner space, each side having an upper edge meeting a side edge of the top;
a ramped element projecting upward from the base top, the ramped element having a first height at a front end joined to the base top adjacent a front edge thereof and a second height at a rear end rearward of the front end, the second height greater than the first height; and
a stop element atop the base top having a third height greater than the second height, the stop element positioned rearward of and in spaced relation from the ramped element; wherein:
at least a portion of the ramped element is downwardly movable to a compressed position and is biased to a released position, a front portion of the device in the compressed position dimensioned for insertion into a target port to a sufficient distance that the ramped element rear end is insertable into the target port, the rear end of the ramped element being retained within the port when the device is in the released position.
2. The device recited in claim 1 , wherein the base further comprises a bracing element extending laterally through the inner space in bridging relation to the two sides for providing stability to the device.
3. The device recited in claim 1 , wherein the base further comprises an identification indicium applied thereto in a position rearward of the stop element.
4. The device recited in claim 1 , wherein the ramped element back end has a rear face substantially perpendicular to the base top.
5. The device recited in claim 1 , wherein the ramped element back end is in spaced relation from the base top and is compressible theretoward with the top in the compressed position.
6. The device recited in claim 1 , wherein the stop element comprises a substantially rectangular element positioned substantially perpendicular to the base top and dimensioned to substantially cover the port when the device is retained therein.
7. The device recited in claim 1 , further comprising a sensor operatively associated with the base, the sensor comprising means for being polled electronically over a network in signal communication with the port, the polling for determining a presence of the device in the port.
8. A method for securing a jack or a data port against access comprising inserting a front portion of a device, at least a portion of the device in a compressed position, into a target port, the device having a ramped element thereatop, to a sufficient distance that the ramped element is retained within the port when device is in a released position, the device restrained from further compression when retained within the port, the device having a stop element thereatop positioned rearward of and in spaced relation from the ramped element for preventing access into the port from a position external the port, the device removable from the port only by destroying an integrity thereof.
9. The method recited in claim 8 , wherein the base further comprises an indicium applied thereto, the indicium unique to a particular device, and further comprising the step of ascertaining a tampering with the device by checking that a device having an appropriate indicium is positioned within the port.
10. The method recited in claim 8 , wherein:
the device comprises a base having a top and two sides, each side having an upper edge meeting a side edge of the top, a base inner space defined by the top and two sides;
the ramped element is positioned atop the base top, the ramped element having a first height at a front end joined to the base top adjacent a front edge thereof and a second height rearward of the front edge, the second height greater than the first height; and
the stop element is positioned atop the base top and has a third height greater than the second height.
11. The method recited in claim 10 , wherein the base further comprises a bracing element extending laterally through the inner space in bridging relation to the two sides for providing stability to the device.
12. The method recited in claim 10 , wherein the stop element comprises a substantially rectangular element positioned substantially perpendicular to the base top and dimensioned to substantially cover the port when the device is retained therein.
13. The method recited in claim 8 , further comprising the step of electronically polling a sensor operatively associated with the device for determining a presence of the device in the port.
14. The method recited in claim 13 , wherein the polling step comprises polling the sensor over a network in signal communication with the port.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/464,269 US20090263993A1 (en) | 2006-09-05 | 2009-05-12 | Locking Seal for Data Ports and Associated Methods |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US82451806P | 2006-09-05 | 2006-09-05 | |
US93806007P | 2007-05-15 | 2007-05-15 | |
US11/844,388 US7530824B2 (en) | 2006-09-05 | 2007-08-24 | Locking seal for data ports and associated methods |
US12/464,269 US20090263993A1 (en) | 2006-09-05 | 2009-05-12 | Locking Seal for Data Ports and Associated Methods |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/844,388 Continuation US7530824B2 (en) | 2006-09-05 | 2007-08-24 | Locking seal for data ports and associated methods |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090263993A1 true US20090263993A1 (en) | 2009-10-22 |
Family
ID=39152252
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/844,388 Expired - Fee Related US7530824B2 (en) | 2006-09-05 | 2007-08-24 | Locking seal for data ports and associated methods |
US12/464,269 Abandoned US20090263993A1 (en) | 2006-09-05 | 2009-05-12 | Locking Seal for Data Ports and Associated Methods |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/844,388 Expired - Fee Related US7530824B2 (en) | 2006-09-05 | 2007-08-24 | Locking seal for data ports and associated methods |
Country Status (2)
Country | Link |
---|---|
US (2) | US7530824B2 (en) |
WO (1) | WO2008030353A2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8025514B1 (en) | 2010-04-23 | 2011-09-27 | Leviton Manufacturing Co., Inc. | Shroud to prevent manipulation of a release mechanism of a plug |
US8038456B1 (en) | 2010-04-23 | 2011-10-18 | Leviton Manufacturing Co., Inc | Tamper prevention system having a shroud to partially cover a release mechanism |
CN105514701A (en) * | 2016-02-20 | 2016-04-20 | 苏州东威科技有限公司 | Cable assembly |
US20200015374A1 (en) * | 2018-07-05 | 2020-01-09 | Comxi Co., Ltd. | Network port cover module and network port locking device having same |
DE102019123567A1 (en) * | 2019-09-03 | 2021-03-04 | Deutsche Bahn Ag | Locking device for connection sockets |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9331426B2 (en) | 2009-02-26 | 2016-05-03 | Optical Fiber Packaging Corporation | Socket panel for receiving connector plugs with latch guards comprising a security cover plate |
GB2468188B (en) | 2009-02-26 | 2011-05-11 | Advanced Fiber Products Ltd | Fibre optic connector assembly |
US8224146B2 (en) * | 2010-02-05 | 2012-07-17 | Panduit Corp. | Block-out device for fiber optic adapter |
US20120289069A1 (en) * | 2011-05-13 | 2012-11-15 | Taiwan Semiconductor Manufacturing Company, Ltd. | Apparatus for Blocking I/O Interfaces of Computing Devices |
US8449309B1 (en) | 2011-12-07 | 2013-05-28 | The United State Government as represented by the Director, National Security Agency | USB port protector |
US8414314B1 (en) | 2011-12-07 | 2013-04-09 | The United States Of America As Represented By The Director, National Security Agency | Single-use USB port protector |
US9559462B1 (en) | 2014-01-15 | 2017-01-31 | National Security Agency | Port connector securement device |
US9710677B1 (en) | 2015-07-02 | 2017-07-18 | The United States Of America As Represented By The Director, National Security Agency | Tamper evident port protector |
US9843134B1 (en) | 2016-06-09 | 2017-12-12 | The United States Of America As Represented By The Director, National Security Agency | Tamper evident cable seal |
US20180005474A1 (en) | 2016-06-30 | 2018-01-04 | Hart InterCivic Inc. | System And Method For A Voting Controller Interface For An Electronic Voting Network |
US9965655B1 (en) | 2017-04-18 | 2018-05-08 | Erkios Systems, Inc. | Port security device for computing devices and methods of operating such |
US20220069525A1 (en) * | 2019-01-15 | 2022-03-03 | Electronic Stock Ltd. | Electric-port security device |
US11522311B1 (en) | 2021-08-30 | 2022-12-06 | Government Of The United States As Represented By The National Security Agency | Tamper evident port protector |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US1726166A (en) * | 1926-04-14 | 1929-08-27 | Kurz Kasch Company | Insert plug |
US4311883A (en) * | 1980-03-10 | 1982-01-19 | Kidney Susan L | Modular telephone jack lock |
US4443907A (en) * | 1982-10-21 | 1984-04-24 | Tridon Limited | Combination windshield wiper clips |
US4615575A (en) * | 1985-04-29 | 1986-10-07 | Kossor Michael G | Modular connector for securing telephone line |
US4647726A (en) * | 1985-07-05 | 1987-03-03 | Blum Richard S | Telephone security clamp |
US4740168A (en) * | 1987-06-01 | 1988-04-26 | Porta Systems Corp. | Locking device for telephone subscriber plugs |
US4840582A (en) * | 1988-06-22 | 1989-06-20 | Michigan Bell Telephone Company | Modular plug identification tag |
US4862500A (en) * | 1988-05-16 | 1989-08-29 | May Engineering Company | Telephone jack lock-out plug |
US4870840A (en) * | 1989-02-06 | 1989-10-03 | Edward Klein | Modular communications jack lock |
US4964284A (en) * | 1989-10-16 | 1990-10-23 | Mcdaid Denis | Telephone lock |
US5090916A (en) * | 1990-07-11 | 1992-02-25 | Interconnection Informatique | Male connector for telephone and/or data processing communications network |
US5429522A (en) * | 1994-01-21 | 1995-07-04 | Burndy Corporation | Protected communications socket |
US5556295A (en) * | 1995-02-17 | 1996-09-17 | Dynametric, Inc. | Modular plug locking system |
US5692925A (en) * | 1986-07-23 | 1997-12-02 | Virginia Patent Development Corporation | Modular plug comprising circuit elements |
US6067014A (en) * | 1996-08-09 | 2000-05-23 | Wilson; Edwin P. | Cord tamper method and apparatus |
US6080001A (en) * | 1999-03-09 | 2000-06-27 | @Pos.Com, Inc. | Positive retention sleeve for modular connector |
US6459374B1 (en) * | 1999-11-12 | 2002-10-01 | Protex International Corp. | Anti-theft computer security system |
US20040032329A1 (en) * | 2002-08-13 | 2004-02-19 | Protex International Corp. | Security device having a releasable electronic connection |
US6851957B1 (en) * | 2003-10-16 | 2005-02-08 | International Business Machines Corporation | All-in-one network cable and security cable |
US20050174238A1 (en) * | 2001-05-29 | 2005-08-11 | Knut Foseide | Theft protection plug for electrical devices |
US20060140543A1 (en) * | 2004-12-29 | 2006-06-29 | Tyco Electronics Corporation | Connector and receptacle containing a physical security feature |
US7110533B2 (en) * | 2004-05-18 | 2006-09-19 | Time Warner Cable, Inc. | Telephone NID isolation module |
US20070249195A1 (en) * | 2003-11-26 | 2007-10-25 | Lintec21 Co., Ltd. | Dummy Terminal |
-
2007
- 2007-08-24 US US11/844,388 patent/US7530824B2/en not_active Expired - Fee Related
- 2007-08-27 WO PCT/US2007/018795 patent/WO2008030353A2/en active Application Filing
-
2009
- 2009-05-12 US US12/464,269 patent/US20090263993A1/en not_active Abandoned
Patent Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US1726166A (en) * | 1926-04-14 | 1929-08-27 | Kurz Kasch Company | Insert plug |
US4311883A (en) * | 1980-03-10 | 1982-01-19 | Kidney Susan L | Modular telephone jack lock |
US4443907A (en) * | 1982-10-21 | 1984-04-24 | Tridon Limited | Combination windshield wiper clips |
US4615575A (en) * | 1985-04-29 | 1986-10-07 | Kossor Michael G | Modular connector for securing telephone line |
US4647726A (en) * | 1985-07-05 | 1987-03-03 | Blum Richard S | Telephone security clamp |
US5692925A (en) * | 1986-07-23 | 1997-12-02 | Virginia Patent Development Corporation | Modular plug comprising circuit elements |
US4740168A (en) * | 1987-06-01 | 1988-04-26 | Porta Systems Corp. | Locking device for telephone subscriber plugs |
US4862500A (en) * | 1988-05-16 | 1989-08-29 | May Engineering Company | Telephone jack lock-out plug |
US4840582A (en) * | 1988-06-22 | 1989-06-20 | Michigan Bell Telephone Company | Modular plug identification tag |
US4870840A (en) * | 1989-02-06 | 1989-10-03 | Edward Klein | Modular communications jack lock |
US4964284A (en) * | 1989-10-16 | 1990-10-23 | Mcdaid Denis | Telephone lock |
US5090916A (en) * | 1990-07-11 | 1992-02-25 | Interconnection Informatique | Male connector for telephone and/or data processing communications network |
US5429522A (en) * | 1994-01-21 | 1995-07-04 | Burndy Corporation | Protected communications socket |
US5556295A (en) * | 1995-02-17 | 1996-09-17 | Dynametric, Inc. | Modular plug locking system |
US6067014A (en) * | 1996-08-09 | 2000-05-23 | Wilson; Edwin P. | Cord tamper method and apparatus |
US6080001A (en) * | 1999-03-09 | 2000-06-27 | @Pos.Com, Inc. | Positive retention sleeve for modular connector |
US6459374B1 (en) * | 1999-11-12 | 2002-10-01 | Protex International Corp. | Anti-theft computer security system |
US20050174238A1 (en) * | 2001-05-29 | 2005-08-11 | Knut Foseide | Theft protection plug for electrical devices |
US20040032329A1 (en) * | 2002-08-13 | 2004-02-19 | Protex International Corp. | Security device having a releasable electronic connection |
US6851957B1 (en) * | 2003-10-16 | 2005-02-08 | International Business Machines Corporation | All-in-one network cable and security cable |
US20070249195A1 (en) * | 2003-11-26 | 2007-10-25 | Lintec21 Co., Ltd. | Dummy Terminal |
US7110533B2 (en) * | 2004-05-18 | 2006-09-19 | Time Warner Cable, Inc. | Telephone NID isolation module |
US20060140543A1 (en) * | 2004-12-29 | 2006-06-29 | Tyco Electronics Corporation | Connector and receptacle containing a physical security feature |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8025514B1 (en) | 2010-04-23 | 2011-09-27 | Leviton Manufacturing Co., Inc. | Shroud to prevent manipulation of a release mechanism of a plug |
US8038456B1 (en) | 2010-04-23 | 2011-10-18 | Leviton Manufacturing Co., Inc | Tamper prevention system having a shroud to partially cover a release mechanism |
US8215972B2 (en) | 2010-04-23 | 2012-07-10 | Leviton Manufacturing Co., Inc. | Anti-tamper adapter with a mechanism to block a release mechanism of a plug |
US9147974B2 (en) | 2010-04-23 | 2015-09-29 | Leviton Manufacturing Co., Inc. | Cable tamper prevention |
CN105514701A (en) * | 2016-02-20 | 2016-04-20 | 苏州东威科技有限公司 | Cable assembly |
US20200015374A1 (en) * | 2018-07-05 | 2020-01-09 | Comxi Co., Ltd. | Network port cover module and network port locking device having same |
US10624222B2 (en) * | 2018-07-05 | 2020-04-14 | Comxi Co., Ltd. | Network port cover module and network port locking device having same |
DE102019123567A1 (en) * | 2019-09-03 | 2021-03-04 | Deutsche Bahn Ag | Locking device for connection sockets |
Also Published As
Publication number | Publication date |
---|---|
US7530824B2 (en) | 2009-05-12 |
WO2008030353A3 (en) | 2008-05-22 |
WO2008030353A2 (en) | 2008-03-13 |
US20080057759A1 (en) | 2008-03-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7530824B2 (en) | Locking seal for data ports and associated methods | |
US4647726A (en) | Telephone security clamp | |
US5627520A (en) | Tamper detect monitoring device | |
US8772653B2 (en) | Encryption keyboard | |
JP4468929B2 (en) | Game machine | |
EP1672976A1 (en) | Pest detection apparatus | |
JP2006150044A (en) | Board case for game machine | |
CA2272733A1 (en) | Socket receiving device | |
WO2007013916A1 (en) | Hazard detector with theft detection | |
US6997420B2 (en) | Pneumatic lockout device | |
US4416478A (en) | Tamper deterent seal providing indication of tampering for watthour meters | |
US9710677B1 (en) | Tamper evident port protector | |
JPH076820A (en) | Slide lock mechanism of plugging type connector | |
EP1699114A1 (en) | Dummy terminal | |
US11522311B1 (en) | Tamper evident port protector | |
JP5087301B2 (en) | Sealing tool | |
JP2005342235A (en) | Game machine | |
CN212514739U (en) | Remote anti-electricity-stealing device | |
JP4129639B2 (en) | Game machine | |
US7384282B2 (en) | Lock assembly for attachment to a LAN-cable connector | |
EP1347536A2 (en) | Terminal position device apparatus, methods and articles of manufacture for securing sealed male connectors | |
JPH11137812A (en) | Fixing device for board storage box | |
US9824555B2 (en) | Sensor system for monitoring an object | |
JP3100132U (en) | Lock assembly for LAN cable connector | |
US6590978B1 (en) | Security mechanism for snap latch devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |