WO2003028166A1 - Communications jack protector - Google Patents

Communications jack protector Download PDF

Info

Publication number
WO2003028166A1
WO2003028166A1 PCT/US2002/030606 US0230606W WO03028166A1 WO 2003028166 A1 WO2003028166 A1 WO 2003028166A1 US 0230606 W US0230606 W US 0230606W WO 03028166 A1 WO03028166 A1 WO 03028166A1
Authority
WO
WIPO (PCT)
Prior art keywords
locking
plug
key
communications
receiving portion
Prior art date
Application number
PCT/US2002/030606
Other languages
French (fr)
Inventor
Jim Valentine
Original Assignee
Jim Valentine
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jim Valentine filed Critical Jim Valentine
Publication of WO2003028166A1 publication Critical patent/WO2003028166A1/en

Links

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R13/00Details of coupling devices of the kinds covered by groups H01R12/70 or H01R24/00 - H01R33/00
    • H01R13/62Means for facilitating engagement or disengagement of coupling parts or for holding them in engagement
    • H01R13/639Additional means for holding or locking coupling parts together, after engagement, e.g. separate keylock, retainer strap
    • H01R13/6397Additional means for holding or locking coupling parts together, after engagement, e.g. separate keylock, retainer strap with means for preventing unauthorised use
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R13/00Details of coupling devices of the kinds covered by groups H01R12/70 or H01R24/00 - H01R33/00
    • H01R13/44Means for preventing access to live contacts
    • H01R13/443Dummy plugs
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R2201/00Connectors or connections adapted for particular applications
    • H01R2201/04Connectors or connections adapted for particular applications for network, e.g. LAN connectors

Definitions

  • the field of the invention is electrical connectors.
  • Electrical connectors generally comprise a female jack portion and a male plug portion.
  • the jack portion necessarily includes a cavity, and that cavity is subject to becoming damaged or otherwise compromised.
  • a locking plug is used to protect a communications jack, hi preferred embodiments the plug has both a key-receiving member and a locking member.
  • key-receiving portion is used herein in a very broad sense. Key-receiving portions range from something as simple as a hole, slot, or other physical opening, to a pad for a fingerprint sensor, or a data activated switch. The key-receiving portion is most likely disposed on a front portion of the plug, although it may alternatively or additionally be disposed on a side, or even back portion of the plug. Magnetically operated plugs contemplated herein, for example, may operate through the bulk of the plug, to a magnetic latch ⁇ nthe ⁇ back ⁇ of the plug. "
  • key is interpreted very broadly, and includes mechanical, magnetic, and even data or other electronic keys.
  • a suitable key may, for example, comprise a password or other code in data format that is carried electrically by the jack to the plug/ Such keys may alternatively operate upon a radio receiver inside the plug, powered by current carried by the jack.
  • key does have limits, however, and excludes mechanical members that are permanently affixed to the plug.
  • the manually operated, ordinary plastic catch or latch formed as part of a typical RJ45 plug does not constitute a key as that term is used in this' application.
  • Locking members are contemplated to include all manner of posts, latches, and other suitable physical devices.
  • a single plug may advantageously include two or more locking members.
  • Locking communications plugs contemplated herein can be adapted to all currently used communications plugs, as well as future developed plugs. Moreover, contemplated uses include stationary jacks such as those disposed in walls, floors, and desks, as well as used movable jacks, such as those disposed in portable computers, hand-held devices, and so forth. By attaching a cable or other device to the plug, a computer may also be protected from unauthorized removal.
  • Figure 1 is a perspective view of a prior art jack protection system.
  • Figure 2 is a perspective view of a communications plug and a communications jack according to the present inventive subject matter.
  • Figure 3 is a perspective view of an alternative inventive communications plug, having a key-receiving slot.
  • Figure 4 is a perspective view of another alternative communications plug, having a plurality of locking members.
  • Figure 5 is an exploded perspective back view of a locking plug operated in conjunction with a computer. Detailed Description
  • a prior art jack protection system 100 generally comprises a jack housing 120 supporting a jack 122, and a plug 116.
  • the plug 116 is mated with the jack 122, and is" then held in position using plate 110 and plate screws 112.
  • a locking cover 130 is then coupled to the plate 110, and locked in place using key 132.
  • a communications plug system 200 generally comprises a communications jack 220, and a communications plug 210 having a key-receiving portion 212, a locking mechanism (not shown), a locking member 214, and a key 230.
  • a communications plug system 200 is intended to be viewed in a generic manner, covering all possible electrically conducting communications interfaces, including RJ45, RS232, Ethernet, USB, and so on.
  • Communication plug 210 is sized and dimensioned to fit within the communications jack 220, and preferably fits snugly into the jack to minimize unauthorized access. It should be appreciated that plug 210 may be constructed of any suitable material, including metals and alloys, plastics, and composites. A preferred plug is constructed of a polycarbonate shell, with metal locking members and any other moving parts being constructed of metal or metal alloy to provide increased strength, and reduce sticking.
  • Key-receiving portion 212 functions in combination with the locking member(s) 214 to lock or unlock the plug 210.
  • the key-receiving portion 212 may comprise a hole, a slot, a signal transceiver, an optical scanner, a magnet, or some other type of key receiver.
  • a preferred key-receiving portion 212 is located on the face 216 of the plug 210, although it may be located anywhere on the plug 210 that does not disable its functionality.
  • the hole may be an irregularly shaped hole or regularly shaped hole, but in any event, the shape of the hole is preferred to be relatively unique so that common items cannot be used as a key.
  • a key may interact with tumblers that enable the key to be used appropriately to lock and unlock the plug.
  • the key-receiving portion 212 may comprise or interact with a signal receiver that is capable of receiving a signal to lock or unlock the plug. The signal receiving capability is explained in more detail under Figure 5.
  • the key-receiving portion 212 may alternatively include or interact with an optical scanning device (not shown) that is capable of scanning a fingerprint.
  • the scanner may verify the fingerprint, then either lock or unlock the plug.
  • the scanner may alternatively scan other items that verify the authority to lock or unlock the plug.
  • the scanner device may read a bar code that represents an authorizing code.
  • the key-receiving portion 212 uses a magnetic force to actuate the locking member(s) .
  • Locking member 214 locks the plug 210 within the jack 220. Locking maybe automatically engaged when the plug 210 is inserted, or locking may be dependent upon another action.
  • the locking member 214 is preferably biased by manipulation of a key 230 within the key-receiving portion 212. The locking member 214 may be depressed while inserting the plug into the jack. The locking member snaps into its non-depressed position when it passes the lock receiving portion 222 of the jack 220. The combination of the lock receiving portion 222 and the locking member 214 are intended to deter removal of the plug 210.
  • a preferred class of locking members is similar to the tab on a phone plug in that it remains in a locked position when no force is acting upon it. Here, however, the tab 214 would be locked in place using an internal mechanism (not shown), that would be released by inserting, and perhaps turning, a suitable key 230 into the key-receiving portion 212.
  • Another class of locking members is similar to a "dead b lt" " i ⁇ that it can be " in either " the locked or the unlocked position. See, e.g., locking member 430 in figure 4.
  • Yet another class of locking members is similar to a door latch (see e.g., latch 314 in Figure 3) in having a relatively elongated flat portion. It is contemplated that locking members can be biased by a spring or other mechanism in either the locked or unlocked positions.
  • Figure 3 depicts a plug 310 having a "V" shaped key-receiving portion 312, for use with a triangular shaped key (not shown).
  • the slot may, of course, have some other cross- sectional shape, including rectangular or hemi-circular.
  • the locking member 314 is latch shaped, although it should be appreciated that any key-receiving portion can conceivably be utilized with substantially any type of locking member.
  • Figure 4 depicts a plug 410 comprising a key-receiving portion 412, two locking members 414, and a body 430.
  • the key-receiving portion 412 has a key-way shaped and dimensioned to accommodate a key (not shown) having a matingly shaped cross-section, and ridges that actuate miniature tumblers (not shown).
  • the key is inserted into the key-receiving portion 412, and then turned to actuate the locking members 414.
  • the locking members 414 are usually extended away from the body 430 of the plug 410 when in a locked position, and are withdrawn within the body 430 when in an unlocked position.
  • an electronic locking system 500 for a computer 505 having communications jack 520 generally comprises aplug 510, and a chord 540.
  • the plug 510 has a housing that comprises electronics (not shown) that are capable of receiving a signal to lock or unlock the locking members 514 of the plug 510.
  • the computer 505 may be any type of device capable of sending a lock/unlock signal.
  • Computer 505 may, for example, comprise a laptop or desktop computer, a PDA, or a cell phone.
  • the signal is preferably sent via whatever electronics and path is normally used to send a signal through the communication jack 520.
  • the signal then preferably travels directly through the jack 520 to the plug 510, and is used to activate a locking mechanism (not shown).
  • the signal may be sent directly to the plug 510 via a wireless path.
  • the signal is received by the plug 510, and in response, the locking members 514 are actuated.
  • the locking mechanisms can be fashioned after known mechanisms.
  • chord 540 can be wrapped about a post, chair, or other object. This provides improved protection against theft for computers that have no special parts to which one can attach any sort of lock.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Details Of Connecting Devices For Male And Female Coupling (AREA)

Abstract

A locking plug (210) is used to protect a communication jack (220). The plug (210) has both a key-receiving member (212) and a locking member (214). The key-receiving member (212) range from something as simple as a hole, slot, or other physical opening, to a pad for a fingerprint sensor, or a data activated switch. By attaching a cable or other device to the plug (210), a computer may also be protected from unauthorized removal.

Description

COMMUNICATIONS JACK PROTECTOR
Field of The Invention
The field of the invention is electrical connectors.
Background of The Invention
Electrical connectors generally comprise a female jack portion and a male plug portion. The jack portion necessarily includes a cavity, and that cavity is subject to becoming damaged or otherwise compromised.
It is known, for example, that small children sometimes insert metal objects into the opening of an electrical wall jack. Such behavior is not only potentially dangerous to the child, but may compromise the plug. In that instance the problem is readily resolved through the use of simple plastic insert plugs. The plugs protect the child because they do not conduct electricity, and they protect the jack by preventing insertion of inappropriate objects.
Although older children usually know enough not to electrocute themselves by sticking inappropriate electrically conducting objects into electrical jacks, they sometimes inset other materials into jacks just to be devilish. They may, for example, insert gum or paper into the holes of an electrical jack. This problem has been approached in many ways, including the use of screws or other connectors to firmly affix a proper plug to the jack. In some instances screws are utilized that require screwdrivers having a special head making removal more difficult.
It is also known to affix a cover over a jack. US Patent 4669281 to Young (June
1987), for example, teaches a plate that is mounted to a jack by screws. A cover is then locked to the plate so that the screws, and therefore the plate, cannot be removed.
Unfortunately, external locking devices such as that taught in '281 tend to be problematic due to their bulkiness and inconvenience. These problems are particularly acute with respect to communications jacks, such as RJ45 jacks utilized in connection with computer networks. Such jacks are often in such close proximity to each other that the locking device for one jack interferes with access to an adjacent jack. Additionally, many communications jacks do not have screws or screw holes for attachment of an external locking device. Communications jacks also tend to be relatively small, easily plugged up with gum or other materials, and can be extremely difficult to clean out. Still further, they are typically made with plastic or other materials that are relatively fragile, and therefore easily damaged. Communications jacks may also be particularly subject to inappropriate use because they tend to carry only low voltage (21 Volts or less). The low voltage eliminates what might otherwise comprise a deterrent due to the possibility of sustaining an electrical shock. ,
All of these problems are apparent in schools, where the users tend to be immature, and where there are hundreds or even thousands of communications jacks. The jacks are also widely distributed, being disposed on computers, in the walls, tables, and even floors.
Thus, there is a need for improved devices and methods of protecting communications jacks.
Summary of the Invention
Methods and apparatus are provided in which a locking plug is used to protect a communications jack, hi preferred embodiments the plug has both a key-receiving member and a locking member.
The term "key-receiving portion" is used herein in a very broad sense. Key-receiving portions range from something as simple as a hole, slot, or other physical opening, to a pad for a fingerprint sensor, or a data activated switch. The key-receiving portion is most likely disposed on a front portion of the plug, although it may alternatively or additionally be disposed on a side, or even back portion of the plug. Magnetically operated plugs contemplated herein, for example, may operate through the bulk of the plug, to a magnetic latch όnthe~back~of the plug."
It is contemplated that locking plugs must be operated with some sort of key. The term "key", however, is interpreted very broadly, and includes mechanical, magnetic, and even data or other electronic keys. A suitable key may, for example, comprise a password or other code in data format that is carried electrically by the jack to the plug/ Such keys may alternatively operate upon a radio receiver inside the plug, powered by current carried by the jack. The term "key" does have limits, however, and excludes mechanical members that are permanently affixed to the plug. Thus, the manually operated, ordinary plastic catch or latch formed as part of a typical RJ45 plug does not constitute a key as that term is used in this' application.
Locking members are contemplated to include all manner of posts, latches, and other suitable physical devices. A single plug may advantageously include two or more locking members.
Locking communications plugs contemplated herein can be adapted to all currently used communications plugs, as well as future developed plugs. Moreover, contemplated uses include stationary jacks such as those disposed in walls, floors, and desks, as well as used movable jacks, such as those disposed in portable computers, hand-held devices, and so forth. By attaching a cable or other device to the plug, a computer may also be protected from unauthorized removal.
Various objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description of preferred embodiments of the invention, along with the accompanying drawings in which like numerals represent like components.
Brief Description of The Drawings
Figure 1 is a perspective view of a prior art jack protection system.
Figure 2 is a perspective view of a communications plug and a communications jack according to the present inventive subject matter.
Figure 3 is a perspective view of an alternative inventive communications plug, having a key-receiving slot.
Figure 4 is a perspective view of another alternative communications plug, having a plurality of locking members.
Figure 5 is an exploded perspective back view of a locking plug operated in conjunction with a computer. Detailed Description
In Figure 1 a prior art jack protection system 100 generally comprises a jack housing 120 supporting a jack 122, and a plug 116. The plug 116 is mated with the jack 122, and is" then held in position using plate 110 and plate screws 112. A locking cover 130 is then coupled to the plate 110, and locked in place using key 132.
In Figure 2 a communications plug system 200 generally comprises a communications jack 220, and a communications plug 210 having a key-receiving portion 212, a locking mechanism (not shown), a locking member 214, and a key 230. Although a particular embodiment is depicted, the system is intended to be viewed in a generic manner, covering all possible electrically conducting communications interfaces, including RJ45, RS232, Ethernet, USB, and so on.
Communication plug 210 is sized and dimensioned to fit within the communications jack 220, and preferably fits snugly into the jack to minimize unauthorized access. It should be appreciated that plug 210 may be constructed of any suitable material, including metals and alloys, plastics, and composites. A preferred plug is constructed of a polycarbonate shell, with metal locking members and any other moving parts being constructed of metal or metal alloy to provide increased strength, and reduce sticking.
Key-receiving portion 212 functions in combination with the locking member(s) 214 to lock or unlock the plug 210. The key-receiving portion 212 may comprise a hole, a slot, a signal transceiver, an optical scanner, a magnet, or some other type of key receiver. A preferred key-receiving portion 212 is located on the face 216 of the plug 210, although it may be located anywhere on the plug 210 that does not disable its functionality.
In an embodiment where the key-receiving portion 212 includes a hole, the hole may be an irregularly shaped hole or regularly shaped hole, but in any event, the shape of the hole is preferred to be relatively unique so that common items cannot be used as a key. Once inserted into the key-receiving portion, a key may interact with tumblers that enable the key to be used appropriately to lock and unlock the plug. In a class of embodiments, the key-receiving portion 212 may comprise or interact with a signal receiver that is capable of receiving a signal to lock or unlock the plug. The signal receiving capability is explained in more detail under Figure 5.
The key-receiving portion 212 may alternatively include or interact with an optical scanning device (not shown) that is capable of scanning a fingerprint. In such an embodiment, the scanner may verify the fingerprint, then either lock or unlock the plug. The scanner may alternatively scan other items that verify the authority to lock or unlock the plug. For example, the scanner device may read a bar code that represents an authorizing code. In another alternative embodiment, the key-receiving portion 212 uses a magnetic force to actuate the locking member(s) .
Locking member 214 locks the plug 210 within the jack 220. Locking maybe automatically engaged when the plug 210 is inserted, or locking may be dependent upon another action. The locking member 214 is preferably biased by manipulation of a key 230 within the key-receiving portion 212. The locking member 214 may be depressed while inserting the plug into the jack. The locking member snaps into its non-depressed position when it passes the lock receiving portion 222 of the jack 220. The combination of the lock receiving portion 222 and the locking member 214 are intended to deter removal of the plug 210.
All suitable types of locking members are contemplated. A preferred class of locking members is similar to the tab on a phone plug in that it remains in a locked position when no force is acting upon it. Here, however, the tab 214 would be locked in place using an internal mechanism (not shown), that would be released by inserting, and perhaps turning, a suitable key 230 into the key-receiving portion 212. Another class of locking members is similar to a "dead b lt""iή that it can be "in either "the locked or the unlocked position. See, e.g., locking member 430 in figure 4. Yet another class of locking members is similar to a door latch (see e.g., latch 314 in Figure 3) in having a relatively elongated flat portion. It is contemplated that locking members can be biased by a spring or other mechanism in either the locked or unlocked positions.
Figure 3 depicts a plug 310 having a "V" shaped key-receiving portion 312, for use with a triangular shaped key (not shown). The slot may, of course, have some other cross- sectional shape, including rectangular or hemi-circular. In this instance the locking member 314 is latch shaped, although it should be appreciated that any key-receiving portion can conceivably be utilized with substantially any type of locking member.
Figure 4 depicts a plug 410 comprising a key-receiving portion 412, two locking members 414, and a body 430. The key-receiving portion 412 has a key-way shaped and dimensioned to accommodate a key (not shown) having a matingly shaped cross-section, and ridges that actuate miniature tumblers (not shown). The key is inserted into the key-receiving portion 412, and then turned to actuate the locking members 414. The locking members 414 are usually extended away from the body 430 of the plug 410 when in a locked position, and are withdrawn within the body 430 when in an unlocked position.
In Figure 5, an electronic locking system 500 for a computer 505 having communications jack 520 generally comprises aplug 510, and a chord 540. In this embodiment the plug 510 has a housing that comprises electronics (not shown) that are capable of receiving a signal to lock or unlock the locking members 514 of the plug 510.
The computer 505 may be any type of device capable of sending a lock/unlock signal. Computer 505 may, for example, comprise a laptop or desktop computer, a PDA, or a cell phone. The signal is preferably sent via whatever electronics and path is normally used to send a signal through the communication jack 520. The signal then preferably travels directly through the jack 520 to the plug 510, and is used to activate a locking mechanism (not shown). Alternatively, the signal may be sent directly to the plug 510 via a wireless path. In any event, the signal is received by the plug 510, and in response, the locking members 514 are actuated. In this and other embodiments described herein, the locking mechanisms can be fashioned after known mechanisms.
One particularly useful aspect of the embodiment of Figure 5 is that the chord 540 can be wrapped about a post, chair, or other object. This provides improved protection against theft for computers that have no special parts to which one can attach any sort of lock.
Thus, specific embodiments and applications of a jack protector have been disclosed. It should be apparent, however, to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that they may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced.

Claims

CLAIMSWhat is claimed is:
1. A locking communications plug, sized and dimensioned to fit within a communications jack, comprising: a key-receiving portion; and a locking member that cooperates with the key-receiving portion to lock the plug within the jack.
2. The locking communications plug of claim 1, wherein the key-receiving portion comprises a hole.
3 The locking communications plug of claim 1 , wherein the key-receiving portion comprises a slot.
4. The locking communications plug of claim 1 , wherein the key-receiving portion further comprises a fingerprint sensor.
5. The locking communications plug of claim 1 , wherein the key-receiving portion is mechanically operated.
6. The locking communications plug of claim 1, wherein the key-receiving portion is magnetically operated.
7. The locking communications plug of claim 1 , wherein the key-receiving portion is electronically operated.
8. The locking communications plug of claim 7 further comprising an electronic signal transceiver.
9. The locking communications plug of claim 1 , wherein the key-receiving portion further comprises at least one of a hole, a slot, and a fingerprint sensor.
10. The locking communications plug of claim 8, wherein an electronic signal is communicated from the j ack.
11. The locking communications plug of claim 1 further comprising a face portion, wherein the key-receiving portion is located on the face portion.
12. The locking communications plug of claim 1 further comprising a face portion, wherein the key-receiving portion is located on a side other than the face portion.
13. The locking communications plug of claim 1 further comprising a plurality of locking members.
14. The locking communications plug of claim 1, wherein the jack comprises a lock receiving portion that cooperates with the locking member.
15. The locking communications plug of claim 1 , wherein the j ack is configured to accept an Ethernet plug.
16. The locking communications plug of claim 1, wherein the jack comprises an RJ45 modular jack.
17. The locking communications plug of claim 1 , wherein the j ack is coupled to a computer.
18. The locking communications plug of claim 17, wherein the computer sends a signal to the plug that unlocks the plug.
19. A method of locking a communications jack comprising: providing a locking communications plug having a key-receiving portion coupled to a locking member; inserting the locking communications plug into the communications jack; and locking the plug within the jack by manipulating the key-receiving portion.
20. A method of locking a computer comprising: locking a communications plug into a communications jack; providing a cable coupled to the communications plug; and locking the cable to a securing object.
PCT/US2002/030606 2001-09-25 2002-09-25 Communications jack protector WO2003028166A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US32515601P 2001-09-25 2001-09-25
US60/325,156 2001-09-25

Publications (1)

Publication Number Publication Date
WO2003028166A1 true WO2003028166A1 (en) 2003-04-03

Family

ID=23266666

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/030606 WO2003028166A1 (en) 2001-09-25 2002-09-25 Communications jack protector

Country Status (1)

Country Link
WO (1) WO2003028166A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004073117A1 (en) * 2003-02-14 2004-08-26 Christer Lundholm Connector
WO2005053109A1 (en) * 2003-11-26 2005-06-09 Lintec Co., Ltd. Dummy terminal
US7862365B2 (en) 2004-08-19 2011-01-04 Panduit Corp. Block-out cover and removal tool
WO2013042108A1 (en) 2011-09-20 2013-03-28 Zadok Reuveni Security plug for preventing access to a usb socket and secured usb device
US9273496B2 (en) 2011-05-26 2016-03-01 James Theobald Anti-theft devices and methods
WO2017076993A1 (en) * 2015-11-06 2017-05-11 Glaser & Rist Gbr Ideenmanufaktur Locking device for a mobile apparatus
CN110534961A (en) * 2019-09-10 2019-12-03 杭州昕华信息科技有限公司 A kind of rotatable anti-child's electric shock intelligent socket of magnetic based on fingerprint recognition

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5305380A (en) * 1992-05-20 1994-04-19 Sun Microsystems, Inc. Methods and apparatus for providing a secure telecommunications port
US5340324A (en) * 1993-03-23 1994-08-23 Fields James H Phone jack lock

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5305380A (en) * 1992-05-20 1994-04-19 Sun Microsystems, Inc. Methods and apparatus for providing a secure telecommunications port
US5340324A (en) * 1993-03-23 1994-08-23 Fields James H Phone jack lock

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004073117A1 (en) * 2003-02-14 2004-08-26 Christer Lundholm Connector
WO2005053109A1 (en) * 2003-11-26 2005-06-09 Lintec Co., Ltd. Dummy terminal
US7862365B2 (en) 2004-08-19 2011-01-04 Panduit Corp. Block-out cover and removal tool
US8113856B2 (en) 2004-08-19 2012-02-14 Panduit Corp. Block-out cover and removal tool
US8202110B2 (en) 2004-08-19 2012-06-19 Panduit Corp. Block-out cover and removal tool
US8512061B2 (en) 2004-08-19 2013-08-20 Panduit Corp. Block-out cover and removal tool
US9273496B2 (en) 2011-05-26 2016-03-01 James Theobald Anti-theft devices and methods
WO2013042108A1 (en) 2011-09-20 2013-03-28 Zadok Reuveni Security plug for preventing access to a usb socket and secured usb device
WO2017076993A1 (en) * 2015-11-06 2017-05-11 Glaser & Rist Gbr Ideenmanufaktur Locking device for a mobile apparatus
CN110534961A (en) * 2019-09-10 2019-12-03 杭州昕华信息科技有限公司 A kind of rotatable anti-child's electric shock intelligent socket of magnetic based on fingerprint recognition

Similar Documents

Publication Publication Date Title
US12020522B2 (en) Electronic cam lock for cabinet doors, drawers and other applications
EP2165391B1 (en) Plug locking assembly and system
EP1366255B1 (en) Electronic locking system
CA2395703C (en) Electronic locking system
US6718806B2 (en) Electronic locking system with emergency exit feature
US20020056300A1 (en) Electromechanical lock
US20080110217A1 (en) Security System and Related Devices and Methods
US4870840A (en) Modular communications jack lock
EP3073411B1 (en) Lan port lock device
CA2439151A1 (en) High security cylinder lock and key
CN102762806A (en) Lockable enclosure
NO963192D0 (en) Eurocylinder type design for electronic lock and key system
US20090049876A1 (en) Security apparatus with stabilizing element
TW201704609A (en) Lockset with cylinder integrity sensor
US20020007459A1 (en) Method and apparatus for intentional blockage of connectivity
WO2003028166A1 (en) Communications jack protector
WO1990015910A1 (en) Electronic lock
EP2391787B1 (en) Lock cylinder monitor
CA2348248A1 (en) Electrical panel lock with locking plug head
US5342707A (en) Battery pinned enclosure snap wall
CN210725751U (en) Wrench assembly and pluggable module
CN100572830C (en) The hinge structure of tool locking function and electronic equipment
US20060081026A1 (en) Lock structure having multiple anti-theft measures
CN217160187U (en) Anti-theft mechanism and electronic product with same
CN212054188U (en) Locking device for commodity anti-theft

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GE GH GM HR HU ID IL IN IS JP KE KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VC VN YU ZM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP