+

US20040233627A1 - Computing device and methods and systems for same - Google Patents

Computing device and methods and systems for same Download PDF

Info

Publication number
US20040233627A1
US20040233627A1 US10/872,887 US87288704A US2004233627A1 US 20040233627 A1 US20040233627 A1 US 20040233627A1 US 87288704 A US87288704 A US 87288704A US 2004233627 A1 US2004233627 A1 US 2004233627A1
Authority
US
United States
Prior art keywords
user
computing device
lid portion
base portion
keyboard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/872,887
Inventor
Hyrum Anderson
Ken Takemoto
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/872,887 priority Critical patent/US20040233627A1/en
Publication of US20040233627A1 publication Critical patent/US20040233627A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3206Monitoring of events, devices or parameters that trigger a change in power modality
    • G06F1/3228Monitoring task completion, e.g. by use of idle timers, stop commands or wait commands
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T70/00Locks
    • Y10T70/50Special application
    • Y10T70/5009For portable articles

Definitions

  • the described embodiments provide computing devices having advantageous security or theft deterrence characteristics.
  • FIG. 1 shows a block diagram of selected functional components of an exemplary computing device in accordance with one embodiment.
  • FIGS. 2 a - 2 b illustrate a perspective view of an exemplary computing device in accordance with one embodiment.
  • FIG. 3 illustrates a front view of an exemplary computing device in accordance with one embodiment.
  • FIG. 4 shows a flow chart representing acts in accordance with one exemplary method.
  • the computing device comprises a notebook or laptop computer that has a lid pivotably connected to a base portion.
  • the lid is deployable from a closed position in which the lid can be locked to the base portion, to an opened position in which a keyboard on the base portion can be accessed and used by a user.
  • the computing device has a housing that includes various user-engagable input mechanisms or buttons.
  • the input mechanisms can be used as a part of a combination lock assembly to provide a user-keyed combination to unlock a locking mechanism that allows the user to open the lid.
  • these very same input mechanisms or buttons can be used to provide user input that is used by the computing device to implement a particular functionality. Examples of various functionalities are provided below.
  • FIG. 1 is a block diagram showing exemplary components of a computing device 100 .
  • the computing device 100 may include a processor 102 , a memory 104 (such as ROM and RAM), user-engagable input mechanisms 106 , a disk drive 108 , interface port 110 for inputting and outputting data, and a removable media device 112 . It can further have a display device 116 , and a housing 118 for supporting and positioning the various components.
  • the processor 102 can perform various instructions to control the operation of the computing device 100 .
  • Memory 104 , disk drive 108 , and removable media device 112 can provide data storage devices.
  • the data storage devices can comprise computer-readable media that can have computer readable instructions thereon.
  • the computer-readable instructions when read by the computer can cause the computer to perform a desired functionality.
  • User-engagable input mechanism(s) 106 can include a keyboard, mouse, pointing device, joystick and/or other mechanism for inputting information to the computing device. Various input mechanisms will be discussed in more detail below.
  • Interface port 110 can provide a mechanism for computing device 100 to communicate with other devices.
  • a removable media device 112 can include built-in CD-ROM's, DVD-ROM's, floppy disc drives, CD-RW drives, DVD-R/RW drives, DVD+R/RW drives, DVD-RAM drives, SuperDisc drives, Zip drives, and other emerging technologies.
  • Suitable display devices 116 can have various configurations. Examples include cathode ray tubes (CRT), and liquid crystal displays (LCD), among others.
  • the various components can be positioned relative to one another and/or protected by the housing 118 .
  • the housing can be made from various materials such as various plastics, polymers, and metals, among others.
  • the above described components need not all be present in a particular exemplary computing device. Further, some exemplary computing devices can have more than one of a specific component. For example, a particular computing device may have a floppy disk drive and a CD-ROM.
  • the computing device described herein can be one type of suitable computing device as it relates to the described embodiments, others can include, but are not limited to, personal computers, notebook computers, laptop computers, personal digital assistants (PDAs), video games, portable video games, cell phones, and other computing devices.
  • PDAs personal digital assistants
  • FIGS. 2 a - 2 b show an exemplary computing device in accordance with one embodiment.
  • the computing device can comprise a notebook computer 100 a having a housing 118 a .
  • the housing can comprise a lid portion 202 connected via a hinge 203 to a body or base portion 204 .
  • Such a configuration allows the lid to move between an open position (as shown in FIG. 2 a ) and a closed position (as shown in FIG. 2 b ) where the lid is folded onto the base portion 204 .
  • the notebook computer also includes a display 116 a mounted in the lid. The display can be seen by a user when the lid is open, and is protected by the housing when the lid is closed.
  • the base portion 204 can contain a data storage device 112 a that in this embodiment comprises a floppy disk drive.
  • the notebook computer 100 a can also contain various user-engagable input mechanisms which, in this embodiment, comprise a keyboard 206 and input buttons 208 , among others.
  • the various input mechanisms allow a user to interact with, and control the function of, the notebook computer.
  • the keyboard allows a user to enter various characters and control various programs contained on the computer.
  • Other input mechanisms can allow a user to control the function of various components comprising the computer.
  • some input mechanisms can allow a user to control a volume setting of the computer.
  • the exemplary notebook computer 100 a can further have a lock or locking mechanism 210 for locking the lid 202 in the closed position.
  • the lock 210 can be controlled by activating the user-engagable input mechanisms in a proper sequence or combination. Suitable examples will be discussed in more detail below.
  • some of the input buttons 208 are accessible to a user regardless of the lid position.
  • Other input mechanisms and components such as the keyboard 206 and display 116 a are accessible only when the lid 202 is open (as shown in FIG. 2 a ). When the lid is closed the display cannot be seen and the keyboard can not be used. With this configuration, a user can achieve full functionality with the computer only when the lid is open. Conversely, when the lid is closed the computer has diminished functionality.
  • the input buttons 208 are accessible whether the lid is in the open or closed position. As such, the input buttons can be used as part of a combination lock assembly.
  • the combination lock assembly can allow a user-keyed combination to unlock the locking mechanism 210 .
  • the locking mechanism With the locking mechanism unlocked, the user can open the lid 202 . Unauthorized users, who do not know the proper sequence of the user-keyed combination, will be unable to open the lid.
  • Unauthorized users who do not know the proper sequence of the user-keyed combination, will be unable to open the lid.
  • the computer By locking the computer in the closed position, the computer has diminished functionality to anyone who does not know the proper sequence to unlock the lock. In this state the computer cannot be used to its full or normal capacity. This feature can reduce unauthorized access to the computer. This feature can also greatly diminish the value of the computer to potential thieves and therefore can decrease the likelihood of the computer being targeted for theft.
  • the notebook computer 100 a has a high degree of security, the user can simply activate the input buttons 208 in the proper sequence to unlock the lid 202 and regain functionality.
  • the input buttons 208 are dedicated solely to controlling the lock.
  • Other suitable embodiments will be described below where the input buttons are multi-function.
  • FIG. 3 shows a front elevational view of another exemplary computing device comprising a notebook computer 100 b .
  • the notebook computer has a lid 202 b that is closed on a base 204 b .
  • Positioned in and supported by the base are multiple input buttons 208 b .
  • the input buttons can be more clearly seen in expanded portion 300 .
  • the input buttons 208 b comprise multi-function input mechanisms.
  • the input buttons can be engaged or manipulated to control a removable media device that, in this embodiment, comprises a CD player (not shown).
  • the input buttons comprise volume buttons 302 a and 302 b , a back button 303 , a play button 304 , a forward button 305 , and a stop button 306 .
  • the input buttons can also be engaged to unlock a lock or locking mechanism 210 b and allow a user to open the lid 202 b .
  • the input buttons 208 b and the locking mechanism 210 b can in some embodiments comprise a combination lock
  • a pre-established activation sequence can be saved on a data storage device (not shown) of the notebook computer 100 b such that a user entered sequence can be compared to the saved sequence.
  • this pre-established activation sequence can be set by the manufacturer.
  • Other embodiments can allow the user to set the sequence.
  • Still other embodiments can have a factory set sequence that can be reset by the user.
  • Some embodiments can be designed so that after a certain number of improper sequences are entered the computer blocks all input for a given period of time. Such a configuration can prevent a potential thief from trying to enter all the possible combinations to open the lock.
  • One of skill in the art will recognize other satisfactory embodiments.
  • the pre-established sequence can comprise a first subsequence and a second subsequence.
  • volume buttons 302 a and 302 b can be pressed simultaneously as the first subsequence to instruct the computer that the following input or second subsequence is directed at controlling the lock.
  • This second subsequence can comprise a unique number of inputs on the various input buttons 208 b .
  • the second subsequence can comprise any order of activating some or all of the volume buttons 302 a and 302 b , the back button 303 , the play button 304 , the forward button 305 , and/or the stop button 306 .
  • the locking mechanism 210 b can be opened.
  • a user can press the volume keys ( 302 a and b ) simultaneously, and then press the stop key 306 , the play key 304 , the forward key 305 , and the volume up key 302 b to open the lock 210 b .
  • the lock can comprise a solenoid 308 that can engage and disengage a fixed structure 310 and allow the lid 202 b to be opened.
  • Other suitable locking mechanisms will be recognized by the skilled artisan.
  • a thief cannot defeat the lock by disconnecting a power source from the computer.
  • Previous security devices often employed password protection that could be defeated by disconnecting the battery or other power source which caused the electronic passwords to be disabled.
  • Other password protection systems can be defeated by replacing the computer's hard drive or other hardware components. With the described embodiment, disconnecting the battery makes it more difficult to defeat the security device since the solenoid uses energy from the battery to disengage or unlock.
  • replacing hardware components in the current embodiments may eliminate the instructions to open the lock when a given set of conditions are met (entering the proper sequence).
  • the described embodiments can physically secure the computer without the need for altering the external configuration of the computer or necessitating attaching it to external objects.
  • Some previous security devices have required a portion of the housing be formed to allow a cable or other fastening device to be attached. The cable could then be fixed to an immobile object to prevent theft. However, the cables are easily cut. Further, making a portable computing device immobile defeats the inherent purpose of the device.
  • the present embodiments maintain the beneficial characteristics of the portable computing device while decreasing the attractiveness to potential thieves.
  • a protective lid or cover, a locking mechanism and/or accessible input buttons can be added to various computing devices to achieve the desired functionality.
  • FIG. 4 shows a flow chart representing an exemplary method in accordance with one embodiment.
  • the method configures a computing device with a physical locking mechanism capable of locking the computing device in a storage position. This can allow a deployable portion of the computing device to be physically locked to a base portion.
  • the method couples multiple user-engagable input mechanisms to the physical locking mechanism to allow a user to unlock the controllable locking mechanism. This can allow multiple input mechanisms to be activated to unlock the deployable portion.
  • the described embodiments allow a computer user to exercise increased control over a computing device by controlling deployment of a lid portion from a closed position to an open position. Only a user possessing the proper sequence can open the lid by manipulating user-engagable input mechanisms to unlock a locking mechanism. Unauthorized users cannot access the computing device and are less likely to attempt to take possession of the computing device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Casings For Electric Apparatus (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

A computing device is described. The computing device can include a housing which includes a lid portion having a display; and a base portion including a keyboard, the lid portion and the base portion being configured to be locked in a first relative orientation such that the lid portion physically blocks a user from engaging the keyboard. The computing device can also include a data storage means positioned on the housing and configured to store a predetermined activation sequence; and, at least one user-engagable input mechanism which can be accessed by a user when the display and the keyboard are in the first orientation and upon which a user can enter a user-entered activation sequence, and wherein if the user entered activation sequence equals the predetermined activation sequence the base portion and the lid portion can be unlocked from the first orientation.

Description

    RELATED CASES
  • This patent application is a continuation claiming priority from a patent application having Ser. No. 10/282,347 titled “Computing Device and Methods and Systems for Same” filed Oct. 28, 2002, and issued as patent number[0001]
  • BACKGROUND
  • With the increased mobility of people in today's society, the demand for mobile computing and communication capabilities has increased dramatically. Individuals desire a computing device that can be easily transported with them for convenience, ease of use, and increased productivity. A portable computing device is often relatively compact, and can be self-contained. The same features that make a computing device easily portable for a user also make the device susceptible to theft. Therefore, it would be beneficial to improve the theft deterrence characteristics of various computing devices, most notably portable computing devices. [0002]
  • Accordingly, the described embodiments provide computing devices having advantageous security or theft deterrence characteristics. [0003]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The same numbers are used throughout the drawings to reference like features and components. [0004]
  • FIG. 1 shows a block diagram of selected functional components of an exemplary computing device in accordance with one embodiment. [0005]
  • FIGS. 2[0006] a-2 b illustrate a perspective view of an exemplary computing device in accordance with one embodiment.
  • FIG. 3 illustrates a front view of an exemplary computing device in accordance with one embodiment. [0007]
  • FIG. 4 shows a flow chart representing acts in accordance with one exemplary method.[0008]
  • DETAILED DESCRIPTION Overview
  • Various securable computing devices are described. In one embodiment, the computing device comprises a notebook or laptop computer that has a lid pivotably connected to a base portion. The lid is deployable from a closed position in which the lid can be locked to the base portion, to an opened position in which a keyboard on the base portion can be accessed and used by a user. The computing device has a housing that includes various user-engagable input mechanisms or buttons. When the lid is in the closed position, the input mechanisms can be used as a part of a combination lock assembly to provide a user-keyed combination to unlock a locking mechanism that allows the user to open the lid. When the lid is deployed to the opened position, in some embodiments, these very same input mechanisms or buttons can be used to provide user input that is used by the computing device to implement a particular functionality. Examples of various functionalities are provided below. [0009]
  • Exemplary Embodiments and Methods
  • For purposes of understanding various structures associated with an exemplary computing device, consider FIG. 1, which is a block diagram showing exemplary components of a [0010] computing device 100. The computing device 100 may include a processor 102, a memory 104 (such as ROM and RAM), user-engagable input mechanisms 106, a disk drive 108, interface port 110 for inputting and outputting data, and a removable media device 112. It can further have a display device 116, and a housing 118 for supporting and positioning the various components.
  • The [0011] processor 102 can perform various instructions to control the operation of the computing device 100. Memory 104, disk drive 108, and removable media device 112 can provide data storage devices. The data storage devices can comprise computer-readable media that can have computer readable instructions thereon. The computer-readable instructions when read by the computer can cause the computer to perform a desired functionality.
  • User-engagable input mechanism(s) [0012] 106 can include a keyboard, mouse, pointing device, joystick and/or other mechanism for inputting information to the computing device. Various input mechanisms will be discussed in more detail below. Interface port 110 can provide a mechanism for computing device 100 to communicate with other devices.
  • A [0013] removable media device 112 can include built-in CD-ROM's, DVD-ROM's, floppy disc drives, CD-RW drives, DVD-R/RW drives, DVD+R/RW drives, DVD-RAM drives, SuperDisc drives, Zip drives, and other emerging technologies.
  • [0014] Suitable display devices 116 can have various configurations. Examples include cathode ray tubes (CRT), and liquid crystal displays (LCD), among others. The various components can be positioned relative to one another and/or protected by the housing 118. The housing can be made from various materials such as various plastics, polymers, and metals, among others. The above described components need not all be present in a particular exemplary computing device. Further, some exemplary computing devices can have more than one of a specific component. For example, a particular computing device may have a floppy disk drive and a CD-ROM.
  • The computing device described herein can be one type of suitable computing device as it relates to the described embodiments, others can include, but are not limited to, personal computers, notebook computers, laptop computers, personal digital assistants (PDAs), video games, portable video games, cell phones, and other computing devices. [0015]
  • FIGS. 2[0016] a-2 b show an exemplary computing device in accordance with one embodiment. In this embodiment, the computing device can comprise a notebook computer 100 a having a housing 118 a. The housing can comprise a lid portion 202 connected via a hinge 203 to a body or base portion 204. Such a configuration allows the lid to move between an open position (as shown in FIG. 2a) and a closed position (as shown in FIG. 2b) where the lid is folded onto the base portion 204. The notebook computer also includes a display 116 a mounted in the lid. The display can be seen by a user when the lid is open, and is protected by the housing when the lid is closed.
  • As shown here, the [0017] base portion 204 can contain a data storage device 112 a that in this embodiment comprises a floppy disk drive. The notebook computer 100 a can also contain various user-engagable input mechanisms which, in this embodiment, comprise a keyboard 206 and input buttons 208, among others. The various input mechanisms allow a user to interact with, and control the function of, the notebook computer. For example, the keyboard allows a user to enter various characters and control various programs contained on the computer. Other input mechanisms can allow a user to control the function of various components comprising the computer. For example, some input mechanisms can allow a user to control a volume setting of the computer.
  • The [0018] exemplary notebook computer 100 a can further have a lock or locking mechanism 210 for locking the lid 202 in the closed position. The lock 210 can be controlled by activating the user-engagable input mechanisms in a proper sequence or combination. Suitable examples will be discussed in more detail below.
  • In this embodiment, some of the [0019] input buttons 208 are accessible to a user regardless of the lid position. Other input mechanisms and components such as the keyboard 206 and display 116 a are accessible only when the lid 202 is open (as shown in FIG. 2a). When the lid is closed the display cannot be seen and the keyboard can not be used. With this configuration, a user can achieve full functionality with the computer only when the lid is open. Conversely, when the lid is closed the computer has diminished functionality. The input buttons 208 are accessible whether the lid is in the open or closed position. As such, the input buttons can be used as part of a combination lock assembly.
  • The combination lock assembly can allow a user-keyed combination to unlock the [0020] locking mechanism 210. With the locking mechanism unlocked, the user can open the lid 202. Unauthorized users, who do not know the proper sequence of the user-keyed combination, will be unable to open the lid. By locking the computer in the closed position, the computer has diminished functionality to anyone who does not know the proper sequence to unlock the lock. In this state the computer cannot be used to its full or normal capacity. This feature can reduce unauthorized access to the computer. This feature can also greatly diminish the value of the computer to potential thieves and therefore can decrease the likelihood of the computer being targeted for theft.
  • Though the [0021] notebook computer 100 a has a high degree of security, the user can simply activate the input buttons 208 in the proper sequence to unlock the lid 202 and regain functionality. In this embodiment, the input buttons 208 are dedicated solely to controlling the lock. Other suitable embodiments will be described below where the input buttons are multi-function.
  • FIG. 3 shows a front elevational view of another exemplary computing device comprising a [0022] notebook computer 100 b. The notebook computer has a lid 202 b that is closed on a base 204 b. Positioned in and supported by the base are multiple input buttons 208 b. The input buttons can be more clearly seen in expanded portion 300. In this embodiment, the input buttons 208 b comprise multi-function input mechanisms. The input buttons can be engaged or manipulated to control a removable media device that, in this embodiment, comprises a CD player (not shown). In this embodiment, the input buttons comprise volume buttons 302 a and 302 b, a back button 303, a play button 304, a forward button 305, and a stop button 306. The input buttons can also be engaged to unlock a lock or locking mechanism 210 b and allow a user to open the lid 202 b. The input buttons 208 b and the locking mechanism 210 b can in some embodiments comprise a combination lock.
  • In this embodiment, a pre-established activation sequence can be saved on a data storage device (not shown) of the [0023] notebook computer 100 b such that a user entered sequence can be compared to the saved sequence. In some embodiments, this pre-established activation sequence can be set by the manufacturer. Other embodiments can allow the user to set the sequence. Still other embodiments can have a factory set sequence that can be reset by the user. Some embodiments, can be designed so that after a certain number of improper sequences are entered the computer blocks all input for a given period of time. Such a configuration can prevent a potential thief from trying to enter all the possible combinations to open the lock. One of skill in the art will recognize other satisfactory embodiments.
  • In an embodiment such as the one shown in FIG. 3, where the [0024] input buttons 208 b are multi-function, the pre-established sequence can comprise a first subsequence and a second subsequence. For example, volume buttons 302 a and 302 b can be pressed simultaneously as the first subsequence to instruct the computer that the following input or second subsequence is directed at controlling the lock. This second subsequence can comprise a unique number of inputs on the various input buttons 208 b. For example, the second subsequence can comprise any order of activating some or all of the volume buttons 302 a and 302 b, the back button 303, the play button 304, the forward button 305, and/or the stop button 306.
  • If the sequence that is entered equals the pre-established sequence the [0025] locking mechanism 210 b can be opened. For example, as shown here, a user can press the volume keys (302 a and b) simultaneously, and then press the stop key 306, the play key 304, the forward key 305, and the volume up key 302 b to open the lock 210 b. In this embodiment, the lock can comprise a solenoid 308 that can engage and disengage a fixed structure 310 and allow the lid 202 b to be opened. Other suitable locking mechanisms will be recognized by the skilled artisan.
  • In this embodiment, a thief cannot defeat the lock by disconnecting a power source from the computer. Previous security devices often employed password protection that could be defeated by disconnecting the battery or other power source which caused the electronic passwords to be disabled. Other password protection systems can be defeated by replacing the computer's hard drive or other hardware components. With the described embodiment, disconnecting the battery makes it more difficult to defeat the security device since the solenoid uses energy from the battery to disengage or unlock. Likewise replacing hardware components in the current embodiments may eliminate the instructions to open the lock when a given set of conditions are met (entering the proper sequence). [0026]
  • The described embodiments can physically secure the computer without the need for altering the external configuration of the computer or necessitating attaching it to external objects. Some previous security devices have required a portion of the housing be formed to allow a cable or other fastening device to be attached. The cable could then be fixed to an immobile object to prevent theft. However, the cables are easily cut. Further, making a portable computing device immobile defeats the inherent purpose of the device. The present embodiments maintain the beneficial characteristics of the portable computing device while decreasing the attractiveness to potential thieves. [0027]
  • The embodiments described so far have been in the context of notebook computers, but are equally applicable to other computing devices. For example, many cell phones have a base portion and a lid portion where the lid portion can be closed onto the base portion to cover at least some of the functional components of the cell phone. Many of these cell phones have some input mechanisms that remain accessible when the lid is closed. These input mechanisms can be utilized as described above to control a locking mechanism that prevents the lid from being opened. This feature could reduce the chance of someone stealing the phone and making unauthorized calls. [0028]
  • Similarly, a protective lid or cover, a locking mechanism and/or accessible input buttons can be added to various computing devices to achieve the desired functionality. [0029]
  • FIG. 4 shows a flow chart representing an exemplary method in accordance with one embodiment. As shown at [0030] 402, the method configures a computing device with a physical locking mechanism capable of locking the computing device in a storage position. This can allow a deployable portion of the computing device to be physically locked to a base portion.
  • As shown at [0031] 404, the method couples multiple user-engagable input mechanisms to the physical locking mechanism to allow a user to unlock the controllable locking mechanism. This can allow multiple input mechanisms to be activated to unlock the deployable portion.
  • CONCLUSION
  • The described embodiments allow a computer user to exercise increased control over a computing device by controlling deployment of a lid portion from a closed position to an open position. Only a user possessing the proper sequence can open the lid by manipulating user-engagable input mechanisms to unlock a locking mechanism. Unauthorized users cannot access the computing device and are less likely to attempt to take possession of the computing device. [0032]
  • Although the invention has been described in language specific to structural features and/or methodological steps, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and steps are disclosed as preferred forms of implementing the claimed invention.[0033]

Claims (12)

What is claimed is:
1. A computing device comprising:
a housing comprising a lid portion comprising a display; and a base portion comprising a keyboard, the lid portion and the base portion being configured to be locked in a first relative orientation such that the lid portion physically blocks a user from engaging the keyboard;
a data storage means positioned on the housing and configured to store a predetermined activation sequence; and,
at least one user-engagable input mechanism which can be accessed by a user when the display and the keyboard are in the first orientation and upon which a user can enter a user-entered activation sequence, and wherein if the user entered activation sequence equals the predetermined activation sequence the base portion and the lid portion can be unlocked from the first orientation.
2. A computing device comprising:
a base portion and a lid portion connected to the base portion, the base portion comprising a keyboard and the lid portion being configured to be deployed from a closed position which blocks user access to the keyboard to an open position which can allow user access to the keyboard; and,
a locking mechanism for locking the lid portion in the closed position and being configured to be controlled by a signal resulting from actuating multiple user-engagable input mechanisms.
3. The computing device of claim 2, wherein the locking mechanism comprises a solenoid.
4. The computing device of claim 2, wherein the locking mechanism comprises a solenoid configured to engage a fixed latching structure to lock the lid portion in the closed position and to disengage the fixed latching structure to unlock the lid portion.
5. A computing device comprising:
a base portion and a lid portion connected to the base portion, the lid portion being configured to be deployed from a closed position to an open position;
a locking mechanism for locking the lid portion in the closed position; and,
multiple user-engagable input mechanisms which are accessible to a user when the lid portion is in the closed position and wherein when the multiple user-engagable input mechanisms are engaged by a user in a predetermined sequence a signal is generated to unlock the locking mechanism.
6. A computing device as recited in claim 5, wherein the lid portion comprises a display device.
7. A computing device as recited in claim 5, wherein the at least some of the multiple input mechanisms function only to control the locking mechanism.
8. A computing device as recited in claim 5, wherein the at least some of the multiple input mechanisms comprise multi-function input mechanisms, one function of which is to unlock the locking mechanism.
9. A computing device as recited in claim 8, wherein a second function of the multi-function input mechanisms is to control a removable media device comprising part of the computing device.
10. A computing device as recited in claim 9, wherein the removable media device comprises a CD player.
11. A computing device as recited in claim 5, wherein the locking mechanism comprises a solenoid.
12. A portable computing device comprising:
means for physically locking a lid portion in a closed position against a base portion such that a keyboard of the base portion is physically inaccessible to a user; and,
means for receiving user input with the lid portion locked against the base portion;
means for comparing the user input to a pre-established sequence such that if the user input equals the pre-established sequence a signal is generated to unlock the locking means.
US10/872,887 2002-10-28 2004-06-21 Computing device and methods and systems for same Abandoned US20040233627A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/872,887 US20040233627A1 (en) 2002-10-28 2004-06-21 Computing device and methods and systems for same

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/282,347 US6785130B2 (en) 2002-10-28 2002-10-28 Computing device and methods and systems for same
US10/872,887 US20040233627A1 (en) 2002-10-28 2004-06-21 Computing device and methods and systems for same

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/282,347 Continuation US6785130B2 (en) 2002-10-28 2002-10-28 Computing device and methods and systems for same

Publications (1)

Publication Number Publication Date
US20040233627A1 true US20040233627A1 (en) 2004-11-25

Family

ID=32107339

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/282,347 Expired - Lifetime US6785130B2 (en) 2002-10-28 2002-10-28 Computing device and methods and systems for same
US10/872,887 Abandoned US20040233627A1 (en) 2002-10-28 2004-06-21 Computing device and methods and systems for same

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/282,347 Expired - Lifetime US6785130B2 (en) 2002-10-28 2002-10-28 Computing device and methods and systems for same

Country Status (1)

Country Link
US (2) US6785130B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060129826A1 (en) * 2004-11-30 2006-06-15 Kabushiki Kaisha Toshiba Electronic apparatus and method of reinforcing security thereof
WO2019139786A1 (en) * 2018-01-12 2019-07-18 Microsoft Technology Licensing, Llc Orientation specific control
US11252832B2 (en) * 2017-12-08 2022-02-15 Hewlett-Packard Development Company, L.P. Display devices with push-button assemblies

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060050474A1 (en) * 2004-09-08 2006-03-09 Hiroyuki Kusaka Computer with restriction feature for restricting user access
US20060085864A1 (en) * 2004-10-18 2006-04-20 Paul Chang Electronic security machine start method for notebook computers
US20060095617A1 (en) * 2004-10-30 2006-05-04 Tsung-Yung Hung Processing architecture for directly playing audio/video signal
US20060133019A1 (en) * 2004-12-21 2006-06-22 Fuminori Yamazaki Latch assembly for an electronic device
US20060242420A1 (en) * 2005-04-21 2006-10-26 Herman Rodriguez Electronic cable release coupled with portable computer screensaver

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4866962A (en) * 1987-05-23 1989-09-19 Yale Security Products Limited Electronic key-operable lock and key thereof
US5255154A (en) * 1990-05-07 1993-10-19 Kabushiki Kaisha Toshiba Portable electronic apparatus with a latch mechanism including an interlock
US6307738B1 (en) * 1998-08-31 2001-10-23 Compaq Computer Corporation Electronic hood lock
US6549503B2 (en) * 2001-02-22 2003-04-15 Jose R. Matos Disc player system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4866962A (en) * 1987-05-23 1989-09-19 Yale Security Products Limited Electronic key-operable lock and key thereof
US5255154A (en) * 1990-05-07 1993-10-19 Kabushiki Kaisha Toshiba Portable electronic apparatus with a latch mechanism including an interlock
US6307738B1 (en) * 1998-08-31 2001-10-23 Compaq Computer Corporation Electronic hood lock
US6549503B2 (en) * 2001-02-22 2003-04-15 Jose R. Matos Disc player system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060129826A1 (en) * 2004-11-30 2006-06-15 Kabushiki Kaisha Toshiba Electronic apparatus and method of reinforcing security thereof
US11252832B2 (en) * 2017-12-08 2022-02-15 Hewlett-Packard Development Company, L.P. Display devices with push-button assemblies
WO2019139786A1 (en) * 2018-01-12 2019-07-18 Microsoft Technology Licensing, Llc Orientation specific control
US11023014B2 (en) 2018-01-12 2021-06-01 Microsoft Technology Licensing, Llc Orientation specific control

Also Published As

Publication number Publication date
US6785130B2 (en) 2004-08-31
US20040080900A1 (en) 2004-04-29

Similar Documents

Publication Publication Date Title
US5578991A (en) Security system and method for a portable personal computer
US6721738B2 (en) Motion password control system
US6002921A (en) Lockable radiotelephone cradle
US7135971B2 (en) Anti-theft and security system for computers
US7362227B2 (en) Anti-theft and security system for computers
JP4131229B2 (en) Folding mobile phone and method for unlocking folding mobile phone
US20180032234A1 (en) Emergency information access on portable electronic devices
US7881054B2 (en) Computer lock system
US20100197352A1 (en) System and method for access control in a portable electronic device
US6788216B2 (en) Accessory alarm device of computer lock
US6785130B2 (en) Computing device and methods and systems for same
US6294995B1 (en) Anti-theft alarm for portable computer
US20070030257A1 (en) Locking digital pen
US7812724B2 (en) Countermeasure system triggered by movement of a display of a computing device
US20070030117A1 (en) Coded lock
JP2000172960A (en) Theft-preventing device for portable electronic device
US20060085864A1 (en) Electronic security machine start method for notebook computers
US11539829B2 (en) Systems and methods for unlocking a mobile device
CN115079920A (en) Control method for fingerprint and face recognition function of terminal equipment and terminal equipment
KR200176452Y1 (en) Security electronic switch
CN100361035C (en) Electronic safety device applied to notebook computer and starting method
JP4022247B2 (en) Mobile terminal device
JPH1139053A (en) Small-sized electronic appliance
WO2020029124A1 (en) Sliding lock assembly, method, and system
JP4001810B2 (en) Mobile terminal device

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载