U.S. patent application number 10/872887 was filed with the patent office on 2004-11-25 for computing device and methods and systems for same.
Invention is credited to Anderson, Hyrum M., Takemoto, Ken.
Application Number | 20040233627 10/872887 |
Document ID | / |
Family ID | 32107339 |
Filed Date | 2004-11-25 |
United States Patent
Application |
20040233627 |
Kind Code |
A1 |
Anderson, Hyrum M. ; et
al. |
November 25, 2004 |
Computing device and methods and systems for same
Abstract
A computing device is described. The computing device can
include a housing which includes a lid portion having a display;
and a base portion including a keyboard, the lid portion and the
base portion being configured to be locked in a first relative
orientation such that the lid portion physically blocks a user from
engaging the keyboard. The computing device can also include a data
storage means positioned on the housing and configured to store a
predetermined activation sequence; and, at least one user-engagable
input mechanism which can be accessed by a user when the display
and the keyboard are in the first orientation and upon which a user
can enter a user-entered activation sequence, and wherein if the
user entered activation sequence equals the predetermined
activation sequence the base portion and the lid portion can be
unlocked from the first orientation.
Inventors: |
Anderson, Hyrum M.;
(Houston, TX) ; Takemoto, Ken; (Cupertino,
CA) |
Correspondence
Address: |
HEWLETT-PACKARD COMPANY
Intellectual Property Administration
P.O. Box 272400
Fort Collins
CO
80527-2400
US
|
Family ID: |
32107339 |
Appl. No.: |
10/872887 |
Filed: |
June 21, 2004 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
10872887 |
Jun 21, 2004 |
|
|
|
10282347 |
Oct 28, 2002 |
|
|
|
6785130 |
|
|
|
|
Current U.S.
Class: |
361/679.31 ;
361/679.21; 70/58 |
Current CPC
Class: |
G06F 1/3228 20130101;
Y10T 70/5009 20150401 |
Class at
Publication: |
361/683 ;
070/058 |
International
Class: |
G06F 001/16 |
Claims
What is claimed is:
1. A computing device comprising: a housing comprising a lid
portion comprising a display; and a base portion comprising a
keyboard, the lid portion and the base portion being configured to
be locked in a first relative orientation such that the lid portion
physically blocks a user from engaging the keyboard; a data storage
means positioned on the housing and configured to store a
predetermined activation sequence; and, at least one user-engagable
input mechanism which can be accessed by a user when the display
and the keyboard are in the first orientation and upon which a user
can enter a user-entered activation sequence, and wherein if the
user entered activation sequence equals the predetermined
activation sequence the base portion and the lid portion can be
unlocked from the first orientation.
2. A computing device comprising: a base portion and a lid portion
connected to the base portion, the base portion comprising a
keyboard and the lid portion being configured to be deployed from a
closed position which blocks user access to the keyboard to an open
position which can allow user access to the keyboard; and, a
locking mechanism for locking the lid portion in the closed
position and being configured to be controlled by a signal
resulting from actuating multiple user-engagable input
mechanisms.
3. The computing device of claim 2, wherein the locking mechanism
comprises a solenoid.
4. The computing device of claim 2, wherein the locking mechanism
comprises a solenoid configured to engage a fixed latching
structure to lock the lid portion in the closed position and to
disengage the fixed latching structure to unlock the lid
portion.
5. A computing device comprising: a base portion and a lid portion
connected to the base portion, the lid portion being configured to
be deployed from a closed position to an open position; a locking
mechanism for locking the lid portion in the closed position; and,
multiple user-engagable input mechanisms which are accessible to a
user when the lid portion is in the closed position and wherein
when the multiple user-engagable input mechanisms are engaged by a
user in a predetermined sequence a signal is generated to unlock
the locking mechanism.
6. A computing device as recited in claim 5, wherein the lid
portion comprises a display device.
7. A computing device as recited in claim 5, wherein the at least
some of the multiple input mechanisms function only to control the
locking mechanism.
8. A computing device as recited in claim 5, wherein the at least
some of the multiple input mechanisms comprise multi-function input
mechanisms, one function of which is to unlock the locking
mechanism.
9. A computing device as recited in claim 8, wherein a second
function of the multi-function input mechanisms is to control a
removable media device comprising part of the computing device.
10. A computing device as recited in claim 9, wherein the removable
media device comprises a CD player.
11. A computing device as recited in claim 5, wherein the locking
mechanism comprises a solenoid.
12. A portable computing device comprising: means for physically
locking a lid portion in a closed position against a base portion
such that a keyboard of the base portion is physically inaccessible
to a user; and, means for receiving user input with the lid portion
locked against the base portion; means for comparing the user input
to a pre-established sequence such that if the user input equals
the pre-established sequence a signal is generated to unlock the
locking means.
Description
RELATED CASES
[0001] This patent application is a continuation claiming priority
from a patent application having Ser. No. 10/282,347 titled
"Computing Device and Methods and Systems for Same" filed Oct. 28,
2002, and issued as patent number
BACKGROUND
[0002] With the increased mobility of people in today's society,
the demand for mobile computing and communication capabilities has
increased dramatically. Individuals desire a computing device that
can be easily transported with them for convenience, ease of use,
and increased productivity. A portable computing device is often
relatively compact, and can be self-contained. The same features
that make a computing device easily portable for a user also make
the device susceptible to theft. Therefore, it would be beneficial
to improve the theft deterrence characteristics of various
computing devices, most notably portable computing devices.
[0003] Accordingly, the described embodiments provide computing
devices having advantageous security or theft deterrence
characteristics.
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] The same numbers are used throughout the drawings to
reference like features and components.
[0005] FIG. 1 shows a block diagram of selected functional
components of an exemplary computing device in accordance with one
embodiment.
[0006] FIGS. 2a-2b illustrate a perspective view of an exemplary
computing device in accordance with one embodiment.
[0007] FIG. 3 illustrates a front view of an exemplary computing
device in accordance with one embodiment.
[0008] FIG. 4 shows a flow chart representing acts in accordance
with one exemplary method.
DETAILED DESCRIPTION
Overview
[0009] Various securable computing devices are described. In one
embodiment, the computing device comprises a notebook or laptop
computer that has a lid pivotably connected to a base portion. The
lid is deployable from a closed position in which the lid can be
locked to the base portion, to an opened position in which a
keyboard on the base portion can be accessed and used by a user.
The computing device has a housing that includes various
user-engagable input mechanisms or buttons. When the lid is in the
closed position, the input mechanisms can be used as a part of a
combination lock assembly to provide a user-keyed combination to
unlock a locking mechanism that allows the user to open the lid.
When the lid is deployed to the opened position, in some
embodiments, these very same input mechanisms or buttons can be
used to provide user input that is used by the computing device to
implement a particular functionality. Examples of various
functionalities are provided below.
Exemplary Embodiments and Methods
[0010] For purposes of understanding various structures associated
with an exemplary computing device, consider FIG. 1, which is a
block diagram showing exemplary components of a computing device
100. The computing device 100 may include a processor 102, a memory
104 (such as ROM and RAM), user-engagable input mechanisms 106, a
disk drive 108, interface port 110 for inputting and outputting
data, and a removable media device 112. It can further have a
display device 116, and a housing 118 for supporting and
positioning the various components.
[0011] The processor 102 can perform various instructions to
control the operation of the computing device 100. Memory 104, disk
drive 108, and removable media device 112 can provide data storage
devices. The data storage devices can comprise computer-readable
media that can have computer readable instructions thereon. The
computer-readable instructions when read by the computer can cause
the computer to perform a desired functionality.
[0012] User-engagable input mechanism(s) 106 can include a
keyboard, mouse, pointing device, joystick and/or other mechanism
for inputting information to the computing device. Various input
mechanisms will be discussed in more detail below. Interface port
110 can provide a mechanism for computing device 100 to communicate
with other devices.
[0013] A removable media device 112 can include built-in CD-ROM's,
DVD-ROM's, floppy disc drives, CD-RW drives, DVD-R/RW drives,
DVD+R/RW drives, DVD-RAM drives, SuperDisc drives, Zip drives, and
other emerging technologies.
[0014] Suitable display devices 116 can have various
configurations. Examples include cathode ray tubes (CRT), and
liquid crystal displays (LCD), among others. The various components
can be positioned relative to one another and/or protected by the
housing 118. The housing can be made from various materials such as
various plastics, polymers, and metals, among others. The above
described components need not all be present in a particular
exemplary computing device. Further, some exemplary computing
devices can have more than one of a specific component. For
example, a particular computing device may have a floppy disk drive
and a CD-ROM.
[0015] The computing device described herein can be one type of
suitable computing device as it relates to the described
embodiments, others can include, but are not limited to, personal
computers, notebook computers, laptop computers, personal digital
assistants (PDAs), video games, portable video games, cell phones,
and other computing devices.
[0016] FIGS. 2a-2b show an exemplary computing device in accordance
with one embodiment. In this embodiment, the computing device can
comprise a notebook computer 100a having a housing 118a. The
housing can comprise a lid portion 202 connected via a hinge 203 to
a body or base portion 204. Such a configuration allows the lid to
move between an open position (as shown in FIG. 2a) and a closed
position (as shown in FIG. 2b) where the lid is folded onto the
base portion 204. The notebook computer also includes a display
116a mounted in the lid. The display can be seen by a user when the
lid is open, and is protected by the housing when the lid is
closed.
[0017] As shown here, the base portion 204 can contain a data
storage device 112a that in this embodiment comprises a floppy disk
drive. The notebook computer 100a can also contain various
user-engagable input mechanisms which, in this embodiment, comprise
a keyboard 206 and input buttons 208, among others. The various
input mechanisms allow a user to interact with, and control the
function of, the notebook computer. For example, the keyboard
allows a user to enter various characters and control various
programs contained on the computer. Other input mechanisms can
allow a user to control the function of various components
comprising the computer. For example, some input mechanisms can
allow a user to control a volume setting of the computer.
[0018] The exemplary notebook computer 100a can further have a lock
or locking mechanism 210 for locking the lid 202 in the closed
position. The lock 210 can be controlled by activating the
user-engagable input mechanisms in a proper sequence or
combination. Suitable examples will be discussed in more detail
below.
[0019] In this embodiment, some of the input buttons 208 are
accessible to a user regardless of the lid position. Other input
mechanisms and components such as the keyboard 206 and display 116a
are accessible only when the lid 202 is open (as shown in FIG. 2a).
When the lid is closed the display cannot be seen and the keyboard
can not be used. With this configuration, a user can achieve full
functionality with the computer only when the lid is open.
Conversely, when the lid is closed the computer has diminished
functionality. The input buttons 208 are accessible whether the lid
is in the open or closed position. As such, the input buttons can
be used as part of a combination lock assembly.
[0020] The combination lock assembly can allow a user-keyed
combination to unlock the locking mechanism 210. With the locking
mechanism unlocked, the user can open the lid 202. Unauthorized
users, who do not know the proper sequence of the user-keyed
combination, will be unable to open the lid. By locking the
computer in the closed position, the computer has diminished
functionality to anyone who does not know the proper sequence to
unlock the lock. In this state the computer cannot be used to its
full or normal capacity. This feature can reduce unauthorized
access to the computer. This feature can also greatly diminish the
value of the computer to potential thieves and therefore can
decrease the likelihood of the computer being targeted for
theft.
[0021] Though the notebook computer 100a has a high degree of
security, the user can simply activate the input buttons 208 in the
proper sequence to unlock the lid 202 and regain functionality. In
this embodiment, the input buttons 208 are dedicated solely to
controlling the lock. Other suitable embodiments will be described
below where the input buttons are multi-function.
[0022] FIG. 3 shows a front elevational view of another exemplary
computing device comprising a notebook computer 100b. The notebook
computer has a lid 202b that is closed on a base 204b. Positioned
in and supported by the base are multiple input buttons 208b. The
input buttons can be more clearly seen in expanded portion 300. In
this embodiment, the input buttons 208b comprise multi-function
input mechanisms. The input buttons can be engaged or manipulated
to control a removable media device that, in this embodiment,
comprises a CD player (not shown). In this embodiment, the input
buttons comprise volume buttons 302a and 302b, a back button 303, a
play button 304, a forward button 305, and a stop button 306. The
input buttons can also be engaged to unlock a lock or locking
mechanism 210b and allow a user to open the lid 202b. The input
buttons 208b and the locking mechanism 210b can in some embodiments
comprise a combination lock.
[0023] In this embodiment, a pre-established activation sequence
can be saved on a data storage device (not shown) of the notebook
computer 100b such that a user entered sequence can be compared to
the saved sequence. In some embodiments, this pre-established
activation sequence can be set by the manufacturer. Other
embodiments can allow the user to set the sequence. Still other
embodiments can have a factory set sequence that can be reset by
the user. Some embodiments, can be designed so that after a certain
number of improper sequences are entered the computer blocks all
input for a given period of time. Such a configuration can prevent
a potential thief from trying to enter all the possible
combinations to open the lock. One of skill in the art will
recognize other satisfactory embodiments.
[0024] In an embodiment such as the one shown in FIG. 3, where the
input buttons 208b are multi-function, the pre-established sequence
can comprise a first subsequence and a second subsequence. For
example, volume buttons 302a and 302b can be pressed simultaneously
as the first subsequence to instruct the computer that the
following input or second subsequence is directed at controlling
the lock. This second subsequence can comprise a unique number of
inputs on the various input buttons 208b. For example, the second
subsequence can comprise any order of activating some or all of the
volume buttons 302a and 302b, the back button 303, the play button
304, the forward button 305, and/or the stop button 306.
[0025] If the sequence that is entered equals the pre-established
sequence the locking mechanism 210b can be opened. For example, as
shown here, a user can press the volume keys (302a and b)
simultaneously, and then press the stop key 306, the play key 304,
the forward key 305, and the volume up key 302b to open the lock
210b. In this embodiment, the lock can comprise a solenoid 308 that
can engage and disengage a fixed structure 310 and allow the lid
202b to be opened. Other suitable locking mechanisms will be
recognized by the skilled artisan.
[0026] In this embodiment, a thief cannot defeat the lock by
disconnecting a power source from the computer. Previous security
devices often employed password protection that could be defeated
by disconnecting the battery or other power source which caused the
electronic passwords to be disabled. Other password protection
systems can be defeated by replacing the computer's hard drive or
other hardware components. With the described embodiment,
disconnecting the battery makes it more difficult to defeat the
security device since the solenoid uses energy from the battery to
disengage or unlock. Likewise replacing hardware components in the
current embodiments may eliminate the instructions to open the lock
when a given set of conditions are met (entering the proper
sequence).
[0027] The described embodiments can physically secure the computer
without the need for altering the external configuration of the
computer or necessitating attaching it to external objects. Some
previous security devices have required a portion of the housing be
formed to allow a cable or other fastening device to be attached.
The cable could then be fixed to an immobile object to prevent
theft. However, the cables are easily cut. Further, making a
portable computing device immobile defeats the inherent purpose of
the device. The present embodiments maintain the beneficial
characteristics of the portable computing device while decreasing
the attractiveness to potential thieves.
[0028] The embodiments described so far have been in the context of
notebook computers, but are equally applicable to other computing
devices. For example, many cell phones have a base portion and a
lid portion where the lid portion can be closed onto the base
portion to cover at least some of the functional components of the
cell phone. Many of these cell phones have some input mechanisms
that remain accessible when the lid is closed. These input
mechanisms can be utilized as described above to control a locking
mechanism that prevents the lid from being opened. This feature
could reduce the chance of someone stealing the phone and making
unauthorized calls.
[0029] Similarly, a protective lid or cover, a locking mechanism
and/or accessible input buttons can be added to various computing
devices to achieve the desired functionality.
[0030] FIG. 4 shows a flow chart representing an exemplary method
in accordance with one embodiment. As shown at 402, the method
configures a computing device with a physical locking mechanism
capable of locking the computing device in a storage position. This
can allow a deployable portion of the computing device to be
physically locked to a base portion.
[0031] As shown at 404, the method couples multiple user-engagable
input mechanisms to the physical locking mechanism to allow a user
to unlock the controllable locking mechanism. This can allow
multiple input mechanisms to be activated to unlock the deployable
portion.
CONCLUSION
[0032] The described embodiments allow a computer user to exercise
increased control over a computing device by controlling deployment
of a lid portion from a closed position to an open position. Only a
user possessing the proper sequence can open the lid by
manipulating user-engagable input mechanisms to unlock a locking
mechanism. Unauthorized users cannot access the computing device
and are less likely to attempt to take possession of the computing
device.
[0033] Although the invention has been described in language
specific to structural features and/or methodological steps, it is
to be understood that the invention defined in the appended claims
is not necessarily limited to the specific features or acts
described. Rather, the specific features and steps are disclosed as
preferred forms of implementing the claimed invention.
* * * * *