INTEGRATED SECURITY LOCK
20250137298 ยท 2025-05-01
Inventors
Cpc classification
E05B73/0082
FIXED CONSTRUCTIONS
E05B2073/0088
FIXED CONSTRUCTIONS
International classification
E05B73/00
FIXED CONSTRUCTIONS
Abstract
A security lock is provided for a mobile device. The security lock includes a pair of locking elements and a pair of electromechanical actuators. Each locking element has a profile configured to complement a profile of a locking tab of an external locking assembly. Each electromechanical actuator is configured to engage an associated one of the locking elements to lock the locking tab to the mobile device, and to disengage the associated locking element to unlock the locking tab.
Claims
1. A security lock for a mobile device, the security lock comprising: a pair of locking elements, each locking element having a profile configured to complement a profile of a locking tab of an external locking assembly; and a pair of electromechanical actuators, each electromechanical actuator configured to engage an associated one of the locking elements to lock the locking tab to the mobile device, and to disengage the associated locking element to unlock the locking tab.
2. The security lock of claim 1, wherein the locking elements include C-clamps.
3. The security lock of claim 2, further including a locking pin associated with each C-clamp.
4. The security lock of claim 3, wherein each C-clamp is provided with a locking hole.
5. The security lock of claim 4, wherein, when locked, the security lock engages the locking pin in the locking hole, and when unlocked, the security lock disengages the locking pin from the locking hole.
6. The security lock of claim 1, wherein the electromechanical actuators each include a spring configured to maintain the associated locking element in a first position, and a muscle wire which moves the associated locking element to a second position.
7. The security lock of claim 6, wherein, when the locking element is in the first position, the security lock is unlocked, and when the locking element is in the second position, the security lock is locked.
8. The security lock of claim 6, wherein, when the locking element is in the first position, the security lock is locked, and when the locking element is in the second position, the security lock is unlocked.
9. The security lock of claim 6, wherein the muscle wire moves the associated locking element when the muscle wire is electrically actuated.
10. The security lock of claim 1, wherein the electromechanical actuators are activated in response to a user input to the mobile device.
11. A method for providing a security lock for a mobile device, the method comprising: providing, in the security lock, a pair of locking elements, each locking element having a profile configured to complement a profile of a locking tab of an external locking assembly; providing, in the security lock, a pair of electromechanical actuators; engaging, by each electromechanical actuator, an associated one of the locking elements to lock the locking tab to the mobile device; and disengaging, by each electromechanical actuator, the associated locking element to unlock the locking tab.
12. The method of claim 11, wherein the locking elements include C-clamps.
13. The method of claim 12, further comprising including, in each C-clamp, a locking pin.
14. The method of claim 13, further comprising providing each C-clamp with a locking hole.
15. The method of claim 14, further comprising: engaging the locking pin in the locking hole when the security lock is locked; and disengaging the locking pin from the locking hole when the security lock is unlocked.
16. The method of claim 11, further comprising: providing, with each electromechanical actuator, a spring configured to maintain the associated locking element in a first position; and providing, with each electromechanical actuator, a muscle wire which moves the associated locking element to a second position.
17. The method of claim 16, wherein, when the locking element is in the first position, the security lock is unlocked, and when the locking element is in the second position, the security lock is locked.
18. The method of claim 16, wherein, when the locking element is in the first position, the security lock is locked, and when the locking element is in the second position, the security lock is unlocked.
19. The method of claim 16, wherein the muscle wire moves the associated locking element when the muscle wire is electrically actuated.
20. A security lock for a mobile device, the security lock comprising: a pair of C-clamps, each C-clamp having a profile configured to complement a profile of a locking tab of an external locking assembly; a pair of electromechanical actuators, each electromechanical actuator configured to engage an associated one of the C-clamps to lock the locking tab to the mobile device, and to disengage the associated C-clamp to unlock the locking tab; and a pair of mounting brackets, each mounting bracket configured to secure an associated one of the electromechanical actuators.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] It will be appreciated that for simplicity and clarity of illustration, elements illustrated in the Figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements are exaggerated relative to other elements. Embodiments incorporating teachings of the present disclosure are shown and described with respect to the drawings presented herein, in which:
[0005]
[0006]
[0007]
[0008]
[0009]
[0010]
[0011]
[0012] The use of the same reference symbols in different drawings indicates similar or identical items.
DETAILED DESCRIPTION OF DRAWINGS
[0013] The following description in combination with the Figures is provided to assist in understanding the teachings disclosed herein. The following discussion will focus on specific implementations and embodiments of the teachings. This focus is provided to assist in describing the teachings, and should not be interpreted as a limitation on the scope or applicability of the teachings. However, other teachings can certainly be used in this application. The teachings can also be used in other applications, and with several different types of architectures, such as distributed computing architectures, client/server architectures, or middleware server architectures and associated resources.
[0014]
[0015]
[0016] C-clamps 220 are each coupled to their associated mounting brackets by an associated one of locking assemblies 250. Locking assemblies 250 operate to either retract or engage their associated C-clamps 220. In this embodiment, the term retract means to draw C-clamps 220 outward toward their associated mounting brackets 240, and the term engage means to drive the C-clamps toward each other and away from their associated mounting brackets. As such, locking assemblies 250 operate to mechanically move their associated C-clamps 220 outward to retract the C-clamps, or inward to engage the C-clamps. As illustrated, locking assemblies 250 each include a locking spring 252 and at least one element of muscle wire 254 (illustrated as two elements of muscle wire). Locking springs 252 are each rigidly affixed between their associated C-clamp 220 and their associated mounting bracket 240. Muscle wires 254 represent electrical elements that expand or contract with the application of a current to the muscle wires.
[0017] In a first embodiment, locking springs 252 are sprung to hold their associated C-clamps 220 in the retracted position. Then, in a first case, when no current is applied to muscle wires 254, the muscle wires are contracted, and so no current is needed to retract C-clamps 252. Thus in this case, in the unpowered state, C-clamps 220 are retracted. In a second case when a current is applied to muscle wires 254, the muscle wires are contracted, and so a current is needed to retract C-clamps 252. Thus in this case, in the unpowered state, C-clamps 250 are extended. In a second embodiment, locking springs 252 are sprung to hold their associated C-clamps 220 in the extended position. Then in a first case, when no current is applied to muscle wires 254, the muscle wires are extended, and so a current is needed to retract C-clamps 252. Thus in this case, in the unpowered state, C-clamps 220 are extended. In a second case when no current is applied to muscle wires 254, the muscle wires are contracted, and so no current is needed to retract locking springs 252. Thus in this case, in the unpowered state, C-clamps 250 are retracted.
[0018]
[0019] Locking assemblies 250 may be provided by other mechanisms than the spring and muscle wire arrangement as shown in
[0020]
[0021] BMC 320 represents a processor subsystem of the mobile device that operates out of band from a host processing system of the mobile device. BMC 320 operates to receive the input from keyboard function key 310 to lock or unlock security lock 330, and to actuate the security lock in accordance with the keyboard input. In particular, BMC 320 may include one or more logic element, such as a complex programmable logic device (CPLD) that includes one or more general purpose input/output (GPIO) that is connected to the electrical actuators associated with security lock 330, that, under the direction of the BMC, are enabled to either lock or unlock the security lock. For example, a CPLD may be connected to one or more muscle wires associated with locking pins to engage or disengage the locking pins of the security lock, and may be connected to one or more muscle wires associated with the locking assemblies to extend or retract the C-clamps of the security lock. BMC 320 further operates to authenticate the use of the mobile device to ensure that the user has a privilege level needed to lock or unlock the security device. Such authentication may be provided by any authentication mechanism as may be known in the art, such as a username/password combination, an operating system authentication such as a Windows Hello authentication, a biometric authentication, or the like.
[0022]
[0023]
[0024]
[0025] Information handling system 500 can include devices or modules that embody one or more of the devices or modules described below, and operates to perform one or more of the methods described below. Information handling system 500 includes a processors 502 and 504, an input/output (I/O) interface 510, memories 520 and 525, a graphics interface 530, a basic input and output system/universal extensible firmware interface (BIOS/UEFI) module 540, a disk controller 550, a hard disk drive (HDD) 554, an optical disk drive (ODD) 556, a disk emulator 560 connected to an external solid state drive (SSD) 564, an I/O bridge 570, one or more add-on resources 574, a trusted platform module (TPM) 576, a network interface 580, a management device 590, and a power supply 595. Processors 502 and 504, I/O interface 510, memory 520, graphics interface 530, BIOS/UEFI module 540, disk controller 550, HDD 554, ODD 556, disk emulator 560, SSD 564, I/O bridge 570, add-on resources 574, TPM 576, and network interface 580 operate together to provide a host environment of information handling system 500 that operates to provide the data processing functionality of the information handling system. The host environment operates to execute machine-executable code, including platform BIOS/UEFI code, device firmware, operating system code, applications, programs, and the like, to perform the data processing tasks associated with information handling system 500.
[0026] In the host environment, processor 502 is connected to I/O interface 510 via processor interface 506, and processor 504 is connected to the I/O interface via processor interface 508. Memory 520 is connected to processor 502 via a memory interface 522. Memory 525 is connected to processor 504 via a memory interface 527. Graphics interface 530 is connected to I/O interface 510 via a graphics interface 532, and provides a video display output 536 to a video display 534. In a particular embodiment, information handling system 500 includes separate memories that are dedicated to each of processors 502 and 504 via separate memory interfaces. An example of memories 520 and 525 include random access memory (RAM) such as static RAM (SRAM), dynamic RAM (DRAM), non-volatile RAM (NV-RAM), or the like, read only memory (ROM), another type of memory, or a combination thereof.
[0027] BIOS/UEFI module 540, disk controller 550, and I/O bridge 570 are connected to I/O interface 510 via an I/O channel 512. An example of I/O channel 512 includes a Peripheral Component Interconnect (PCI) interface, a PCI-Extended (PCI-X) interface, a high-speed PCI-Express (PCIe) interface, another industry standard or proprietary communication interface, or a combination thereof. I/O interface 510 can also include one or more other I/O interfaces, including an Industry Standard Architecture (ISA) interface, a Small Computer Serial Interface (SCSI) interface, an Inter-Integrated Circuit (I.sup.2C) interface, a System Packet Interface (SPI), a Universal Serial Bus (USB), another interface, or a combination thereof. BIOS/UEFI module 540 includes BIOS/UEFI code operable to detect resources within information handling system 500, to provide drivers for the resources, initialize the resources, and access the resources. BIOS/UEFI module 540 includes code that operates to detect resources within information handling system 500, to provide drivers for the resources, to initialize the resources, and to access the resources.
[0028] Disk controller 550 includes a disk interface 552 that connects the disk controller to HDD 554, to ODD 556, and to disk emulator 560. An example of disk interface 552 includes an Integrated Drive Electronics (IDE) interface, an Advanced Technology Attachment (ATA) such as a parallel ATA (PATA) interface or a serial ATA (SATA) interface, a SCSI interface, a USB interface, a proprietary interface, or a combination thereof. Disk emulator 560 permits SSD 564 to be connected to information handling system 500 via an external interface 562. An example of external interface 562 includes a USB interface, an IEEE 5394 (Firewire) interface, a proprietary interface, or a combination thereof. Alternatively, solid-state drive 564 can be disposed within information handling system 500.
[0029] I/O bridge 570 includes a peripheral interface 572 that connects the I/O bridge to add-on resource 574, to TPM 576, and to network interface 580. Peripheral interface 572 can be the same type of interface as I/O channel 512, or can be a different type of interface. As such, I/O bridge 570 extends the capacity of I/O channel 512 when peripheral interface 572 and the I/O channel are of the same type, and the I/O bridge translates information from a format suitable to the I/O channel to a format suitable to the peripheral channel 572 when they are of a different type. Add-on resource 574 can include a data storage system, an additional graphics interface, a network interface card (NIC), a sound/video processing card, another add-on resource, or a combination thereof. Add-on resource 574 can be on a main circuit board, on separate circuit board or add-in card disposed within information handling system 500, a device that is external to the information handling system, or a combination thereof.
[0030] Network interface 580 represents a NIC disposed within information handling system 500, on a main circuit board of the information handling system, integrated onto another component such as I/O interface 510, in another suitable location, or a combination thereof. Network interface device 580 includes network channels 582 and 584 that provide interfaces to devices that are external to information handling system 500. In a particular embodiment, network channels 582 and 584 are of a different type than peripheral channel 572 and network interface 580 translates information from a format suitable to the peripheral channel to a format suitable to external devices. An example of network channels 582 and 584 includes InfiniBand channels, Fibre Channel channels, Gigabit Ethernet channels, proprietary channel architectures, or a combination thereof. Network channels 582 and 584 can be connected to external network resources (not illustrated). The network resource can include another information handling system, a data storage system, another network, a grid management system, another suitable resource, or a combination thereof.
[0031] Management device 590 represents one or more processing devices, such as a dedicated baseboard management controller (BMC) System-on-a-Chip (SoC) device, one or more associated memory devices, one or more network interface devices, a complex programmable logic device (CPLD), and the like, that operate together to provide the management environment for information handling system 500. In particular, management device 590 is connected to various components of the host environment via various internal communication interfaces, such as a Low Pin Count (LPC) interface, an Inter-Integrated-Circuit (I2C) interface, a PCIe interface, or the like, to provide an out-of-band (OOB) mechanism to retrieve information related to the operation of the host environment, to provide BIOS/UEFI or system firmware updates, to manage non-processing components of information handling system 500, such as system cooling fans and power supplies. Management device 590 can include a network connection to an external management system, and the management device can communicate with the management system to report status information for information handling system 500, to receive BIOS/UEFI or system firmware updates, or to perform other task for managing and controlling the operation of information handling system 500. Management device 590 can operate off of a separate power plane from the components of the host environment so that the management device receives power to manage information handling system 500 when the information handling system is otherwise shut down. An example of management device 590 include a commercially available BMC product or other device that operates in accordance with an Intelligent Platform Management Initiative (IPMI) specification, a Web Services Management (WSMan) interface, a Redfish Application Programming Interface (API), another Distributed Management Task Force (DMTF), or other management standard, and can include an Integrated Dell Remote Access Controller (iDRAC), an Embedded Controller (EC), or the like. Management device 590 may further include associated memory devices, logic devices, security devices, or the like, as needed or desired.
[0032] Although only a few exemplary embodiments have been described in detail herein, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of the embodiments of the present disclosure. Accordingly, all such modifications are intended to be included within the scope of the embodiments of the present disclosure as defined in the following claims. In the claims, means-plus-function clauses are intended to cover the structures described herein as performing the recited function and not only structural equivalents, but also equivalent structures.
[0033] The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover any and all such modifications, enhancements, and other embodiments that fall within the scope of the present invention. Thus, to the maximum extent allowed by law, the scope of the present invention is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.