Mobile computer security cabinet

a computer and mobile technology, applied in the field of office equipment theft prevention, can solve the problems of theft, computer, control or monitoring the operation of the conveyer belt on the factory floor, and the unattended computer of the operator, and achieve the effect of preventing theft, reducing the cost of replacement of computer equipment, and reducing the cost of replacemen

Inactive Publication Date: 2006-06-29
GOLDBERG MARK A
View PDF42 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005] The present invention relates to a mobile computer security cabinet designed to prevent full access to computer equipment contained in its interior portion. At the same time, the cabinet allows authorized partial and / or total access from its front and / or back. The cabinet also allows monitoring of the computer equipment without accessing it. Further, the computer cabinet provides mobility for the computer equipment.
[0006] In an embodiment, the mobile computer security cabinet includes a monitor enclosure configured to contain monitor computer equipment and having doors in the front and back of the cabinet. The cabinet also includes a central processing unit (“CPU”) or a computer equipment enclosure configured to contain a CPU, a printer and other computer related equipment. The enclosure also includes doors in the front and back of the cabinet. The cabinet also includes a keyboard and / or mouse enclosure spaced between the monitor enclosure and the CPU enclosure. The keyboard enclosure further includes a drawer, which slides out of the keyboard enclosure and exposes its interior portion without providing access to the monitor and the CPU enclosures. The monitor enclosure further includes a see-through window placed in its front door to allow a user to view the monitor without opening the door. The three enclosures communicate with each other through a channel. The channel is composed of a plurality of openings made in the enclosures. Wires connecting the computer equipment can pass through the channel. The cabinet also includes at least one wheel assembly coupled to the CPU enclosure, hence, providing mobility to the cabinet.

Problems solved by technology

A lot of times, computers are left unattended by their operators and are subject to theft.
For example, a computer, controlling or monitoring operation of a conveyer belt on a factory floor, may be subject to being stolen by an unauthorized intruder.
Theft results in additional expenditures in connection with replacement of the computer equipment.
More importantly, computer theft often results in a loss of valuable data that may be difficult or impossible to replace.
However, such systems can be easily circumvented.
Further, computer equipment can be vandalized.
Even though this prevents theft it also denies any access to the equipment until locked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile computer security cabinet
  • Mobile computer security cabinet
  • Mobile computer security cabinet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention is a mobile computer security cabinet. The computer cabinet includes three enclosures. The enclosures accommodate a computer or other computer related equipment and paraphernalia. A first enclosure accommodates a monitor. A second enclosure accommodates keyboard and a mouse. A third enclosure accommodates a central processing unit, printer, computer manuals, and other things. The second enclosure is spaced between the first and the third enclosures. The three enclosures communicate with each other using a channel composed of a plurality of openings made in interior portions of the three enclosures. Wires connecting the computer equipment can be placed in the channel. Such arrangement provides greater security to the computer equipment placed in the cabinet. In an alternate embodiment, the enclosures can be designed so that one enclosure can be accessed through another. This arrangement provides lesser security and may be suitable for locations where maxi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A mobile computer security cabinet configured to prevent theft of computer equipment and includes a monitor enclosure that contains a computer monitor, allows viewing the monitor without accessing it, and prevents unauthorized entry; a central processing unit (“CPU”) enclosure that contains CPU, printer and other computer related equipment and prevents unauthorized entry; a keyboard enclosure coupled to the monitor and CPU enclosure and prevents unauthorized entry; and a wheel assembly coupled to the CPU enclosure. The keyboard enclosure further includes a drawer, which slides out of the keyboard enclosure and exposes an interior portion of the keyboard enclosure without providing access to the monitor and CPU enclosures.

Description

FIELD OF THE INVENTION [0001] The present invention generally relates to a field of theft prevention of office equipment. Specifically, the present invention relates to a mobile computer security cabinet that is designed to prevent theft of computers or components of computers. [0002] In today's world, computers are an essential part of almost every business. Computers control, manage, operate, and assist individuals in many different tasks. For example, computers assist in generating a marketing analysis, monitoring readout signals, displaying results of analysis, allowing individuals to modify operations of other machines. A lot of times, computers are left unattended by their operators and are subject to theft. Theft may happen anywhere, including, offices, factories, homes, and other facilities. For example, a computer, controlling or monitoring operation of a conveyer belt on a factory floor, may be subject to being stolen by an unauthorized intruder. Theft results in additiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): A47B97/00
CPCA47B21/00A47B81/06
Inventor GOLDBERG, MARK A.
Owner GOLDBERG MARK A
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products