US20060138915A1 - Mobile computer security cabinet - Google Patents

Mobile computer security cabinet Download PDF

Info

Publication number
US20060138915A1
US20060138915A1 US11/024,117 US2411704A US2006138915A1 US 20060138915 A1 US20060138915 A1 US 20060138915A1 US 2411704 A US2411704 A US 2411704A US 2006138915 A1 US2006138915 A1 US 2006138915A1
Authority
US
United States
Prior art keywords
cabinet
door
enclosure
interior cavity
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/024,117
Inventor
Mark Goldberg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/024,117 priority Critical patent/US20060138915A1/en
Publication of US20060138915A1 publication Critical patent/US20060138915A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47BTABLES; DESKS; OFFICE FURNITURE; CABINETS; DRAWERS; GENERAL DETAILS OF FURNITURE
    • A47B81/00Cabinets or racks specially adapted for other particular purposes, e.g. for storing guns or skis
    • A47B81/06Furniture aspects of radio, television, gramophone, or record cabinets
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47BTABLES; DESKS; OFFICE FURNITURE; CABINETS; DRAWERS; GENERAL DETAILS OF FURNITURE
    • A47B21/00Tables or desks for office equipment, e.g. typewriters, keyboards

Definitions

  • the present invention generally relates to a field of theft prevention of office equipment. Specifically, the present invention relates to a mobile computer security cabinet that is designed to prevent theft of computers or components of computers.
  • computers are an essential part of almost every business. Computers control, manage, operate, and assist individuals in many different tasks. For example, computers assist in generating a marketing analysis, monitoring readout signals, displaying results of analysis, allowing individuals to modify operations of other machines. A lot of times, computers are left unattended by their operators and are subject to theft. Theft may happen anywhere, including, offices, factories, homes, and other facilities. For example, a computer, controlling or monitoring operation of a conveyer belt on a factory floor, may be subject to being stolen by an unauthorized intruder. Theft results in additional expenditures in connection with replacement of the computer equipment. More importantly, computer theft often results in a loss of valuable data that may be difficult or impossible to replace.
  • the present invention relates to a mobile computer security cabinet designed to prevent full access to computer equipment contained in its interior portion.
  • the cabinet allows authorized partial and/or total access from its front and/or back.
  • the cabinet also allows monitoring of the computer equipment without accessing it.
  • the computer cabinet provides mobility for the computer equipment.
  • the mobile computer security cabinet includes a monitor enclosure configured to contain monitor computer equipment and having doors in the front and back of the cabinet.
  • the cabinet also includes a central processing unit (“CPU”) or a computer equipment enclosure configured to contain a CPU, a printer and other computer related equipment.
  • the enclosure also includes doors in the front and back of the cabinet.
  • the cabinet also includes a keyboard and/or mouse enclosure spaced between the monitor enclosure and the CPU enclosure.
  • the keyboard enclosure further includes a drawer, which slides out of the keyboard enclosure and exposes its interior portion without providing access to the monitor and the CPU enclosures.
  • the monitor enclosure further includes a see-through window placed in its front door to allow a user to view the monitor without opening the door.
  • the three enclosures communicate with each other through a channel.
  • the channel is composed of a plurality of openings made in the enclosures. Wires connecting the computer equipment can pass through the channel.
  • the cabinet also includes at least one wheel assembly coupled to the CPU enclosure, hence, providing mobility to the cabinet.
  • FIG. 1 is a front view of an exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 2 is a rear view of an exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 3 is a side view of an exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 4 is a rear view of another exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 5 is a front view of an exemplary mobile computer security cabinet exposing an interior portion of the cabinet's top enclosure, according to the present invention.
  • FIG. 6 is a front view of an exemplary mobile computer security cabinet exposing an interior portion of the cabinet's bottom enclosure, according to the present invention.
  • FIG. 7 is a top view of an exemplary mobile computer security cabinet exposing an interior portion of the cabinet's middle enclosure, according to the present invention.
  • FIG. 8 is a front view of another exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 9 is a front view of yet another exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 10 illustrates an exemplary embodiment of the mobile computer security cabinet, according to the present invention.
  • FIG. 11 illustrates another exemplary embodiment of the mobile computer security cabinet exposing an interior portion of the cabinet's middle enclosure, according to the present invention.
  • the present invention is a mobile computer security cabinet.
  • the computer cabinet includes three enclosures.
  • the enclosures accommodate a computer or other computer related equipment and paraphernalia.
  • a first enclosure accommodates a monitor.
  • a second enclosure accommodates keyboard and a mouse.
  • a third enclosure accommodates a central processing unit, printer, computer manuals, and other things.
  • the second enclosure is spaced between the first and the third enclosures.
  • the three enclosures communicate with each other using a channel composed of a plurality of openings made in interior portions of the three enclosures. Wires connecting the computer equipment can be placed in the channel.
  • Such arrangement provides greater security to the computer equipment placed in the cabinet.
  • the enclosures can be designed so that one enclosure can be accessed through another. This arrangement provides lesser security and may be suitable for locations where maximum security of computer equipment is not absolutely necessary.
  • the first and third enclosures include doors in the front and back of the cabinet.
  • the doors are attached to the cabinet using hinges, clips, or other methods. Locks are placed on the doors to further secured them to the cabinet.
  • the locks can be placed anywhere on the doors and the cabinet. When the doors are locked, the access to the interior portion of the cabinet is restricted.
  • the front door of the first enclosures includes a see-through window.
  • the see-through window allows a user to view the monitor's screen.
  • the second enclosure includes a drawer that slides out.
  • the drawer accommodates the keyboard and mouse.
  • the drawer can be locked to the cabinet using a lock.
  • the computer cabinet can be manufactured from steel, metal, plastic, or any other material that can provide enough security to substantially prevent theft of computer components contained inside.
  • the computer cabinet can be manufactured from heavy steel or other metal to prevent it from being easily rolled away by unauthorized persons.
  • the front's see-through window can be manufactured from thick plastic, glass, or other material. It allows a user to observe the monitor's screen and prevents breaking the glass to steal or damage the monitor.
  • FIGS. 1-11 describe the present invention in more detail. However, it should be understood by one having ordinary skill in the relevant art, the present invention is not limited to the embodiments shown.
  • FIG. 1 is a front view of an exemplary embodiment of a mobile computer security cabinet 100 .
  • the cabinet 100 includes an outer shell 130 that encloses a top enclosure 102 , a middle enclosure 104 , a bottom enclosure 106 , and at least one wheels assembly 108 .
  • the middle enclosure 104 is coupled or spaced between the top enclosure 102 and the bottom enclosure 106 . Further, at least one wheels assembly 108 is coupled to the bottom enclosure 106 .
  • the cabinet 100 further includes a top 111 , a bottom 113 , a first side 115 , a second side 117 , and a front 119 .
  • the top 111 , a portion of the first side 115 , a portion of the second side 117 and a portion of the front 119 enclose the top enclosure 102 .
  • the bottom 113 , a further portion of the first side 115 , further portion of the second side 117 , and further portion of the front 119 enclose the bottom enclosure 106 .
  • the middle enclosure 104 is enclosed by a yet further portion of the front 119 , yet further portion of the first side 115 , yet further portion of the second side 117 , the top enclosure 102 and the bottom enclosure 106 .
  • the wheels assembly 108 is attached to the bottom 113 of the cabinet 100 , as shown in FIG. 1 .
  • the wheels assembly 108 can include a wheel holder attached to the bottom 113 , a wheel rod attached to the wheel holder, and a wheel secured to the wheel holder and the wheel rod.
  • a wheel holder attached to the bottom 113
  • a wheel rod attached to the wheel holder
  • a wheel secured to the wheel holder and the wheel rod As can be understood by one having ordinary skill in the relevant art, other configurations of the wheel assembly 108 are possible.
  • the top enclosure 102 further includes a top door 110 .
  • the top door 110 further includes a window 122 and a locking mechanism 116 .
  • the top door 110 is coupled to the second side 117 and has the locking mechanism 116 interacting with a locking mechanism attached to the first side 115 (not shown in FIG. 1 ).
  • the top door 110 is hinged to the second side 117 .
  • other ways of coupling the top door 110 to the second side 117 are possible.
  • the window 122 is placed in a center portion of the top door 110 . It is sized so that when a computer monitor is placed in an interior cavity of the top enclosure 102 , the monitor's screen is visible through the window 122 .
  • the window 122 may be manufactured from a break-resistant glass, bullet proof glass or any other material capable of providing any level of security.
  • the bottom enclosure 106 includes a bottom door 114 and a locking mechanism 118 .
  • the bottom door 114 is coupled to the second side 117 and has the locking mechanism 118 interacting with a locking mechanism attached to the first side 115 (not shown in FIG. 1 ).
  • the bottom door 114 is hinged to the second side 117 .
  • other ways of coupling the bottom door 110 to the second side 117 are possible.
  • the middle enclosure 104 includes a middle door 112 and a locking mechanism 120 .
  • the middle door 112 is sized to fit between the top door 110 and the bottom door 114 .
  • the middle door 112 can be attached to a drawer that fits inside the middle enclosure 104 .
  • the middle door 112 is hinged to the one of the first or second sides 115 , 117 , respectively.
  • the locking mechanism 120 is placed in a center portion of the middle door 112 .
  • the locking mechanism 120 interacts with a locking mechanism attached to the interior of the middle enclosure 104 .
  • the locking mechanism 120 can be attached to the first or second sides 115 , 117 , respectively.
  • FIG. 2 is a rear view of the mobile computer security cabinet 100 shown in FIG. 1 .
  • the cabinet 100 includes a back 221 .
  • the back 221 is enclosed by the top 111 , the bottom 113 and the first and second sides 115 , 117 .
  • the back 221 further includes the back top door 225 and the back bottom door 231 .
  • the back top door 225 further includes a locking mechanism 227 .
  • the back top door 225 hinges to the first side 115 of the cabinet 100 .
  • the locking mechanism 227 interacts with a corresponding locking mechanism located in the interior portion of the top 102 and attached to the second side 117 .
  • the middle portion 104 is sealed off in the back 221 , as shown in FIG. 2 . This prevents any access to the interior of the middle enclosure 104 from the back 221 .
  • a door may be attached allowing access to the interior of the middle enclosure 104 .
  • the back bottom door 231 is hinged to the first side 115 of the cabinet 100 .
  • the back bottom door 231 further includes a locking mechanism 229 .
  • the locking mechanism 229 interacts with a corresponding locking mechanism attached to the second side 117 in the interior of the bottom 106 .
  • the back 221 of the cabinet 100 further includes wheel assemblies 108 ( c, d ).
  • the wheel assemblies 108 can be stationary support structures, thus, preventing roll of the cabinet.
  • FIG. 3 is a side view of the mobile computer security cabinet 100 having the top front door 110 and the middle section 112 open.
  • FIG. 3 illustrates second side 117 of the computer cabinet 100 .
  • the second side 117 includes top air openings 304 located in the top enclosure 102 and bottom air openings 306 located in the bottom enclosure 106 . These openings allow air circulation inside the cabinet 100 and cool off the computer components placed inside.
  • the first side 115 can include similar air openings (not shown in FIG. 3 ).
  • the middle enclosure 104 includes a drawer 302 .
  • the drawer 302 slides out of an interior portion 310 of the middle enclosure 104 .
  • the drawer 302 can use conventional sliding mechanisms used for drawers of this type.
  • the interior portion 310 is shown in dashed lines in FIG. 3 .
  • FIG. 3 illustrates a channel 381 (shown by the dashed lines) that is defined by openings 361 and 362 .
  • the opening 361 is made in the top enclosure 102 's bottom and the middle enclosure 104 's top.
  • the opening 362 is made in the middle enclosure 104 's bottom and the bottom enclosure 106 's top. Other openings can be made in the enclosures.
  • the channel 381 along with the openings 261 accommodates computer wires connecting computer equipment contained within the cabinet. As can be understood by one having ordinary skill in the art, the openings can have different shapes, sizes and locations.
  • the channel 361 can extend to the bottom of the bottom enclosure 106 .
  • the bottom enclosure 106 can include another opening 363 made in the bottom 113 .
  • the opening 363 can have a different size, shape, and location.
  • the drawer 302 can be partial length of the middle enclosure 104 (as shown in FIG. 3 by the dashed lines 371 ). In an alternate embodiment, drawer 302 can be a full length of the middle enclosure 104 .
  • FIG. 4 is back view of a mobile computer security cabinet 400 , according to another embodiment of the present invention.
  • the cabinet 400 includes back 421 that is coupled to the top 111 , bottom 113 , and first and second sides 115 , 117 , respectively.
  • the back 421 further includes a back door 401 having a locking mechanism 402 .
  • the back door 401 hinges to the first side 115 .
  • the locking mechanism 402 interacts with a locking mechanism (not shown in FIG. 4 ) attached to the second side 117 in the interior portion of the cabinet 100 .
  • FIG. 5 illustrates the front 119 of the mobile computer security cabinet, with the top front door 110 open.
  • FIG. 5 further illustrates computer 501 being placed in an interior cavity 510 of the top enclosure 102 .
  • the computer 501 (or just a computer monitor) can be placed on a shelf, contained within the interior portion 510 of the computer cabinet 100 .
  • the shelf can be stationary or configured to slide out of the cabinet top enclosure's interior cavity 510 .
  • the computer 501 can be placed on a divider 520 that divides the top enclosure 102 and the middle enclosure 104 .
  • the interior portion 510 is defined by the top 111 , portions of first and second side 115 , 117 , respectively, a portion of the back 221 (not shown) and top of the middle enclosure of the 104 .
  • the door 110 is coupled to the first side 115 using two hinges 503 and 505 . As can be understood by one having ordinary skill in the relevant art at least one hinge can be used to attach the door 110 to the first side 115 .
  • the door 110 also includes a locking mechanism 516 , which interacts with a locking mechanism 507 coupled to the second side 117 .
  • the locking mechanisms 507 and 516 can be a male and a female part of a single lock. A key would be used to secure the two locking mechanisms together to lock the top enclosure 102 .
  • the locking mechanisms 507 and 516 can be oppositely charged magnets, electronic locks, combination safe locks, or any other locking structures capable of preventing unauthorized access to the interior portion 510 of the top enclosure 102 when locked.
  • the locking mechanisms 507 and 516 can be attached to the first side 115 or the top 111 or the section where the middle enclosure 104 contacts the top enclosure 102 .
  • the hinges 503 and 505 can be attached in a similar fashion.
  • FIG. 10 illustrates an alternate embodiment of the computer cabinet 100 having the door 110 attached to the top enclosure 102 using a sliding mechanism 1010 .
  • the door 110 slides in and out of the interior of the top enclosure 102 .
  • the sliding mechanism 1010 can be attached to the top 111 , sides 115 and 117 , and at the junction of the top enclosure 102 and middle enclosure 104 .
  • FIG. 10 illustrates the sliding mechanism 1010 attached to the top 111 .
  • FIG. 10 illustrates the top enclosure 102 of the mobile computer security 100 .
  • the top portion includes the sliding mechanism 1010 , which further includes door 110 attachment hinges 1012 ( a, b ), rollers 1014 ( a, b, c, d ), and rails 1016 ( a, b ).
  • the door 110 attachment hinges 1012 ( a, b ), rollers 1014 ( a, b, c, d ), and rails 1016 ( a, b ) are attached adjacent the top 111 and in the interior of the top enclosure 102 of the computer cabinet 100 .
  • the door 110 attachment hinges 1012 ( a, b ), rollers 1014 ( a, b, c, d ), and rails 1016 ( a, b ) can be attached adjacent sides 115 , 117 or the junction of the top and middle enclosures 102 , 104 , respectively. Further, the door 110 attachment hinges 1012 ( a, b ), rollers 1014 ( a, b, c, d ), and rails 1016 ( a, b ) can be attached outside the interior of the top enclosure 102 and adjacent either top 111 , side 115 , side 117 , or junction of the top and middle enclosures.
  • a user pulls the bottom of the door 110 in an upward direction (or downward, or rightward, or leftward, depending on the arrangement of the sliding mechanism 1010 ), as shown in the upper portion of FIG. 10 . Then, the user slides the door 110 on the rollers 1016 ( a, b, c, d ) to place the door on rails 1014 ( a, b ).
  • the door 110 can have sliding mechanisms that can mate with the rollers 1016 and rails 1014 to allow the door 110 smoothly slide inside the interior of the top enclosure 102 . The user then can push the door 110 into the interior of the top enclosure 102 , so that the door 110 is substantially parallel to the top 111 , as illustrated in the bottom portion of FIG. 10 .
  • the door 110 can be a single piece panel, as shown in FIGS. 1-10 , or it can be composed of several sections to assist in placement of the door inside the interior of the top compartment 102 .
  • similar mechanisms can be arranged for the back of the top enclosure 102 , as well as, the bottom enclosure 106 's front and back.
  • the sliding mechanism 101 can be substituted with any other conventional mechanism.
  • FIG. 6 is a front view of the mobile computer security cabinet 100 with a bottom front door 114 being open. When the door 114 is open, an interior portion 610 of the bottom enclosure 106 is exposed. The interior portion 610 is defined by the portions of first and second sides 115 , 117 , respectively, the bottom 113 , a portion of the back 221 (not shown) and a bottom portion of the middle enclosure 104 .
  • FIG. 6 further illustrates computer components 601 being placed in the interior cavity 610 of the bottom enclosure 106 .
  • the computer components 601 are placed on a shelf 621 , contained within the interior portion 610 of the computer cabinet 100 .
  • the computer components 601 can be placed on a slidable shelf (not shown). In an embodiment, the shelf slides out from the interior portion 610 , when the door 114 is open.
  • the door 114 is coupled to the first side 115 using hinges 623 and 625 . As can be understood by one having ordinary skill in the relevant art at least one hinge can be used to attach the door 114 to the first side 115 .
  • the door 114 also includes a locking mechanism 618 , which interacts with a locking mechanism 620 coupled to the second side 117 .
  • the locking mechanisms 618 and 620 can be a male and a female part of a single lock. A key would be used to secure the two locking mechanisms together to lock the bottom enclosure 106 .
  • the locking mechanisms 618 and 620 can be oppositely charged magnets, electronic locks, combination safe locks, or any other locking mechanisms capable of preventing unauthorized access to the interior portion 610 of the bottom enclosure 106 , when locked.
  • locking mechanisms 618 and 620 can be attached to the first side 115 or the bottom 113 or the section where the middle enclosure 104 contacts the bottom enclosure 106 .
  • the hinges 623 and 625 can be attached in a similar fashion.
  • FIG. 7 is a top view of the computer cabinet 100 that illustrates the drawer 302 being open and exposing interior portion 701 of the middle enclosure 104 .
  • the middle enclosure 104 contains a keyboard 710 and/or a mouse (mouse is not shown in FIG. 7 ).
  • the keyboard 710 is placed on a bottom 703 of the drawer's 302 's interior portion 701 .
  • the drawer 302 further includes a first locking mechanism 740 that interacts with a second locking mechanism 750 coupled to the interior 310 (not shown in FIG. 7 , but refer to FIG. 3 for illustration) of the middle enclosure 104 .
  • the locking mechanisms 740 and 750 can be a male and a female part of a single lock. A key would be used to secure the two locking mechanisms together to lock the middle enclosure 104 .
  • the locking mechanisms 740 and 750 can be oppositely charged magnets, electronic locks, combination safe locks, or any other locking structures capable of preventing unauthorized access to the interior portion 310 of the middle enclosure 104 when locked.
  • FIG. 11 illustrates an alternate embodiment of the interior of the middle enclosure 104 .
  • the interior of the middle enclosure 104 can include a keyboard tray 1110 and a mouse tray 1120 .
  • the keyboard tray 1110 can be used for placement of keyboard 710 .
  • the mouse tray 1120 can be used for placement of a mouse 1122 .
  • the trays 1110 and 1120 can be attached anywhere in the interior 701 of the middle enclosure 104 , including sides and bottom of the enclosure 104 . Further, the trays can be elevated or placed on top of the bottom of the enclosure. In an embodiment, the mouse tray 1120 can be placed to the left of the keyboard tray 1110 . As can be understood by one having ordinary skill in the relevant art, other trays can be placed in the interior 701 of the middle enclosure 104 .
  • FIG. 8 is another exemplary embodiment of a mobile computer security cabinet 800 .
  • the cabinet 800 is capable of accommodating two computers.
  • the cabinet 800 includes a top 811 , a bottom 813 , a front 819 , a first side 815 , a second side 817 , and a back (not shown in FIG. 8 ).
  • the top 811 , bottom 813 , front 819 , back, and the first and second sides 813 , 815 form a top enclosure 802 , a middle enclosure 804 , and a bottom enclosure 806 .
  • the middle enclosure 804 is spaced between the top enclosure 802 and the bottom enclosure 806 .
  • the cabinet 800 also includes a set of wheel assemblies 808 coupled to the bottom 813 .
  • the top enclosure 802 includes two interior portions subdivided by a top plate 831 .
  • the bottom enclosure 806 includes two interior portions subdivided by a bottom plate 832 .
  • the middle enclosure 804 also can be subdivided by a plate.
  • FIG. 8 illustrates an undivided middle enclosure 804 .
  • the top enclosure 802 can have an undivided interior portion.
  • the bottom enclosure 804 can have an undivided interior portion as well.
  • the front portion of the top enclosure 802 includes two top front doors 810 a and 810 b covering the two sections of the top enclosure 802 .
  • Each top front door 810 ( a, b ) includes a corresponding locking mechanism 816 ( a, b ) and a corresponding window 822 ( a, b ).
  • the middle enclosure 802 includes a locking mechanism 820 .
  • the locking mechanism 820 interacts with a corresponding locking mechanism coupled to the interior of the middle enclosure 802 (not shown in FIG. 8 ).
  • the front portion of the bottom enclosure 806 includes two bottom front doors 814 a and 814 b covering the two sections of the bottom enclosure 806 .
  • Each bottom front door 814 ( a, b ) includes a corresponding locking mechanism 818 ( a, b ).
  • the cabinet 800 can also include a channel or channels similar to the channel 361 , shown in FIG. 3 .
  • the channel(s) includes a plurality of openings made in the top enclosure 802 , middle enclosure 804 , and bottom enclosure 806 .
  • the openings allow wires, connecting the computer equipment, to pass through them between the enclosures.
  • the channel(s) can extend to the bottom of the bottom enclosure 806 , i.e., an opening can be made in the bottom enclosure's bottom to accommodate wires going outside the cabinet 800 .
  • FIG. 9 shows yet another embodiment of the computer security cabinet 900 .
  • the computer cabinet 900 is similar to the computer cabinet 100 with the exception of the bottom enclosure 106 's doors.
  • the bottom enclosure 106 of the cabinet 900 includes two bottom doors 951 and 952 .
  • the doors are separated by a divider 960 .
  • the doors 951 and 952 further include locking mechanisms 955 and 956 , respectively.
  • the locking mechanisms 955 and 956 interact with respective locking mechanisms attached to the divider 960 in the interior portion of the bottom enclosure 106 .
  • doors 951 and 952 are possible. Further any number of doors can be used in the top, bottom and/or middle enclosures whether in the front or the back of the mobile computer security cabinet. Further, the computer cabinet is not limited to the size and shape shown in FIGS. 1-9 .
  • a front door in the top enclosure would be opened (and unlocked, if previously locked) and a monitor and/or CPU would be placed. Wires from the monitor and/or CPU would be running in the back of the monitor and/or CPU.
  • the drawer in the middle enclosure can be slid out to expose the interior cavity and a keyboard/mouse would be placed in it. The wires from the keyboard/mouse would run in the back.
  • a front door of the bottom enclosure would be opened and various computer equipment would be placed inside.
  • a user would then access the interior cavities of the enclosures from the back by opening the back doors of the cabinet and connecting the computer equipment. Then, the cabinet doors would be locked.
  • the middle enclosure's drawer can also be locked, thus, preventing access to the keyboard. However, the drawer can remain open if entry of date is desired.
  • the above computer equipment can be placed into the cabinet at a first location. Then, the cabinet can be rolled to a second location and connected to other equipment. A user can observe the monitor of the computer equipment through the see-through window placed in the top enclosure.

Abstract

A mobile computer security cabinet configured to prevent theft of computer equipment and includes a monitor enclosure that contains a computer monitor, allows viewing the monitor without accessing it, and prevents unauthorized entry; a central processing unit (“CPU”) enclosure that contains CPU, printer and other computer related equipment and prevents unauthorized entry; a keyboard enclosure coupled to the monitor and CPU enclosure and prevents unauthorized entry; and a wheel assembly coupled to the CPU enclosure. The keyboard enclosure further includes a drawer, which slides out of the keyboard enclosure and exposes an interior portion of the keyboard enclosure without providing access to the monitor and CPU enclosures.

Description

    FIELD OF THE INVENTION
  • The present invention generally relates to a field of theft prevention of office equipment. Specifically, the present invention relates to a mobile computer security cabinet that is designed to prevent theft of computers or components of computers.
  • In today's world, computers are an essential part of almost every business. Computers control, manage, operate, and assist individuals in many different tasks. For example, computers assist in generating a marketing analysis, monitoring readout signals, displaying results of analysis, allowing individuals to modify operations of other machines. A lot of times, computers are left unattended by their operators and are subject to theft. Theft may happen anywhere, including, offices, factories, homes, and other facilities. For example, a computer, controlling or monitoring operation of a conveyer belt on a factory floor, may be subject to being stolen by an unauthorized intruder. Theft results in additional expenditures in connection with replacement of the computer equipment. More importantly, computer theft often results in a loss of valuable data that may be difficult or impossible to replace.
  • Current computer security systems are designed to tie computer components to a wall, a floor, or other immovable object. However, such systems can be easily circumvented. Further, computer equipment can be vandalized. Other security systems provide safe-like systems, where the entire computer equipment is locked away. Even though this prevents theft it also denies any access to the equipment until locked.
  • Therefore, there is a need for a mobile computer security system capable of providing mobility yet substantially total security for the computer equipment, allowing partial view of the equipment and partial access to the equipment when necessary. The present invention provides a solution to the above problem.
  • SUMMARY OF THE INVENTION
  • The present invention relates to a mobile computer security cabinet designed to prevent full access to computer equipment contained in its interior portion. At the same time, the cabinet allows authorized partial and/or total access from its front and/or back. The cabinet also allows monitoring of the computer equipment without accessing it. Further, the computer cabinet provides mobility for the computer equipment.
  • In an embodiment, the mobile computer security cabinet includes a monitor enclosure configured to contain monitor computer equipment and having doors in the front and back of the cabinet. The cabinet also includes a central processing unit (“CPU”) or a computer equipment enclosure configured to contain a CPU, a printer and other computer related equipment. The enclosure also includes doors in the front and back of the cabinet. The cabinet also includes a keyboard and/or mouse enclosure spaced between the monitor enclosure and the CPU enclosure. The keyboard enclosure further includes a drawer, which slides out of the keyboard enclosure and exposes its interior portion without providing access to the monitor and the CPU enclosures. The monitor enclosure further includes a see-through window placed in its front door to allow a user to view the monitor without opening the door. The three enclosures communicate with each other through a channel. The channel is composed of a plurality of openings made in the enclosures. Wires connecting the computer equipment can pass through the channel. The cabinet also includes at least one wheel assembly coupled to the CPU enclosure, hence, providing mobility to the cabinet.
  • Further features and advantages of the invention, as well as structure and operation of various embodiments of the invention, are disclosed in detail below will reference to the accompanying drawings.
  • BRIEF DESCRIPTION OF THE FIGURES
  • The present invention is described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left-most digit(s) of a reference number identifies the drawing in which the reference number first appears.
  • FIG. 1 is a front view of an exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 2 is a rear view of an exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 3 is a side view of an exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 4 is a rear view of another exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 5 is a front view of an exemplary mobile computer security cabinet exposing an interior portion of the cabinet's top enclosure, according to the present invention.
  • FIG. 6 is a front view of an exemplary mobile computer security cabinet exposing an interior portion of the cabinet's bottom enclosure, according to the present invention.
  • FIG. 7 is a top view of an exemplary mobile computer security cabinet exposing an interior portion of the cabinet's middle enclosure, according to the present invention.
  • FIG. 8 is a front view of another exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 9 is a front view of yet another exemplary mobile computer security cabinet, according to the present invention.
  • FIG. 10 illustrates an exemplary embodiment of the mobile computer security cabinet, according to the present invention.
  • FIG. 11 illustrates another exemplary embodiment of the mobile computer security cabinet exposing an interior portion of the cabinet's middle enclosure, according to the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention is a mobile computer security cabinet. The computer cabinet includes three enclosures. The enclosures accommodate a computer or other computer related equipment and paraphernalia. A first enclosure accommodates a monitor. A second enclosure accommodates keyboard and a mouse. A third enclosure accommodates a central processing unit, printer, computer manuals, and other things. The second enclosure is spaced between the first and the third enclosures. The three enclosures communicate with each other using a channel composed of a plurality of openings made in interior portions of the three enclosures. Wires connecting the computer equipment can be placed in the channel. Such arrangement provides greater security to the computer equipment placed in the cabinet. In an alternate embodiment, the enclosures can be designed so that one enclosure can be accessed through another. This arrangement provides lesser security and may be suitable for locations where maximum security of computer equipment is not absolutely necessary.
  • The first and third enclosures include doors in the front and back of the cabinet. The doors are attached to the cabinet using hinges, clips, or other methods. Locks are placed on the doors to further secured them to the cabinet. The locks can be placed anywhere on the doors and the cabinet. When the doors are locked, the access to the interior portion of the cabinet is restricted.
  • The front door of the first enclosures includes a see-through window. The see-through window allows a user to view the monitor's screen.
  • The second enclosure includes a drawer that slides out. The drawer accommodates the keyboard and mouse. The drawer can be locked to the cabinet using a lock.
  • The computer cabinet can be manufactured from steel, metal, plastic, or any other material that can provide enough security to substantially prevent theft of computer components contained inside. In an embodiment, the computer cabinet can be manufactured from heavy steel or other metal to prevent it from being easily rolled away by unauthorized persons. The front's see-through window can be manufactured from thick plastic, glass, or other material. It allows a user to observe the monitor's screen and prevents breaking the glass to steal or damage the monitor. FIGS. 1-11 describe the present invention in more detail. However, it should be understood by one having ordinary skill in the relevant art, the present invention is not limited to the embodiments shown.
  • FIG. 1 is a front view of an exemplary embodiment of a mobile computer security cabinet 100. The cabinet 100 includes an outer shell 130 that encloses a top enclosure 102, a middle enclosure 104, a bottom enclosure 106, and at least one wheels assembly 108. The middle enclosure 104 is coupled or spaced between the top enclosure 102 and the bottom enclosure 106. Further, at least one wheels assembly 108 is coupled to the bottom enclosure 106.
  • The cabinet 100 further includes a top 111, a bottom 113, a first side 115, a second side 117, and a front 119. The top 111, a portion of the first side 115, a portion of the second side 117 and a portion of the front 119 enclose the top enclosure 102. The bottom 113, a further portion of the first side 115, further portion of the second side 117, and further portion of the front 119 enclose the bottom enclosure 106. The middle enclosure 104 is enclosed by a yet further portion of the front 119, yet further portion of the first side 115, yet further portion of the second side 117, the top enclosure 102 and the bottom enclosure 106.
  • The wheels assembly 108 is attached to the bottom 113 of the cabinet 100, as shown in FIG. 1. The wheels assembly 108 can include a wheel holder attached to the bottom 113, a wheel rod attached to the wheel holder, and a wheel secured to the wheel holder and the wheel rod. As can be understood by one having ordinary skill in the relevant art, other configurations of the wheel assembly 108 are possible.
  • The top enclosure 102 further includes a top door 110. The top door 110 further includes a window 122 and a locking mechanism 116. As shown in FIG. 1, the top door 110 is coupled to the second side 117 and has the locking mechanism 116 interacting with a locking mechanism attached to the first side 115 (not shown in FIG. 1). In an embodiment, the top door 110 is hinged to the second side 117. As can be understood by one having ordinary skill in the relevant art, other ways of coupling the top door 110 to the second side 117 are possible.
  • The window 122 is placed in a center portion of the top door 110. It is sized so that when a computer monitor is placed in an interior cavity of the top enclosure 102, the monitor's screen is visible through the window 122. The window 122 may be manufactured from a break-resistant glass, bullet proof glass or any other material capable of providing any level of security.
  • The bottom enclosure 106 includes a bottom door 114 and a locking mechanism 118. The bottom door 114 is coupled to the second side 117 and has the locking mechanism 118 interacting with a locking mechanism attached to the first side 115 (not shown in FIG. 1). In an embodiment, the bottom door 114 is hinged to the second side 117. As can be understood by one having ordinary skill in the relevant art, other ways of coupling the bottom door 110 to the second side 117 are possible.
  • The middle enclosure 104 includes a middle door 112 and a locking mechanism 120. The middle door 112 is sized to fit between the top door 110 and the bottom door 114. In an embodiment, the middle door 112 can be attached to a drawer that fits inside the middle enclosure 104. In an alternate embodiment, the middle door 112 is hinged to the one of the first or second sides 115, 117, respectively. As shown in FIG. 1, the locking mechanism 120 is placed in a center portion of the middle door 112. The locking mechanism 120 interacts with a locking mechanism attached to the interior of the middle enclosure 104. In an alternate embodiment, the locking mechanism 120 can be attached to the first or second sides 115, 117, respectively.
  • FIG. 2 is a rear view of the mobile computer security cabinet 100 shown in FIG. 1. In addition to the top 111, the bottom 113, the first side 115, the second side 117, and the front 119 (not shown in FIG. 2), the cabinet 100 includes a back 221. As shown in FIG. 2, the back 221 is enclosed by the top 111, the bottom 113 and the first and second sides 115, 117. The back 221 further includes the back top door 225 and the back bottom door 231.
  • The back top door 225 further includes a locking mechanism 227. In an embodiment, the back top door 225 hinges to the first side 115 of the cabinet 100. Then, the locking mechanism 227 interacts with a corresponding locking mechanism located in the interior portion of the top 102 and attached to the second side 117.
  • In an embodiment, the middle portion 104 is sealed off in the back 221, as shown in FIG. 2. This prevents any access to the interior of the middle enclosure 104 from the back 221. In an alternate embodiment, a door may be attached allowing access to the interior of the middle enclosure 104.
  • Similar to the back top door 225, the back bottom door 231 is hinged to the first side 115 of the cabinet 100. The back bottom door 231 further includes a locking mechanism 229. In an embodiment, the locking mechanism 229 interacts with a corresponding locking mechanism attached to the second side 117 in the interior of the bottom 106.
  • The back 221 of the cabinet 100 further includes wheel assemblies 108(c, d). In an embodiment, the wheel assemblies 108 can be stationary support structures, thus, preventing roll of the cabinet.
  • FIG. 3 is a side view of the mobile computer security cabinet 100 having the top front door 110 and the middle section 112 open. FIG. 3 illustrates second side 117 of the computer cabinet 100. In an embodiment, the second side 117 includes top air openings 304 located in the top enclosure 102 and bottom air openings 306 located in the bottom enclosure 106. These openings allow air circulation inside the cabinet 100 and cool off the computer components placed inside. The first side 115 can include similar air openings (not shown in FIG. 3).
  • The middle enclosure 104 includes a drawer 302. The drawer 302 slides out of an interior portion 310 of the middle enclosure 104. The drawer 302 can use conventional sliding mechanisms used for drawers of this type. The interior portion 310 is shown in dashed lines in FIG. 3.
  • FIG. 3 illustrates a channel 381 (shown by the dashed lines) that is defined by openings 361 and 362. The opening 361 is made in the top enclosure 102's bottom and the middle enclosure 104's top. The opening 362 is made in the middle enclosure 104's bottom and the bottom enclosure 106's top. Other openings can be made in the enclosures. The channel 381 along with the openings 261 accommodates computer wires connecting computer equipment contained within the cabinet. As can be understood by one having ordinary skill in the art, the openings can have different shapes, sizes and locations. The channel 361 can extend to the bottom of the bottom enclosure 106. As shown in FIG. 3, the bottom enclosure 106 can include another opening 363 made in the bottom 113. As can be understood by one having ordinary skill in the art, the opening 363 can have a different size, shape, and location.
  • In an embodiment, the drawer 302 can be partial length of the middle enclosure 104 (as shown in FIG. 3 by the dashed lines 371). In an alternate embodiment, drawer 302 can be a full length of the middle enclosure 104.
  • FIG. 4 is back view of a mobile computer security cabinet 400, according to another embodiment of the present invention. The cabinet 400 includes back 421 that is coupled to the top 111, bottom 113, and first and second sides 115, 117, respectively. The back 421 further includes a back door 401 having a locking mechanism 402. Similarly to the embodiments shown in FIGS. 1-3, the back door 401 hinges to the first side 115. The locking mechanism 402 interacts with a locking mechanism (not shown in FIG. 4) attached to the second side 117 in the interior portion of the cabinet 100.
  • FIG. 5 illustrates the front 119 of the mobile computer security cabinet, with the top front door 110 open. FIG. 5 further illustrates computer 501 being placed in an interior cavity 510 of the top enclosure 102. In an embodiment, the computer 501 (or just a computer monitor) can be placed on a shelf, contained within the interior portion 510 of the computer cabinet 100. The shelf can be stationary or configured to slide out of the cabinet top enclosure's interior cavity 510. In an alternate embodiment, the computer 501 can be placed on a divider 520 that divides the top enclosure 102 and the middle enclosure 104. The interior portion 510 is defined by the top 111, portions of first and second side 115, 117, respectively, a portion of the back 221 (not shown) and top of the middle enclosure of the 104.
  • The door 110 is coupled to the first side 115 using two hinges 503 and 505. As can be understood by one having ordinary skill in the relevant art at least one hinge can be used to attach the door 110 to the first side 115. The door 110 also includes a locking mechanism 516, which interacts with a locking mechanism 507 coupled to the second side 117. In an embodiment, the locking mechanisms 507 and 516 can be a male and a female part of a single lock. A key would be used to secure the two locking mechanisms together to lock the top enclosure 102. As can be understood by one having ordinary skill in the relevant art, the locking mechanisms 507 and 516 can be oppositely charged magnets, electronic locks, combination safe locks, or any other locking structures capable of preventing unauthorized access to the interior portion 510 of the top enclosure 102 when locked.
  • Further, the locking mechanisms 507 and 516 can be attached to the first side 115 or the top 111 or the section where the middle enclosure 104 contacts the top enclosure 102. The hinges 503 and 505 can be attached in a similar fashion.
  • FIG. 10 illustrates an alternate embodiment of the computer cabinet 100 having the door 110 attached to the top enclosure 102 using a sliding mechanism 1010. The door 110 slides in and out of the interior of the top enclosure 102. As can be understood by one having ordinary skill in the relevant art, the sliding mechanism 1010 can be attached to the top 111, sides 115 and 117, and at the junction of the top enclosure 102 and middle enclosure 104. FIG. 10 illustrates the sliding mechanism 1010 attached to the top 111.
  • FIG. 10 illustrates the top enclosure 102 of the mobile computer security 100. The top portion includes the sliding mechanism 1010, which further includes door 110 attachment hinges 1012(a, b), rollers 1014(a, b, c, d), and rails 1016(a, b). The door 110 attachment hinges 1012(a, b), rollers 1014(a, b, c, d), and rails 1016(a, b) are attached adjacent the top 111 and in the interior of the top enclosure 102 of the computer cabinet 100. As can be understood by one having ordinary skill in the relevant art the door 110 attachment hinges 1012(a, b), rollers 1014(a, b, c, d), and rails 1016(a, b) can be attached adjacent sides 115, 117 or the junction of the top and middle enclosures 102, 104, respectively. Further, the door 110 attachment hinges 1012(a, b), rollers 1014(a, b, c, d), and rails 1016(a, b) can be attached outside the interior of the top enclosure 102 and adjacent either top 111, side 115, side 117, or junction of the top and middle enclosures.
  • To open the door 110 and expose the interior of the top enclosure 102, a user pulls the bottom of the door 110 in an upward direction (or downward, or rightward, or leftward, depending on the arrangement of the sliding mechanism 1010), as shown in the upper portion of FIG. 10. Then, the user slides the door 110 on the rollers 1016(a, b, c, d) to place the door on rails 1014(a, b). The door 110 can have sliding mechanisms that can mate with the rollers 1016 and rails 1014 to allow the door 110 smoothly slide inside the interior of the top enclosure 102. The user then can push the door 110 into the interior of the top enclosure 102, so that the door 110 is substantially parallel to the top 111, as illustrated in the bottom portion of FIG. 10.
  • To remove the door from, the user repeats the above steps in reverse. In other words, the user pulls on the door 110 to slide it out of the interior of the top enclosure 102 and lower it to close the interior. As can be understood by one having ordinary skill in the relevant art, the door 110 can be a single piece panel, as shown in FIGS. 1-10, or it can be composed of several sections to assist in placement of the door inside the interior of the top compartment 102. Further, similar mechanisms can be arranged for the back of the top enclosure 102, as well as, the bottom enclosure 106's front and back. Also, the sliding mechanism 101 can be substituted with any other conventional mechanism.
  • FIG. 6 is a front view of the mobile computer security cabinet 100 with a bottom front door 114 being open. When the door 114 is open, an interior portion 610 of the bottom enclosure 106 is exposed. The interior portion 610 is defined by the portions of first and second sides 115, 117, respectively, the bottom 113, a portion of the back 221 (not shown) and a bottom portion of the middle enclosure 104.
  • FIG. 6 further illustrates computer components 601 being placed in the interior cavity 610 of the bottom enclosure 106. In an embodiment, the computer components 601 are placed on a shelf 621, contained within the interior portion 610 of the computer cabinet 100. In an alternate embodiment, the computer components 601 can be placed on a slidable shelf (not shown). In an embodiment, the shelf slides out from the interior portion 610, when the door 114 is open.
  • The door 114 is coupled to the first side 115 using hinges 623 and 625. As can be understood by one having ordinary skill in the relevant art at least one hinge can be used to attach the door 114 to the first side 115. The door 114 also includes a locking mechanism 618, which interacts with a locking mechanism 620 coupled to the second side 117. In an embodiment, the locking mechanisms 618 and 620 can be a male and a female part of a single lock. A key would be used to secure the two locking mechanisms together to lock the bottom enclosure 106. As can be understood by one having ordinary skill in the relevant art, the locking mechanisms 618 and 620 can be oppositely charged magnets, electronic locks, combination safe locks, or any other locking mechanisms capable of preventing unauthorized access to the interior portion 610 of the bottom enclosure 106, when locked.
  • Further, the locking mechanisms 618 and 620 can be attached to the first side 115 or the bottom 113 or the section where the middle enclosure 104 contacts the bottom enclosure 106. The hinges 623 and 625 can be attached in a similar fashion.
  • FIG. 7 is a top view of the computer cabinet 100 that illustrates the drawer 302 being open and exposing interior portion 701 of the middle enclosure 104. As stated above, the middle enclosure 104 contains a keyboard 710 and/or a mouse (mouse is not shown in FIG. 7). The keyboard 710 is placed on a bottom 703 of the drawer's 302's interior portion 701. The drawer 302 further includes a first locking mechanism 740 that interacts with a second locking mechanism 750 coupled to the interior 310 (not shown in FIG. 7, but refer to FIG. 3 for illustration) of the middle enclosure 104.
  • Similarly to the top and bottom enclosures 102, 106, in an embodiment, the locking mechanisms 740 and 750 can be a male and a female part of a single lock. A key would be used to secure the two locking mechanisms together to lock the middle enclosure 104. As can be understood by one having ordinary skill in the relevant art, the locking mechanisms 740 and 750 can be oppositely charged magnets, electronic locks, combination safe locks, or any other locking structures capable of preventing unauthorized access to the interior portion 310 of the middle enclosure 104 when locked.
  • FIG. 11 illustrates an alternate embodiment of the interior of the middle enclosure 104. The interior of the middle enclosure 104 can include a keyboard tray 1110 and a mouse tray 1120. The keyboard tray 1110 can be used for placement of keyboard 710. The mouse tray 1120 can be used for placement of a mouse 1122. The trays 1110 and 1120 can be attached anywhere in the interior 701 of the middle enclosure 104, including sides and bottom of the enclosure 104. Further, the trays can be elevated or placed on top of the bottom of the enclosure. In an embodiment, the mouse tray 1120 can be placed to the left of the keyboard tray 1110. As can be understood by one having ordinary skill in the relevant art, other trays can be placed in the interior 701 of the middle enclosure 104.
  • FIG. 8 is another exemplary embodiment of a mobile computer security cabinet 800. The cabinet 800 is capable of accommodating two computers. The cabinet 800 includes a top 811, a bottom 813, a front 819, a first side 815, a second side 817, and a back (not shown in FIG. 8). The top 811, bottom 813, front 819, back, and the first and second sides 813, 815 form a top enclosure 802, a middle enclosure 804, and a bottom enclosure 806. The middle enclosure 804 is spaced between the top enclosure 802 and the bottom enclosure 806. The cabinet 800 also includes a set of wheel assemblies 808 coupled to the bottom 813.
  • The top enclosure 802 includes two interior portions subdivided by a top plate 831. Similarly, the bottom enclosure 806 includes two interior portions subdivided by a bottom plate 832. In an embodiment, the middle enclosure 804 also can be subdivided by a plate. However, FIG. 8 illustrates an undivided middle enclosure 804. Yet, in an alternate embodiment, the top enclosure 802 can have an undivided interior portion. Similarly, the bottom enclosure 804 can have an undivided interior portion as well.
  • The front portion of the top enclosure 802 includes two top front doors 810 a and 810 b covering the two sections of the top enclosure 802. Each top front door 810(a, b) includes a corresponding locking mechanism 816(a, b) and a corresponding window 822(a, b).
  • Similar to the embodiments shown in FIGS. 1-9, the middle enclosure 802 includes a locking mechanism 820. The locking mechanism 820 interacts with a corresponding locking mechanism coupled to the interior of the middle enclosure 802 (not shown in FIG. 8).
  • The front portion of the bottom enclosure 806 includes two bottom front doors 814 a and 814 b covering the two sections of the bottom enclosure 806. Each bottom front door 814(a, b) includes a corresponding locking mechanism 818(a, b).
  • The cabinet 800 can also include a channel or channels similar to the channel 361, shown in FIG. 3. The channel(s) includes a plurality of openings made in the top enclosure 802, middle enclosure 804, and bottom enclosure 806. The openings allow wires, connecting the computer equipment, to pass through them between the enclosures. The channel(s) can extend to the bottom of the bottom enclosure 806, i.e., an opening can be made in the bottom enclosure's bottom to accommodate wires going outside the cabinet 800.
  • FIG. 9 shows yet another embodiment of the computer security cabinet 900. The computer cabinet 900 is similar to the computer cabinet 100 with the exception of the bottom enclosure 106's doors. The bottom enclosure 106 of the cabinet 900 includes two bottom doors 951 and 952. The doors are separated by a divider 960. The doors 951 and 952 further include locking mechanisms 955 and 956, respectively. The locking mechanisms 955 and 956 interact with respective locking mechanisms attached to the divider 960 in the interior portion of the bottom enclosure 106.
  • As can be understood by one having ordinary skill in the relevant art, other arrangements of doors 951 and 952 are possible. Further any number of doors can be used in the top, bottom and/or middle enclosures whether in the front or the back of the mobile computer security cabinet. Further, the computer cabinet is not limited to the size and shape shown in FIGS. 1-9.
  • In order to place computer equipment into the cabinet, the user would access the cabinet from the front. A front door in the top enclosure would be opened (and unlocked, if previously locked) and a monitor and/or CPU would be placed. Wires from the monitor and/or CPU would be running in the back of the monitor and/or CPU. The drawer in the middle enclosure can be slid out to expose the interior cavity and a keyboard/mouse would be placed in it. The wires from the keyboard/mouse would run in the back. A front door of the bottom enclosure would be opened and various computer equipment would be placed inside.
  • A user would then access the interior cavities of the enclosures from the back by opening the back doors of the cabinet and connecting the computer equipment. Then, the cabinet doors would be locked. The middle enclosure's drawer can also be locked, thus, preventing access to the keyboard. However, the drawer can remain open if entry of date is desired.
  • The above computer equipment can be placed into the cabinet at a first location. Then, the cabinet can be rolled to a second location and connected to other equipment. A user can observe the monitor of the computer equipment through the see-through window placed in the top enclosure.
  • Example embodiments of the methods, and components of the present invention have been described herein. As noted elsewhere, these example embodiments have been described for illustrative purposes only, and are not limiting. Other embodiments are possible and are covered by the invention. Such embodiments will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims (28)

1. A computer security cabinet having a front, a back, sides, a top and a bottom, comprising:
a first enclosure having a first interior cavity and a top first door and a top second door enclosing said first interior cavity;
a second enclosure having a second interior cavity and a bottom first door and a bottom second door;
a middle enclosure spaced between said first and second enclosures and defining a third interior cavity;
a channel connecting said first, second and third interior cavities, wherein said channel is defined by a plurality of openings in said first, second and third interior cavities;
wherein said first top door further comprises a see-through window; and
wherein said third interior cavity further includes a drawer configured to slide out from said third interior cavity.
2. The cabinet of claim 1, wherein
said first top door further includes a lock securing said first top door in the front of the cabinet;
said second top door further includes a lock securing said second top door in the back of the cabinet;
said first bottom door further includes a lock securing said first bottom door in the front said second bottom door further includes a lock securing said second bottom door in the back of the cabinet.
3. The cabinet of claim 1, further comprising at least one wheel assembly attached to the bottom of the cabinet, wherein said at least one wheel assembly is configured to assist in moving the cabinet.
4. The cabinet of claim 1, further comprising air circulation openings in the sides of the cabinet.
5. The cabinet of claim 1, wherein said see-through window is configured to prevent access to said first interior cavity when said first top door is locked.
6. The cabinet of claim 1, wherein said first interior cavity is configured to hold a computer monitor and wherein said computer monitor is viewable through said see-through window.
7. The cabinet of claim 1, wherein said second interior cavity is configured to hold a computer's central processing unit.
8. The cabinet of claim 1, wherein said third interior cavity is configured to hold a computer keyboard.
9. The cabinet of claim 1, wherein said drawer further comprises a lock configured to lock said drawer to the cabinet.
10. The cabinet of claim 1, wherein said first enclosure further comprises two top first doors.
11. The cabinet of claim 1, wherein said top second door and said bottom second door further comprise a single door in the back of the cabinet.
12. The cabinet of claim 1, wherein said second enclosure further comprises two bottom first doors.
13. The cabinet of claim 1, said second enclosure further comprises two bottom second doors.
14. A computer security cabinet having a front, back, sides, top and a bottom, comprising:
a first enclosure including a top first door;
a second enclosure including a bottom first door;
a middle enclosure spaced between said first enclosure and said second enclosure;
a second door;
wherein said first enclosure includes a first interior cavity; said top first door and said second door enclose said first interior cavity;
wherein said second enclosure includes a second interior cavity; said bottom first door and said second door enclose said second interior cavity;
wherein said middle enclosure includes a third interior cavity that further includes a drawer configured to slide out from said third interior cavity; said second door encloses said third interior cavity in the back of the cabinet;
a channel connecting said first, second and third interior cavities, wherein said channel is defined by a plurality of openings in said first, second and third interior cavities; and
wherein said first top door further comprises a see-through window.
15. The cabinet of claim 14, wherein
said first top door further includes a lock securing said first top door in the front of the cabinet;
said first bottom door further includes a lock securing said first bottom door in the front of the cabinet; and
said second door further includes a lock securing said second door in the back of the cabinet.
16. The cabinet of claim 14, further comprising at least one wheel assembly attached to the bottom of the cabinet, wherein said at least one wheel assembly is configured to assist in moving the cabinet.
17. The cabinet of claim 14, further comprising air circulation openings in the sides of the cabinet.
18. The cabinet of claim 14, wherein said see-through window is configured to prevent access to said first interior cavity when said first top door is locked.
19. The cabinet of claim 14, wherein said first interior cavity is configured to hold a computer monitor and wherein said computer monitor is viewable through said see-through window.
20. The cabinet of claim 14, wherein said second interior cavity is configured to hold a computer's central processing unit.
21. The cabinet of claim 14, wherein said third interior cavity is configured to hold a computer keyboard.
22. The cabinet of claim 14, wherein said drawer further comprises a lock configured to lock said drawer to the cabinet.
23. A computer security cabinet, having a front and a back, configured to prevent theft of computer equipment, comprising:
a monitor enclosure having a first door and a second door and configured to contain computer monitor equipment;
wherein said first door further comprises a see-through window to allow viewing of the computer monitor equipment without accessing said computer monitor equipment;
a central processing unit (“CPU”) enclosure having a third door and a fourth door and configured to contain computer related equipment;
a keyboard enclosure spaced between said monitor enclosure and said CPU enclosure;
a channel defined by a plurality of openings in said monitor enclosure, said CPU enclosure, and said keyboard enclosure and configured to interconnect said monitor enclosure, said CPU enclosure, and said keyboard enclosure;
wherein said keyboard enclosure further comprises a drawer configured to slide out from said keyboard enclosure and expose an interior portion of said keyboard enclosure without providing access to said monitor enclosure and said CPU enclosure.
24. The cabinet of claim 23, wherein
said first door further includes a lock securing said first door in the front of the cabinet;
said second door further includes a lock securing said second door in the back of the cabinet;
said third door further includes a lock securing said third door in the front of the cabinet; and
said fourth door further includes a lock securing said fourth door in the back of the cabinet.
25. The cabinet of claim 23, further comprising at least one wheel assembly attached to the bottom of the cabinet, wherein said at least one wheel assembly is configured to assist in moving the cabinet.
26. The cabinet of claim 23, further comprising air circulation openings in the sides of the cabinet.
27. The cabinet of claim 23, wherein said see-through window is configured to prevent access to said monitor enclosure when said first door is locked.
28. The cabinet of claim 23, wherein said drawer further comprises a lock configured to lock said drawer to the cabinet.
US11/024,117 2004-12-28 2004-12-28 Mobile computer security cabinet Abandoned US20060138915A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/024,117 US20060138915A1 (en) 2004-12-28 2004-12-28 Mobile computer security cabinet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/024,117 US20060138915A1 (en) 2004-12-28 2004-12-28 Mobile computer security cabinet

Publications (1)

Publication Number Publication Date
US20060138915A1 true US20060138915A1 (en) 2006-06-29

Family

ID=36610638

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/024,117 Abandoned US20060138915A1 (en) 2004-12-28 2004-12-28 Mobile computer security cabinet

Country Status (1)

Country Link
US (1) US20060138915A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060284527A1 (en) * 2005-06-01 2006-12-21 Michael Olsen Booking station
GB2440215A (en) * 2007-03-03 2008-01-23 Dalen Ltd Security cabinet
US20080189797A1 (en) * 2007-02-07 2008-08-07 Roger Goza Computer Workstation and Method
US20080246375A1 (en) * 2007-04-03 2008-10-09 Berg Neil M Security cabinet
US20090184130A1 (en) * 2003-10-17 2009-07-23 Miller Roger K Secure merchandising system
US20100017025A1 (en) * 2003-10-17 2010-01-21 Rock-Tenn Shared Services, Llc Time delay product pushing system
WO2010144677A1 (en) * 2009-06-10 2010-12-16 Blackrock, Inc. Cooling system for a computer server cabinet in a data center
KR101099295B1 (en) 2009-11-20 2011-12-26 김창일 computer case for a working site capable of blocking an accident current and microwaves
US8353425B2 (en) 2005-04-25 2013-01-15 Rock-Tenn Shared Services, Llc Time delay product pushing system
US20130069778A1 (en) * 2005-10-25 2013-03-21 Nxstage Medical, Inc. Safety features for medical devices requiring assistance and supervision
US8485391B2 (en) 2003-10-17 2013-07-16 Rock-Tenn Shared Services, Llc Theft deterrent system
US8646650B2 (en) 2010-05-19 2014-02-11 Rock-Tenn Shared Services, Llc Product dispensing system
WO2014127400A1 (en) * 2013-02-25 2014-08-28 Securescan Global Pty Ltd Anti-ballistic barrier comprising furniture
US8910827B2 (en) 2011-05-10 2014-12-16 Rock-Tenn Shared Services, Llc Secure merchandising display with tunnel feature
US9119488B2 (en) 2009-09-25 2015-09-01 Rock-Tenn Shared Services, Llc Secure merchandising display with blocker mechanisms
US9145728B1 (en) * 2013-03-14 2015-09-29 William A. LeBlanc Electronic safe
US9310170B1 (en) * 2013-03-14 2016-04-12 Alan Basewitz Moveable furniture piece with armored panel
CN112401480A (en) * 2020-11-20 2021-02-26 江西环境工程职业学院 Distance education device for education and training
KR200494386Y1 (en) * 2021-06-01 2021-10-01 (주)유진퍼니처 3D printer storage closet

Citations (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3541256A (en) * 1967-10-16 1970-11-17 Diebold Inc Cabinet housed tv transmitter and receiver construction
US4491375A (en) * 1983-08-01 1985-01-01 Ugalde Carlos V Computer work station cabinet
US4576578A (en) * 1983-03-31 1986-03-18 Bell & Howell Company Interactive training apparatus
US4600249A (en) * 1984-10-23 1986-07-15 Omni Tech Corporation Computer security cabinet
US4636781A (en) * 1985-06-27 1987-01-13 Ncr Corporation Housing for data terminal device
US4656848A (en) * 1984-08-27 1987-04-14 Rose C David Security device for personal computers
US4685402A (en) * 1986-01-22 1987-08-11 The Shaw-Walker Company Fire resistive cabinet for storing easily damageable electronic data storage materials
US4709972A (en) * 1986-08-27 1987-12-01 Eastman Kodak Company Keyboard cabinet with sliding tray
US4768844A (en) * 1987-05-08 1988-09-06 Hauserman, Inc. Office cabinet
US4798423A (en) * 1985-11-01 1989-01-17 Lacour Incorporated Modular desk system
US4861121A (en) * 1987-10-01 1989-08-29 Lam-Wood Products Inc. Space efficient cabinet for housing a computer work station
US4865404A (en) * 1988-07-18 1989-09-12 Harpers Interlock for multi-drawer cabinet
US4938548A (en) * 1986-04-30 1990-07-03 Shure Manufacturing Corporation Modular mechanic's workstation
US4986589A (en) * 1989-08-22 1991-01-22 Leggett & Platt, Incorporated Security file cabinet
US4993784A (en) * 1988-12-07 1991-02-19 Engineered Security Products Corporation Locking device
USRE33953E (en) * 1986-11-20 1992-06-09 Filing module
US5163606A (en) * 1988-01-25 1992-11-17 Isserstedt Robert K Storage and filing device
US5199774A (en) * 1990-11-27 1993-04-06 Kimball International, Inc. Combination lock and interlock for a file cabinet
US5281018A (en) * 1992-07-29 1994-01-25 Comtec, Inc. Protective enclosure for computers in industrial environment
US5303994A (en) * 1992-06-05 1994-04-19 Steelcase Inc. Drawer interlock
US5327752A (en) * 1992-06-01 1994-07-12 Kensington Microwave Limited Computer equipment lock
US5352030A (en) * 1992-09-11 1994-10-04 Wolfgang Derle Anti-tip device
US5364178A (en) * 1992-04-23 1994-11-15 Westinghouse Electric Corporation File cabinet having a corregated inner framework construction
US5378057A (en) * 1992-05-29 1995-01-03 Westinghouse Electric Corporation Metal case
US5389919A (en) * 1990-04-05 1995-02-14 Meridian, Inc. Electronic interlock for storage assemblies with communication
US5489938A (en) * 1991-05-13 1996-02-06 Ricoh Company, Ltd. Television conference apparatus including a material picturing device
US5620133A (en) * 1988-01-25 1997-04-15 Vertago Investments Limited Storage and filing device
US5762409A (en) * 1996-08-13 1998-06-09 Rice, Jr.; Richard L. Cabinet for personal computer
US5779331A (en) * 1995-08-21 1998-07-14 Fox; Keith Thomas File management system
US5829859A (en) * 1996-10-04 1998-11-03 Planhold Corporation Bi-directional drawer system
US5913582A (en) * 1996-10-08 1999-06-22 Coonan; Gary M. Computer workstation
US6018968A (en) * 1998-10-09 2000-02-01 Sides; Kenneth W. Locking apparatus
US6082839A (en) * 1997-06-12 2000-07-04 Inaba Saisakusho Co., Ltd Drawer control for office cabinets
US6364439B1 (en) * 2000-03-31 2002-04-02 Interland, Inc. Computer storage systems for computer facilities
US20030062810A1 (en) * 2001-10-03 2003-04-03 Florian Westwinkel Modular housing
US6565163B2 (en) * 1999-04-12 2003-05-20 Inclose Design, Inc. Rack for memory storage devices
US6589308B1 (en) * 1997-02-28 2003-07-08 Angelo Gianelo Cabinet for housing a computer workstation
US20030163714A1 (en) * 1999-01-07 2003-08-28 Remedan Aps Control device for a computer and a computer comprising such a control device
US20040039920A1 (en) * 2000-10-05 2004-02-26 Jong-Hae Kim Security cabinet system for controlling with user's id data
US20040055713A1 (en) * 1999-03-16 2004-03-25 Kimmet Stephen G. Folding panel assembly
US6719386B2 (en) * 2001-05-07 2004-04-13 Knape & Vogt Manufacturing Co. Precision drawer slide with cantilevered members
US6755491B2 (en) * 2001-06-26 2004-06-29 Mcelheney Billy W. Operator interface terminal for use in a harsh environment

Patent Citations (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3541256A (en) * 1967-10-16 1970-11-17 Diebold Inc Cabinet housed tv transmitter and receiver construction
US4576578A (en) * 1983-03-31 1986-03-18 Bell & Howell Company Interactive training apparatus
US4491375A (en) * 1983-08-01 1985-01-01 Ugalde Carlos V Computer work station cabinet
US4656848A (en) * 1984-08-27 1987-04-14 Rose C David Security device for personal computers
US4600249A (en) * 1984-10-23 1986-07-15 Omni Tech Corporation Computer security cabinet
US4636781A (en) * 1985-06-27 1987-01-13 Ncr Corporation Housing for data terminal device
US4798423A (en) * 1985-11-01 1989-01-17 Lacour Incorporated Modular desk system
US4685402A (en) * 1986-01-22 1987-08-11 The Shaw-Walker Company Fire resistive cabinet for storing easily damageable electronic data storage materials
US4938548A (en) * 1986-04-30 1990-07-03 Shure Manufacturing Corporation Modular mechanic's workstation
US4709972A (en) * 1986-08-27 1987-12-01 Eastman Kodak Company Keyboard cabinet with sliding tray
USRE33953E (en) * 1986-11-20 1992-06-09 Filing module
US4768844A (en) * 1987-05-08 1988-09-06 Hauserman, Inc. Office cabinet
US4861121A (en) * 1987-10-01 1989-08-29 Lam-Wood Products Inc. Space efficient cabinet for housing a computer work station
US5163606A (en) * 1988-01-25 1992-11-17 Isserstedt Robert K Storage and filing device
US5620133A (en) * 1988-01-25 1997-04-15 Vertago Investments Limited Storage and filing device
US4865404A (en) * 1988-07-18 1989-09-12 Harpers Interlock for multi-drawer cabinet
US4993784A (en) * 1988-12-07 1991-02-19 Engineered Security Products Corporation Locking device
US4986589A (en) * 1989-08-22 1991-01-22 Leggett & Platt, Incorporated Security file cabinet
US5389919A (en) * 1990-04-05 1995-02-14 Meridian, Inc. Electronic interlock for storage assemblies with communication
US5199774A (en) * 1990-11-27 1993-04-06 Kimball International, Inc. Combination lock and interlock for a file cabinet
US5489938A (en) * 1991-05-13 1996-02-06 Ricoh Company, Ltd. Television conference apparatus including a material picturing device
US5364178A (en) * 1992-04-23 1994-11-15 Westinghouse Electric Corporation File cabinet having a corregated inner framework construction
US5378057A (en) * 1992-05-29 1995-01-03 Westinghouse Electric Corporation Metal case
US5327752A (en) * 1992-06-01 1994-07-12 Kensington Microwave Limited Computer equipment lock
US5303994A (en) * 1992-06-05 1994-04-19 Steelcase Inc. Drawer interlock
US5281018A (en) * 1992-07-29 1994-01-25 Comtec, Inc. Protective enclosure for computers in industrial environment
US5352030A (en) * 1992-09-11 1994-10-04 Wolfgang Derle Anti-tip device
US5779331A (en) * 1995-08-21 1998-07-14 Fox; Keith Thomas File management system
US5762409A (en) * 1996-08-13 1998-06-09 Rice, Jr.; Richard L. Cabinet for personal computer
US5829859A (en) * 1996-10-04 1998-11-03 Planhold Corporation Bi-directional drawer system
US5913582A (en) * 1996-10-08 1999-06-22 Coonan; Gary M. Computer workstation
US6589308B1 (en) * 1997-02-28 2003-07-08 Angelo Gianelo Cabinet for housing a computer workstation
US6082839A (en) * 1997-06-12 2000-07-04 Inaba Saisakusho Co., Ltd Drawer control for office cabinets
US6018968A (en) * 1998-10-09 2000-02-01 Sides; Kenneth W. Locking apparatus
US20030163714A1 (en) * 1999-01-07 2003-08-28 Remedan Aps Control device for a computer and a computer comprising such a control device
US20040055713A1 (en) * 1999-03-16 2004-03-25 Kimmet Stephen G. Folding panel assembly
US6565163B2 (en) * 1999-04-12 2003-05-20 Inclose Design, Inc. Rack for memory storage devices
US6364439B1 (en) * 2000-03-31 2002-04-02 Interland, Inc. Computer storage systems for computer facilities
US20040039920A1 (en) * 2000-10-05 2004-02-26 Jong-Hae Kim Security cabinet system for controlling with user's id data
US6719386B2 (en) * 2001-05-07 2004-04-13 Knape & Vogt Manufacturing Co. Precision drawer slide with cantilevered members
US6755491B2 (en) * 2001-06-26 2004-06-29 Mcelheney Billy W. Operator interface terminal for use in a harsh environment
US20030062810A1 (en) * 2001-10-03 2003-04-03 Florian Westwinkel Modular housing

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9483896B2 (en) 2003-10-17 2016-11-01 Westrock Shared Services, Llc Dispensing and display system
US9052994B2 (en) 2003-10-17 2015-06-09 Rock-Tenn Shared Services, Llc Dispensing and display system
US8215520B2 (en) 2003-10-17 2012-07-10 Rock-Tenn Shared Services, Llc Secure merchandising system
US8485391B2 (en) 2003-10-17 2013-07-16 Rock-Tenn Shared Services, Llc Theft deterrent system
US8190289B2 (en) 2003-10-17 2012-05-29 Rock-Tenn Shared Services, Llc Dispensing and display system
US8386075B2 (en) 2003-10-17 2013-02-26 Rock-Tenn Shared Services, Llc Dispensing and display system
US20090184130A1 (en) * 2003-10-17 2009-07-23 Miller Roger K Secure merchandising system
US20100017025A1 (en) * 2003-10-17 2010-01-21 Rock-Tenn Shared Services, Llc Time delay product pushing system
US8353425B2 (en) 2005-04-25 2013-01-15 Rock-Tenn Shared Services, Llc Time delay product pushing system
US20060284527A1 (en) * 2005-06-01 2006-12-21 Michael Olsen Booking station
US7311254B2 (en) * 2005-06-01 2007-12-25 Micheal Olsen Booking station
US11783939B2 (en) 2005-10-25 2023-10-10 Nxstage Medical, Inc. Safety features for medical devices requiring assistance and supervision
US9024746B2 (en) * 2005-10-25 2015-05-05 Nxstage Medical, Inc. Safety features for medical devices requiring assistance and supervision
US20130069778A1 (en) * 2005-10-25 2013-03-21 Nxstage Medical, Inc. Safety features for medical devices requiring assistance and supervision
US9375527B2 (en) 2005-10-25 2016-06-28 Nxstage Medical, Inc. Safety features for medical devices requiring assistance and supervision
US8274363B2 (en) * 2007-02-07 2012-09-25 Roger Goza Medical facility secured compartments and method
US8269599B2 (en) * 2007-02-07 2012-09-18 Roger Goza Computer workstation and method
US20080189779A1 (en) * 2007-02-07 2008-08-07 Roger Goza Medical Facility Secured Compartments and Method
US20080189797A1 (en) * 2007-02-07 2008-08-07 Roger Goza Computer Workstation and Method
GB2440215B (en) * 2007-03-03 2009-04-01 Dalen Ltd Security apparatus
GB2440215A (en) * 2007-03-03 2008-01-23 Dalen Ltd Security cabinet
US20080246375A1 (en) * 2007-04-03 2008-10-09 Berg Neil M Security cabinet
WO2010144677A1 (en) * 2009-06-10 2010-12-16 Blackrock, Inc. Cooling system for a computer server cabinet in a data center
US20100317278A1 (en) * 2009-06-10 2010-12-16 Blackrock, Inc. Cooling System for a Computer Server Cabinet in a Data Center
US9119488B2 (en) 2009-09-25 2015-09-01 Rock-Tenn Shared Services, Llc Secure merchandising display with blocker mechanisms
KR101099295B1 (en) 2009-11-20 2011-12-26 김창일 computer case for a working site capable of blocking an accident current and microwaves
US8646650B2 (en) 2010-05-19 2014-02-11 Rock-Tenn Shared Services, Llc Product dispensing system
US8910827B2 (en) 2011-05-10 2014-12-16 Rock-Tenn Shared Services, Llc Secure merchandising display with tunnel feature
US9603467B2 (en) 2011-05-10 2017-03-28 Westrock Shared Services, Llc Secure merchandising display with tunnel feature
AU2014218493B2 (en) * 2013-02-25 2017-05-25 Dfence Solutions Pty Ltd Anti-ballistic barrier comprising furniture
US9528797B2 (en) 2013-02-25 2016-12-27 Dfence Solutions Pty Ltd Anti-ballistic barrier comprising furniture
WO2014127400A1 (en) * 2013-02-25 2014-08-28 Securescan Global Pty Ltd Anti-ballistic barrier comprising furniture
US9310170B1 (en) * 2013-03-14 2016-04-12 Alan Basewitz Moveable furniture piece with armored panel
US9145728B1 (en) * 2013-03-14 2015-09-29 William A. LeBlanc Electronic safe
CN112401480A (en) * 2020-11-20 2021-02-26 江西环境工程职业学院 Distance education device for education and training
KR200494386Y1 (en) * 2021-06-01 2021-10-01 (주)유진퍼니처 3D printer storage closet

Similar Documents

Publication Publication Date Title
US20060138915A1 (en) Mobile computer security cabinet
US5877938A (en) Packaging architecture for a data server
US4418551A (en) Vending machine security cage
US11096307B2 (en) Members and locks for securing devices and/or slots in a computer rack
JPH1147349A (en) Security cage for game machine and game machine using the cage
ATE118061T1 (en) SECURITY LOCK FOR DOUBLE-WALLED DATA PROCESSING DEVICE.
US10822838B2 (en) Lockable cover assembly
US20060060114A1 (en) Security safe
US4729614A (en) Electronics cabinet security cover
US4348967A (en) Public security locker
US20170310091A1 (en) Electrical cabinet service door with integrated dead front
US20100019631A1 (en) Secure storage system having mobile shelving units
US6364439B1 (en) Computer storage systems for computer facilities
US6614651B2 (en) Server bezel
PH12016000224A1 (en) Hidden-lock door panel and containing device having the same
US10827640B2 (en) Secure add-on brackets and bezel for locking devices and/or slots in a computer rack
AU2011293100B2 (en) Locking system
US4088082A (en) Device with functional units housed in an armored box and in need of protection, e.g. automatic money-dispensing machine
US6481809B1 (en) Sliding module for computer components
US20170150632A1 (en) Rack mountable security enclosures
JP2002299863A (en) Rack for housing apparatus
US2853231A (en) Money compartment unit for doors
US20070175837A1 (en) System and method for providing access to the keyboard and display assembly of rack mounted computing systems when the rack door remains closed
CN111096582A (en) Smart mobile phone shielding cabinet
KR20100049260A (en) A movement thing depository which uses the vehicle

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION