GB2448354A - Security device for blocking a USB port - Google Patents
Security device for blocking a USB port Download PDFInfo
- Publication number
- GB2448354A GB2448354A GB0707080A GB0707080A GB2448354A GB 2448354 A GB2448354 A GB 2448354A GB 0707080 A GB0707080 A GB 0707080A GB 0707080 A GB0707080 A GB 0707080A GB 2448354 A GB2448354 A GB 2448354A
- Authority
- GB
- United Kingdom
- Prior art keywords
- security device
- fascia
- security
- usb
- connector member
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000000903 blocking effect Effects 0.000 title abstract 2
- 210000003195 fascia Anatomy 0.000 claims abstract description 36
- 239000000837 restrainer Substances 0.000 claims abstract description 7
- 230000002093 peripheral effect Effects 0.000 claims abstract description 6
- 238000000034 method Methods 0.000 claims description 6
- 240000008042 Zea mays Species 0.000 claims 1
- 235000005824 Zea mays ssp. parviglumis Nutrition 0.000 claims 1
- 235000002017 Zea mays subsp mays Nutrition 0.000 claims 1
- 239000003086 colorant Substances 0.000 claims 1
- 235000005822 corn Nutrition 0.000 claims 1
- 230000000452 restraining effect Effects 0.000 claims 1
- 238000012550 audit Methods 0.000 abstract description 6
- 229910000831 Steel Inorganic materials 0.000 abstract description 2
- 239000010959 steel Substances 0.000 abstract description 2
- 239000002184 metal Substances 0.000 description 12
- 239000004033 plastic Substances 0.000 description 6
- 238000013475 authorization Methods 0.000 description 2
- 229920001342 Bakelite® Polymers 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 241001516739 Platonia insignis Species 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 238000013474 audit trail Methods 0.000 description 1
- 239000004637 bakelite Substances 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000001746 injection moulding Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B39/00—Locks giving indication of authorised or unauthorised unlocking
- E05B39/02—Locks giving indication of authorised or unauthorised unlocking with destructible seal closures or paper closures
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01R—ELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
- H01R13/00—Details of coupling devices of the kinds covered by groups H01R12/70 or H01R24/00 - H01R33/00
- H01R13/44—Means for preventing access to live contacts
- H01R13/447—Shutter or cover plate
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B73/00—Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices
- E05B73/0082—Devices for locking portable objects against unauthorised removal; Miscellaneous locking devices for office machines, e.g. PC's, portable computers, typewriters, calculators
Landscapes
- Details Of Connecting Devices For Male And Female Coupling (AREA)
- Connector Housings Or Holding Contact Members (AREA)
Abstract
A security device for blocking a computer port such as a Universal Serial Bus (USB) port comprises a connector member 110 for fitting inside a USB port, wedge shaped projections 130 for securing the connector member to the USB port and a frangible (breakable) fascia 120. An attempt by a user to gain unauthorised access to the USB port by tampering with the device results in the fascia breaking off. The loss of the fascia provides clear evidence of tampering during a subsequent security audit. The fascia may be colour contrasted with the connector member to make unauthorised access readily visible during the audit. The device may be fitted with an identifier (600, fig. 6) and may include an RFID tag. A restrainer (1020, 1021, 1022, fig. 10) may be fitted to the device in order to prevent unauthorised disconnection of a peripheral such as a keyboard from a neighbouring port. The restrainer may be a steel wire in conjunction with a lead crimp to form a noose around the keyboard USB plug, or alternatively a cable tie may be used.
Description
Application No. GB0707080.8 RT.IvI Datc:9 August 2007 The following
terms are registered trademarks and should be read as such wherever they occur in this document: Bakeljte
SECURITY DEVICE
The present invention is concerned with the security of computers and other devices.
Many electronic devices, such as computers and portable storage devices, have ports for enabling data to be transferred to/from the device. Examples of ports are the USB (Universal Serial Bus) and Firewire (RTM) (IEEE 1394) ports Some institutions, such as banks, require security in order to prevent the unauthorised transfer of information. For example, a dishonest bank employee could transfer financial data Onto a USB memory device. Another potential security problem is that of users connecting USB memory devices to a PC (personal computer) in order to listen to music stored as data on a USB memory device. This could unwittingly introduce a computer virus onto the PC.
IS There is therefore a need for an apparatus for improving the security of PCs. PCs are typically replaced on a 2-3 year cycles and in order to maximise the resale value of the PCs, the ports (such as USB ports) must still be functional. Although ports such as USB ports could be disabled by physically damaging the USS ports in order to prevent users from using the USB ports, this (somewhat drastic) method has the disadvantage that the resale value of the PCs (PCs are typically replaced every 2 to3 years) will be decreased due to the damaged USB ports.
A prior art device is the PC Guardian (RIM) available from PC Guardian Anti-Theft Products, Inc. These security devices have the disadvantage that mechanical keys are required in order to mechanically secure and release the security devices to/from a USB port; thus the user must store and manage the various mechanical keys.
Another prior art device is the USB Blocker available from All-In-One (RIM). These devices block USB ports but have the disadvantage that they can be removed without providing any indication that they have been removed.
According to the present invention, there is provided a security device comprising: a plug; one or more features on the plug for engagement with a port; and a fascia.
A benefit of some embodiments of the present invention is that ports are reversibly disabled. That is, ports can be restored to use, thereby enhancing the re-sale value of the PC.
Another benefit of some embodiments of the present invention is that ports are rendered tamper-proof. That is, if a port is restored to use by removing the security device then the fact that the security device has been removed is made readily apparent. In contrast. with some prior art devices, if a user managed to pick the lock then there would be no record that the port has been used without authorisation.
Yet another benefit of some embodiments of the present invention is that a user can, if necessary, over-ride the security device by removing the security device from the PC.
For example, if a company executive needs to transfer data (for example in order to perform an urgent Powerpoint (RTM) presentation to other executives) using a secured port then the security can be over-ridden and the port can be used. However.
the fact that the Security device has been used is readily apparent and thus an audit trail is established. In some institutions, all the ports of all that institution's PCs may be protected with a security device and then audited on, say, an annual basis to check that the security devices have not been removed. In the event that a company executive did need to remove a security device then this can be recorded as part of an audit trait.
DESCRIPTION OF FIGURES
Figure 1 shows an isometric view of a plug end of a first embodiment of a security device.
Figure 2 shows a cross-sectional view of the security device of Figure I, installed inside a USB receptacle.
Figure 3 shows an isometric view of a fascia end of the security device of Figure I. Figure 4 shows an exploded isometric view of the security device of Figure I. Figure 5 shows a cross-sectional view of a second embodiment of a security device, installed inside a USB receptacle.
Figure 6 shows an isometric view of a fascia component of Figure 5.
Figure 7 shows an isometric view of a plug component of Figure 5.
Figure 8 shows a cross-sectional view, in a plane perpendicular to the plane of Figure 5, of the plug component of Figure 5.
Figure 9 shows a tool that may be used to remove the security device of Figure 5 from a tJSB receptacle.
Figure 10 shows a third embodiment that prevent the unauthorised disconnection of peripherals.
Elements with the same numbers in the various Figures are the same.
DESCRIPTION OF PREFERRED EMBODIMENTS
First embodiment Figure 1 shows a security device 100 comprising a plug I 10, a fascia 120 and two wedge shaped projections 130 provided on the plug 110. The plug 110 and the projections 130 are preferably formed of a frangible plastic such as Bakelite.
Figure 2 shows a cross-sectional view of the security device 100, installed in a type A USB receptacle 250. The plug 110 is a cuboid that is dimensioned to fit inside the USB receptacle 250. Figure 2 shows a recess 201 which, for clarity, is not shown by Figure 1. The recess 201 is formed in the plug 110. The recess 201 allows the plug to accommodate a tongue 251 (which tongue 251 carries the electrical contacts of the USB receptacle 250) the USB receptacle 250 during insertion of the plug 110 into the USB receptacle 250.
As those skilled in the art will appreciate, type A USB receptacles typically have a pair of metal prongs formed in the metal shielding cage of the receptacle. The metal prongs cooperate with a pair of corresponding recesses formed in the shielding cage of type A USB plugs (not shown). The recesses in a IJSB plug receive the metal prongs of a USB receptacle as a detent mechanism in order to prevent accidental removal of the USB plug from the USB receptacle.
Figure 2 does not show the metal prongs of the USB receptacle 250 but Figure 2 does show that the projections 130 protrude through the metal shielding cage of the USB receptacle 250 at a prong region 260. The wedge shaped projections 130 of the plug I 10, when the plug 110 is inserted into a type A USB receptacle, displace the metal prongs with the result that the projections 130 (and hence the plug 110) are captively retained by the shielding cage of the USB receptacle.
The projections 130 each comprise a ramp portion 231 and an abutment surface 232.
The abutment surface 232 is shown protruding at substantially 90 relative to the plug I 10 although in alternative embodiments the abutment surface 232 may be a! a different angle, for example to form a barb.
Other than the recess 201, the plug 110 is a generally solid cuboid; the plug 110 has dimensions similar to the metal shielding cage of a USB plug but the plug 110 does not have a metal shielding cage.
Figure 3 shows an isometric view of a fascia end of the security device 100. The fascia 120 comprises a planar inner panel 301 which is connected to, but spaced apart from, a planar outer panel 303 by a total of eight support pins 302 (in other embodiments, one or more support pins 302 may be used). The projections 130 are not visible in Figure 3 as the projections are hidden by the plug 110.
The outer panel 303 is provided with four intersecting fault lines 310 which are regions where the thickness of the outer panel 303 is reduced. Thus if the fascia 120 is tampered with (e.g. by an unauthorised user who attempts to use a USB port) then the outer panel 303 will become damaged.
In alternative embodiments the fascia 120 may comprise a single panel instead of the inner panel 301, support pins 302 and outer panel 303. Such a single panel would still provide a tamper evident means of preventing access to the electrical connections of the USB receptacle. More generally, the force required to remove (by shearing off the projections 130 from the plug 110) the security device 100 from a USB receptacle is greater than the force required to damage the fascia 120. Thus the security device 100 cannot be removed without causing tamper evident damage to the fascia 120.
Figure 4 shows an exploded view exploded isometric view of the security device 100.
The projections 130 are not visible in Figure 4 as the projections are hidden by the plug I 10.
Although shown as separate pieces in the exploded view, a preferred method of manufacture of the security device 100 is to simultaneously mould all the parts simultaneously. As those skilled in the art will appreciate, one plastic may be used to form the plug 110 and the projections 130 and another plastic may be used to form the inner panel 301, support pins 302 and the outer panel 303.
In this embodiment, it is preferred that the outer panel 303 is formed from a black plastic and the inner panel 301, the plug 110 and the projections 130 are formed from a high visibility plastic, e.g. yellow.
If a user attempts to use a USB port which has been secured by the security device then when the user attempts to remove the security device 100, the device 100 will be damaged. For example, the outer panel 303 will become at least partially broken and thus the underlying yellow plastic of the inner panel 301 will be revealed.
IS It is therefore possible, at a glance, to determine that an attempt has been made to obtain unauthorised access to the USB port.
It is envisaged that the security device 100 will not be readily available to the public; only designated authorised company personnel will be able to buy replacement security devices 100. Thus even if a user does manage to remove the security device from a USB port (the removal is difficult due to the projections 130 being engaged with the metal shielding cage of the USB receptacle 250), the user will not be able to obtain an undamaged (i.e. with an intact black Outer panel 303) replacement security device.
It is also envisaged that security devices 100 are customised for each site of a customer. For example, if a bank has twenty different offices then a unique identifier may be assigned to the bank, and a sub-identifier may be used to differentiate the twenty offices. Figure 6 shows an example of an alphanumeric identifier comprising a sub-identifier.
Security devices 100 may also, or additionally, be CustomisecJ by including a unique, machine readable, identifier in each security device. For example, an RFID tag having a unique, machine-readable, serial number may be included in the plug 110 of each security device 110. During installation of security devices 100 into USS ports of a bank, a record is maintained of the serial number of each of the security devices.
Thus even if a user (that is, a user who had removed without authorisation a security device 100 from a USB port and was then attempting to hide the fact that the security device 100 had been removed) was able to obtain a replacement security device 100 having a similar appearance, the alphanumeric identifier and/or the serial number of the replacement security device 100 would not match the alphanumeric identifier and/or the serial number of the security device 100 that had been removed by the user.
Security devices tOO may also be customised by the colour combination, e.g. orange on blue instead of yellow on black.
It is envisaged that a company may provide security services to organisations such as banks. First, the company installs security devices 100 into all the USB ports of all computers owned by the bank. Then, on either a random or periodic basis, the company audits the computers owned by the bank to confirm that the security devices previously installed are still intact and have not been tampered. The company receives a fee from the bank in return for providing the security services which facilitate the compliance of the bank with legislation, e.g. the Sarbanes-Oxley Act in the USA. In some circumstances it may be necessary for, say, a company executive to remove a security device 100 in order say, to show a presentation to other executives.
In such circumstance a record may be made, in advance of a randomfperiodjc audit, of the circumstances surrounding the removal of the security device 100.
Second embodiment Figure 5 shows a cross-sectional view of a second embodiment 500 of a security device, installed inside a USB receptacle 250. The security device 500 comprises a fascia component 520 and a separate plug component 510. The fascia component 520 and the plug component 510 cooperate together inside the IJSB receptacle 250.
Figure 6 shows an isometric view of the fascia component 520 of Figure 5. As shown, the fascia component 520 comprises two wedge shaped projections 130. In this embodiment the fascia component 520 is provided with an identifier 600, here the alphanumeric characters "A9OBXR".
Figure 7 shows an isometric view of the plug component 510 of Figure 5. As shown, the plug component 110 has a recess 701 which accommodates the tongue 250 of the USB receptacle 250. The plug component 510 also has a recess 710 which allows a tool 900 to remove the plug component 510 from the USB receptacle 250.
Figure 8 shows a cross-sectional view, in a plane perpendicular to the plane of Figure 5, of the plug component 510. As shown, the recess 710 forms the entrance to a generally "L" shaped cavity 800. In alternative embodiments, the cavity may instead be T' shaped in order to facilitate injection moulding of the plug component 510.
Figure 9 shows a tool 900 that may be used to remove the security device 500 from the USB receptacle 250. The tool 900 has a generally "L" shaped end 901. To remove the security device 500, a portion of the fascia component 520 is deliberately damaged in order to allow access to the recess 710 (the recess 710 is otherwise obscured by the fascia component 520). The end 901 of the tool 900 is then inserted into the recess 710 and the end 901 is then moved sideways so that the L shaped end 901 engages the L shaped cavity 800. The tool 900 is then used to pull the plug component 510, together with the damaged fascia component 520, Out of the USB receptacle 250.
In an alternative embodiment, the cavity 800 may be arranged to communicate with the recess 701 instead of the recess 710.
Third embodiment Figure 10 shows a third embodiment 1000 that prevent the unauthorised disconnection of peripherals. Some computer peripherals, such as keyboards and mice, are connected to a PC via a USB receptacle. There is therefore the risk that an unauthorised employee could disconnect the keyboard the USB receptacle, plug in a USB memory stick into the now available USB port, transfer sensitive data, and then reconnect the keyboard to the USB port.
USB ports are typically provided in pairs. The security device 1000 uses one port of an adjacent pair of ports to prevent the unauthorised disconnection of a device connected to the other port of the adjacent pair of ports.
Figure 1000 shows a keyboard USB plug 1010 that is plugged into a first USB receptacle 1001. Adjacent the first USB receptacle 1001 is a second LJSB receptacle 1002.
The security device 100 has been inserted into the second USB receptacle 1002. A steel wire 1020 in conjunction with a lead crimp 1021 form a noose 130 around the keyboard USB plug 1010. The diameter of the noose 1030 is no less than the diameter of a cable 101 I that emanates from keyboard USB plug 1010. The diameter of the noose 1030 is less than the effective diameter (USB plugs are typically rectangular in cross section) of the keyboard USB plug 1010 with the result that the noose 1030 holds the keyboard USB plug 1010 captive inside the first USB receptacle 1001.
The other end of the wire 1020 passes between the inner panel 301 and the outer panel 303 of the fascia 120. Another lead crimp 1022 holds the wire 1020 captive within the fascia 120. Thus the keyboard USB plug 1010 cannot be removed without damaging the fascia 120 in a tamper evident manner.
The lead crimps may be patterned as is sometimes done with utility meters, for example electricity meters. Thus even if an unauthorised person were to cut the wire 1020 and then attempt to replace the wire 1020 and make replacement crimps 1021, 1022, the replacement crimps would not match the original crimps.
In alternative embodiments, the wire 1020 may be moulded into the security device 100, obviating the second crimp 1022. In yet other embodiments, a cable tie (a type of ratchet locking securing device) may be integrally moulded with the security device and the cable tie may be used instead of the wire 1020 and crimps 1021, 1022.
Other embodiments Features of the security device 100, security device 500 and wire 1020, and the various alternative embodiments, may be combined.
In alternative embodiments, spring mounted shear pins (not shown) may be used instead of the projections 130. Such shear pins are arranged to emerge from the plug normal to the plug 110. The shear pins engage with the recesses in the metal shielding cage of a connector. Of course, some embodiments of the security device may be designed to operate fl Conjunction with connectors that do not have a metal shielding cage. lfsufficient force is used to remove the security device, then an extremity of the shear pin shears off.
Embodiments described above related to a security device 100, 500 that was inserted into a receptacle. In other embodiments, the security device may instead be a receptacle or may imitate a male or a female connector. In other embodiments, the security device may be provided with a cavity that receives a USB plug; the cavity is provided with one or more projections for engaging with one or more of the pair of recesses formed in the shielding cage of type A USB plugs.
According to some embodiments, there is a security device (100; 500; 1020) comprising: a connector member (110) for fitting inside a computer port, e.g. a USB port (250); wedge shaped projections (130) for securing the connector member to the USB port; and a fascia (120). If a user attempts to obtain unauthorised access to the USB port then the fascia breaks off, this will become apparent during a subsequent security audit. The fascia may be colour contrasted with the connector member to make unautharised access readily visible. The security device may be provided with an identifier (600). A restrainer (1020, 1021, 1022) may be fitted to the security device in order to prevent the unauthorised disconnection of peripherals such as USB keyboards. Is
Claims (27)
- CLAIMS: 1. A security device comprising: a connector member forengaging with an electrical connector; and a securing means for securing the security device to an electrical connector.
- 2. A security device according to claim I, wherein the securing means comprises one or more projections.
- 3. A security device according to claim I or 2, wherein the one or more projections are frangible from the connector portion.
- 4. A security device according to any preceding claim, comprising a fascia.
- 5. A security device according to claim 4, wherein the fascia is frangible.
- 6. A security device according to claim 4 or 5, wherein the fascia comprises one or more fault lines.
- 7. A security device according to claim 4, 5 or 6, wherein the fascia comprises: an inner panel, an outer panel and one or more support pins connecting the inner panel to the outer panel.
- 8. A security device according to any one of claims 4 to 7, wherein the connector portion, the fascia and the securing means are integrally formed.
- 9. A security device according to any one of claims 4 to 7, wherein the connector member and the securing means are integrally formed, and the fascia is a separate component.
- 10. A security device according to any one of claims 4 to 9, wherein the connector member and the fascia are of different colours.
- I I. A security device according to any preceding claim, wherein the connector member comprises a recess for accommodating one or more electrical contacts of an electrical connector.
- 12. A security device according to any preceding claim, wherein the connector member comprises a cavity for extracting the connector member from an electrical connector.
- 13. A security device according to any preceding claim, wherein the connector member is dimensioned to cooperate with a type A USB receptacle.
- 14. A security device according to any preceding claim, comprising information for distinguishing the security device from other security devices.
- 15. A security device according to claim 14, wherein the information comprises an alphanumeric identifier.
- 16. A security device according to claim 14 or I 5, wherein the information comprises a unique identifier.
- 17. A security device according to any one of claims 14 to 16, comprising an RFID tag.
- 18. A security device according to any preceding claim, comprising a restrainer for preventing the disconnection of an electrical connector.
- 19. A security device according to claim 18, wherein the restrainer comprises a wire.
- 20. A security device according to claim 19, wherein the restrainer comprises a noose formed at one end of the wire.
- 21. A security device according to any one of claims 18 to 20, wherein the restrainer is integrally moulded with at least one of a connector member and a fascia.
- 22. A computer fitted with a security device according to any one of claims Ito 21.
- 23. A peripheral fitted with a security device according to any one of claims I to 21.
- 24. A method of controlling transfer of data with a computer, comprising the steps of: fitting a security device according to any one of claims I to 21 to the computer.
- 25. A method according to claim 24, further comprising the step of restraining an electrical connector to prevent disconnection of the electrical connector from the corn puter.
- 26. A method according to claim 24 or 25, comprising the step of inspecting one or security devices to check whether or not the one or more security devices have been tampered with.
- 27. A method according to any one of claims 24 to 26, comprising the step of receiving money from an institution such as bank in order to verit' compliance of the institution with security legislation.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0707080A GB2448354B (en) | 2007-04-12 | 2007-04-12 | Security device for a USB port |
PCT/GB2008/001297 WO2008125837A1 (en) | 2007-04-12 | 2008-04-14 | Security device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0707080A GB2448354B (en) | 2007-04-12 | 2007-04-12 | Security device for a USB port |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0707080D0 GB0707080D0 (en) | 2007-05-23 |
GB2448354A true GB2448354A (en) | 2008-10-15 |
GB2448354B GB2448354B (en) | 2010-04-21 |
Family
ID=38116618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0707080A Expired - Fee Related GB2448354B (en) | 2007-04-12 | 2007-04-12 | Security device for a USB port |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2448354B (en) |
WO (1) | WO2008125837A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013007283A1 (en) * | 2011-07-08 | 2013-01-17 | Telefonaktiebolaget L M Ericsson (Publ) | Network traffic monitoring apparatus for monitoring network traffic on a network path and a method of monitoring network traffic on a network path |
WO2013042108A1 (en) * | 2011-09-20 | 2013-03-28 | Zadok Reuveni | Security plug for preventing access to a usb socket and secured usb device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2640237A1 (en) * | 1988-12-13 | 1990-06-15 | Radiall Sa | Closure device with tamper indication, for a coaxial socket (seating) |
EP0803939A2 (en) * | 1996-04-26 | 1997-10-29 | Sumitomo Wiring Systems, Ltd. | Connector |
US20050202698A1 (en) * | 2004-03-12 | 2005-09-15 | Jin Tay Industries Co., Ltd. | Connector lock for a universal serial bus port |
US20060211291A1 (en) * | 2005-03-18 | 2006-09-21 | Kung Ching-Hu | Locking mechanism for securing communication port on electronic apparatus |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2332016B (en) * | 1997-12-03 | 2001-12-19 | Howard Miller | Anti-theft device |
TW582422U (en) * | 2002-05-31 | 2004-04-01 | Sinox Co Ltd | Connector socket securing device |
EP1455260A1 (en) * | 2003-03-06 | 2004-09-08 | Hewlett-Packard Development Company, L.P. | Access control devices relating to data-processing systems, housings and sub-assemblies |
-
2007
- 2007-04-12 GB GB0707080A patent/GB2448354B/en not_active Expired - Fee Related
-
2008
- 2008-04-14 WO PCT/GB2008/001297 patent/WO2008125837A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2640237A1 (en) * | 1988-12-13 | 1990-06-15 | Radiall Sa | Closure device with tamper indication, for a coaxial socket (seating) |
EP0803939A2 (en) * | 1996-04-26 | 1997-10-29 | Sumitomo Wiring Systems, Ltd. | Connector |
US20050202698A1 (en) * | 2004-03-12 | 2005-09-15 | Jin Tay Industries Co., Ltd. | Connector lock for a universal serial bus port |
US20060211291A1 (en) * | 2005-03-18 | 2006-09-21 | Kung Ching-Hu | Locking mechanism for securing communication port on electronic apparatus |
Non-Patent Citations (2)
Title |
---|
All-In-One USB Blocker, obtained on 6/8/07 from the Internet: www.allinoneline.com/ProductDetials.aspx?productID=396 * |
PC Guardian USB Port Security System, obtained on 6/8/07 from the Internet: www.pcguardian.com/products/8500_usb_port_lock.html * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013007283A1 (en) * | 2011-07-08 | 2013-01-17 | Telefonaktiebolaget L M Ericsson (Publ) | Network traffic monitoring apparatus for monitoring network traffic on a network path and a method of monitoring network traffic on a network path |
US9264133B2 (en) | 2011-07-08 | 2016-02-16 | Telefonaktiebolaget L M Ericsson (Publ) | Network traffic monitoring apparatus for monitoring network traffic on a network path and a method of monitoring network traffic on a network path |
WO2013042108A1 (en) * | 2011-09-20 | 2013-03-28 | Zadok Reuveni | Security plug for preventing access to a usb socket and secured usb device |
Also Published As
Publication number | Publication date |
---|---|
GB0707080D0 (en) | 2007-05-23 |
WO2008125837A1 (en) | 2008-10-23 |
GB2448354B (en) | 2010-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10460132B2 (en) | Security keys associated with identification of physical USB protection devices | |
CN102934292B (en) | Cable tamper prevention | |
US10855470B2 (en) | USB security gateway | |
EP2737581B1 (en) | Blockout device for usb port | |
US7509015B2 (en) | Secure fiber optic network cassette assembly | |
EP2827279B1 (en) | Electro-mechanic USB locking device | |
US9646179B1 (en) | Mechanical locking device for computer ports and portable storage devices | |
US7530824B2 (en) | Locking seal for data ports and associated methods | |
US6097606A (en) | Financial transaction terminal with limited access | |
EP3073411B1 (en) | Lan port lock device | |
WO2013042108A1 (en) | Security plug for preventing access to a usb socket and secured usb device | |
US8672694B2 (en) | Protection module for data transmission connector | |
GB2448354A (en) | Security device for blocking a USB port | |
US20090125646A1 (en) | Method and system for securing input from an external device to a host | |
US9430675B2 (en) | Encrypting pin pad | |
US11522311B1 (en) | Tamper evident port protector | |
JP2006164674A (en) | Incorrect connection preventive cap | |
EP1078335A1 (en) | Financial transaction terminal with limited access | |
JP4934737B2 (en) | Unauthorized connection prevention cap | |
DE202004008380U1 (en) | Secure card reader has additional electronic components for encrypting data to be transferred to an external unit and for detecting data access attempts | |
CN117541318B (en) | Offline consumption intelligent evaluation and supervision method, system and medium | |
CN216596467U (en) | Commodity anti-theft device with anti-dismantling battery | |
RU87814U1 (en) | MECHANICAL LOCK OF USB, RJ-45- AND RJ-11-INTERFACES | |
WO1996032762A1 (en) | Safety device for electronic apparatuses | |
CA2271617C (en) | Financial transaction terminal with limited access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20110412 |