Abstract: “COMPREHENSIVE SECURITY ENCLOSURE CPU CABINET” that includes a metal cabinet, mechanical lock and customized central key configured to prevent unauthorized movement or theft of peripherals and restricts access to internal computing components like RAM, hard disk etc.; the central processing unit (CPU) is fitted to the security enclosure with in the dedicated racks and casings that is fastened as a whole for positioning internal storage device, electrical wires and data cables to draw and fix within the preferred casings without any loose connections within the cabinet and then taken out via cable guides(105, 215) sealed with electric grommets stipulated on the cabinet for minimizing electromagnetic interference to connect to other peripherals to work properly without any interception towards production, the cabinet is equipped with smart grounding to prevent electrical grounding problems and a central key is supplied for the mechanical lock fastened at one side of the cabinet to reduce to mishandling of device intentionally or unintentionally and to conveniently and efficiently maintain all the installations. Refer Figure 2
Description:FIELD OF INVENTION
[0001] The present invention relates to a safety enclosure cabinet for central
processing unit (CPU). Particularly, an external frame fitted over central
processing unit (CPU) to protect the computing device or IT hardware and its
peripherals.
BACKGROUND OF INVENTION
[0002] A computer is an automated electronic machine that has the ability to do
various works such as processing, storing of data, calculating algorithms, and
presenting the information to the users. The usage of the computer is increasing
tremendously all around the world due to its efficiency, accessibility and user
friendly nature.
[0003] Usually, a computer consist of various elements that act together and
functions as a computer. It has two types of functioning units, they are software
and the hardware. The software is classified into operating system and the
application software. Whereas, the hardware are generally classified into central
processing unit (CPU), storage memory (both RAM and ROM), and the other
peripherals like input and output devices i.e. keyboard, monitor, disk drives,
scanners, printers and more. The interface is an important factor that acts as a
bridge between the peripherals and the computer. There are numerous
methods which have been employed in the construction of interfaces to
enhance the connectivity, stability, longtivity and security.
[0004] Initially, the size and the shape of the computer is too heavy and
consume large room space, but now as the technology develops, the computers
are evolved in various forms like Personal computer, Workstation,
3
Minicomputer, Thin clients, Mainframe and Supercomputer.
[0005] Where the Personal computer is a commonly used type of computer by
all the user in our daily basis, which is usually small and can be used by a singleuser
at a time. A workstation is a large and powerful single-user type computer
with a powerful microprocessor to process higher data. The mainframe is a high
efficiency computer which enable to work hundreds to thousands of users
simultaneously. Finally, the supercomputers are the modern approach to
perform the task in extremely fast time i.e. process millions of commands per
second.
[0006] The personal computers are further classified by its size and its chassis or
frame or case. Where the cases are made from the metal that give them a solid
structure, i.e. Tower model is a type of computer where the internals
components like motherboard, storage device, and the power supply are
arranged one above the other in a cabinet, the Desktop model was broad
enough to settle over the table or desk where the display or monitor sits over
the computer this limits the specification of the desktop type computer and the
another one is thin client, a type of computer that works from resources that is
stored in a central server without any localized storage drive.
[0007] Currently, personal Computers are used by all the sectors like scientific
areas, company management i.e. accounting, commercial trading, etc. and
security areas to store the information which is highly important so it need more
reliable and effective means of protection. Unfortunately, these computers are
easily breach-able due to weekly secured cases or chassis or frames to prevent
the theft of internal components like Motherboard, Storage devices i.e. RAM
4
and ROM, and also the external components like mouse, keyboard, headphone,
etc. this also leads to leakage of personal or organizational information,
misusage of other’s information, and causing damage to the society. And
another key concern is Electromagnetic interference or radio frequency
interference which produces unwanted noise or disturbance in an electrical
circuit caused by an external source results in malfunctioning or low
performance of the computer.
[0008] Some of the prior arts in solving the problem:
US5555156A discloses an apparatus which enables, via an elementary
manipulation, protection against access to and destruction of data contained in
a computer system or deactivation of such protection. The protected computer
system may include a housing of a central processing unit (CPU) with its
memories, the housing being separate from data access devices. The CPU and
memories are connected to the data access devices by connectors which are
external to the housing. The housing is defined by an enclosure (18) provided
with at least one door or the like. Advantageously a plurality of housings may be
defined in the enclosure, each of which housings can benefit from the inventive
apparatus. Closing of the door causes a multipolar switch (28) to open, which
switch is electrically connected between: links connected to the data access
devices located outside the housing; connectors of/from the housing which
connectors are to be protected. The door can be closed while still permitting
operation of the devices stored in the housing. Reopening of the door causes the
contacts of the switch to close, and allows the exchange of data to resume.
US2005062371A1 discloses a storage cabinet for a CPU where the storage
cabinet includes two sidewalls, a top wall, a bottom wall, a front door, a front
5
spacer panel and aback panel. The storage cabinet may be inverted to allow the
door to open from the left side or the right side. A set of casters is also provided
to be attached to the bottom of the cabinet. The cabinet is easily assembled by
placing the front spacer panel at the bottom of the cabinet and adjusting the
door vertically on one of the side walls so as to have the door disposed above
the spacer panel. Upper and lower spaces are provided between the door, the
side walls and the top and bottom walls at the front portion of the cabinet. A
recess is provided in one of the side walls at the rear of the cabinet and an
opening is provided in the back of the cabinet so that ready access to cables,
wires and the like connected to the CPU is provided. An opening covered by an
air grille is provided in the side wall opposite to the side wall to which the door is
attached.
US6354681B1 discloses a computer casing in which at least one movable door
plate is installed at one side of the computer casing, the movable door plate
includes a first plate and a second plate. One edges of the first plate is pivotally
connected to one edge of the second plate, and other edges of the first plate
and the second plate are formed with engaged portions, respectively. At least
one side of the computer casing is installed with an opening; and the engaged
portions of the first plate and the second plate are embedded on edges of the
opening of the computer casing for selectively closing the opening.
[0009] The present invention provides a precise solution by enclosing the
computing device or an IT hardware from any unauthorized movement. More
particularly, this present invention provides a custom metal frame enclosure
which can be directly fitted over the cabinet/case prior or during installation of
the system that eliminate the components theft, electromagnetic interference
and electrical grounding by grommet and also enables the user to mount the
6
case anywhere. The present invention also provides a centralized locking and
unlocking control through an electronic or internet based system with an
additional Bluetooth accessibility.
OBJECT OF INVENTION
[0010] The main object of the invention is to provide a custom safety case or
cabinet that encloses the computing device or an IT hardware of cpu or similar
devices to prevent unauthorized usage or mishandlings along with a locking and
unlocking control system, manageable through a unique single key.
[0011] Another objective of the invention is to avoid damages due to improper
electric grounding.
SUMMARY OF INVENTION
[0012] The present invention relates to a safety enclosure cabinet fitted over a
central processing unit (CPU) to protect the computing device/IT hardware/
similar devices and its peripherals.
[0013] The present invention discloses a comprehensive security enclosure
package for central processing unit (CPU) comprising of metal sheet cabinet,
mechanical lock, fasteners, customized central key for securing entire central
processing unit (CPU).
[0014] The safety enclosure package for the CPU of different embodiments to
restricts unauthorized movement or theft of peripherals and restricts access to
internal computing components are explained in the invention.
[0015] The various objects and advantages of the present invention will be more
7
readily understood from the following detailed description when read in
conjunction with the appended drawing.
BRIEF DESCRIPTION OF THE DRAWINGS
[0016] Figure 1 shows the comprehensive security enclosure cabinet of thin
client CPU model.
[0017] Figure 2 shows the comprehensive security enclosure cabinet of tower
CPU model.
All figures are drawn for ease of explanation of the basic teachings of the
present invention only; the extensions of the figures with respect to number,
position, relationship, and dimensions of the parts to form the preferred
embodiment will be explained or will be within the skill of the art after the
following teachings of the present invention have been read and understood.
Further, the exact dimensions and dimensional proportions to conform to
weight, strength and similar requirements will likewise be within the skill of the
art after the following teachings of the present invention have been read and
understood.
Where used in the various figures of the drawings, the same numerals designate
the same or similar parts. Furthermore, when the terms “top,” “bottom,”
“front,” “rear,” “inside,” “outside,” and similar terms are used herein, it should
be understood that these terms have reference only to the structure shown in
the drawings as it would appear to a person viewing the drawings and are
utilized only to facilitate describing the invention.
8
DETAILED DESCRIPTION OF INVENTION
[0018] The present invention describes here is a safety enclosure cabinet fitted
over a central processing unit (CPU) to protect the computing device / IT
hardware or similar devices and its peripherals.
[0019] The present invention discloses a comprehensive security enclosure
cabinet for central processing unit (CPU) comprising of metal sheet cabinet,
mechanical lock, fasteners, customized central key for securing entire central
processing unit (CPU).
[0020] The main aim of the invention is to it secures the entire central
processing unit (CPU), restricts unauthorized movement or theft of peripherals
and restricts access to internal computing components like RAM, hard disk etc.
[0021] The present invention is open to modifications and alternative
constructions, the preferred embodiments shown in the various figures of the
drawing will be described herein in detail. It is understood, however, that there
is no intention to limit the invention to the particular embodiment, form or
example which is disclosed. On the contrary, the intention is to cover all
modifications, equivalent structures and methods, and alternative constructions
falling within the spirit and scope of the invention as expressed in the appended
claims.
[0022] The CPU cabinet of the present invention is custom built that is
preferable for various CPU structures i.e. thin client cpu model, Tower cpu
model as shown in figures can be manufactured from steel, metal, plastic, or any
other material that can provide enough security to substantially prevent theft of
peripheral components connected or contained inside the cpu. In an
embodiment, the CPU cabinet can be manufactured from mild steel or other
9
materials to prevent it from being accessible to unauthorized persons. Fig. 1-2
describes the present invention in more detail with various embodiments.
However, it should be understood by one having ordinary skill in the relevant
art, the present invention is not limited to the embodiments shown.
[0023] In one embodiment as per fig 1b shows the cabinet for Thin client cpu
model having two side cover, a top cover, a bottom cover, a front door to which
a mechanical lock is fastened to lock the cabinet (not shown in drawings for the
purpose of clarity).
[0024] The top cover (101) and one of the side cover of the cabinet are formed
by a plurality of sleeves (not shown in drawings for clarity purpose) that are
arranged in space provided alternatively as to form a pivotal portion. Then, a
pivotal shaft passes through the sleeves of the front cover and the side cover, so
that the top cover and side cover are pivotally connected. Thus, a movable door
(not shown in drawings for the purpose of clarity) is assembled to the cabinet as
to form a closed cabinet and one or more various types of clamping units are
fastened to the rear cover of the cabinet to fix the cabinet at preferred location.
[0025] The cabinet is provided with one or more cable guides (105) at multiple
locations and is sealed with electric grommets (not shown in drawings for the
purpose of clarity) at the top cover and on side cover to draw out electrical wires
and data cables from different guides to avoid electromagnetic (EM)
interference for the safe and efficient use of computer.
[0026] The cpu cabinet represented in fig 1 is provided with large number of
small vents (111) on the bottom cover to breathe air in and out of the cabinet to
maintain temperature inside the cabinet i.e. to let cool air into the case or to let
hot air out to increase the efficiency and lifespan of cpu.
10
[0027] Then A mechanical lock with universal key (not shown in drawings for the
purpose of clarity) is fastened at one side of front cover to conveniently and
efficiently manage all the installation i.e. CPU cabinets, in a specific location or
in a specific floor with a preferred customer.
[0028] As shown in fig 1, the bottom cover (103) of metal cabinet is provided
with one or more various types of mountings (107) to affix the cabinet at
preferred location i.e. metal hinges, Rivets (109), fasteners, wall mount frame
to pivot the cpu cabinet at preferable location respectively.
[0029] In another embodiment as per fig 2b shows a cabinet for Tower cpu
model having two side covers, a top cover, a bottom cover, a rear cover (201)
are soldered forming a closed cabinet using spot welding, and a separate racks
(not shown in drawings for the purpose of clarity) is arranged inside the cabinet
by fastening the lock plates in the lock mounts provided with locks either
horizontally or vertically to the inner walls of the cabinet to place the
components like RAM, hard disk etc. thus, restricting unauthorized access or
theft of peripherals computing device.
[0030] As described in previous embodiment a movable door (not shown in
drawings for the purpose of clarity) is assembled as the front cover and one of
the side cover of the cabinet are formed by a plurality of sleeves (not shown in
drawings for clarity purpose) that are arranged in space provided alternatively as
to form a pivotal portion. Then, a pivotal shaft passes through the sleeves of the
front cover and the side cover, so that the front cover and side cover are
pivotally connected and can able to place at any preferable place nearer to the
monitor to draw the connections to the monitor to work properly.
[0031] Then the cpu cabinet as shown in fig 2 is provided with various cable
11
guides (215) at multiple locations sealed with electric grommets at the sides of
side cover to draw electrical wires and data cables out to the monitor (not
shown in drawings for the purpose of clarity) and to avoid electromagnetic (EM)
interference and for the safe and efficient use of computer.
[0032] As shown in Fig 2b of the present embodiment a smart grounding cable
(205) is attached to hinges (203) fastened inside the cabinet to avoid electrical
grounding issue (i.e. An electromagnetic disturbance in a electric circuit caused
by outside source that interrupts, obstructs, or otherwise degrades or limits the
effective performance of electronics or electrical equipment to operate poorly,
malfunction or stop working completely) that helps in effective performance of
computer.
[0033] The metal cabinet represented in fig 2 is provided with large number of
small vents (213) at the top and bottom on the rear (213) side of the cabinet to
breathe air in and out of the cabinet to maintain temperature inside the cabinet
i.e. to let cool air into the case or to let hot air out to increase the efficiency and
lifespan of cpu.
[0034] Then a mechanical lock with universal key (not shown in drawings for the
purpose of clarity) is fastened at one side of front cover to conveniently and
efficiently manage all the installation i.e. CPU cabinets, in a specific location or
in a specific floor with a preferred customer.
[0035] A dedicated cable try casing (not shown in drawings for the purpose of
clarity) is fastened inside the cabinet in both the above mentioned
embodiments to draw electrical wires, data cables and other peripheral
connecting cables inside and to way out towards the outside of the cabinet
respectively to not to interest each and every line for safety and proper working
12
of the computer that a person of ordinary skill in the area would understand the
concept.
[0036] The comprehensive security enclosure cpu cabinet of above
embodiments in the present invention is fixed upon the cpu after the cpu is
connected with all the peripheral components as follows:
? At first based on the client preference a custom built Security enclosure is
selected from the described embodiments and assembled to setting with
spot welding and fastness.
? The security enclosure is fitted with CPU to secure towards Unauthorized
access, the electrical wires and data cables are fixed to a dedicated
casings provided inside the cabinet to Prevent unintentional or
mischievous loose connection and the cables.
? Then the wires and cables are drawn out of the security enclosure via
various cut outs provided to the cabinet sealed with electrical grommets
to reduce electromagnetic (EM) interference.
Then the security enclosure is provided with a smart grounding cable inside
the security enclosure to eliminate electrical grounding problems [0037] The
cabinets shown in the present invention is versatile and attractive, and it makes
work spaces more flexible and versatile and more aesthetically appealing as
well. The security enclosure may be placed under a work surface or it may
stand alone. Further, a decorative cover may be placed on top of the cabinet.
[0038] The present invention has improved the defects in the prior art, such as
the computer casing is fixed, the maintenance, updating and expansion are
difficult.
[0039] Although the present invention has been described with reference to
13
the preferred embodiments, it will be understood that the invention is not
limited to the details described thereof. Various substitutions and
modifications have been suggested in the foregoing description, and others will
occur to those of ordinary skill in the art. Therefore, all such substitutions and
modifications are intended to be embraced within the scope of the invention as
defined in the appended claims.
[0040] Advantages of the present invention:
? The security enclosure package of the present invention will provide
comprehensive security for the computing device or IT hardware from
unauthorized movement of peripherals and restrict the access to inside
the computing device.
? Restrict unintentional or mischievous loose connection of peripherals to
computing device
? Eliminates potential electrical grounding problems
? Eliminates potential EM interference and clutter free elegant look to
office environment.
? Provides convenient management of locking and unlocking arrangement
? Reduces downtime of device due to mishandling of device intentionally
or unintentionally.
? Allow users to continue their operations / work without any change, as it
was done, prior to fixing the security enclosure.
14
REFERENCE NUMERALS
101 Top Cover
103 Bottom Cover
105 Cable guides
107 Mounting clamp
109 Rivet
111 Air vents
201 Rear Cover
203 Hinges
205 Smart grounding cable
207 Lock
209 Lock mount
211 Lock plate
213 air vents
215 Cable guides , Claims:CLAIMS
We claim,
1. Comprehensive security enclosure CPU cabinet for thin client CPU model or tower CPU model, comprising of
a customized cabinet fastened based upon the client preferences comprising:
An opening door at the front portion;
One or more cable guides (105, 215);
A rear cover with one or more sets of air vents (111, 213);
One or more cable trays fastened inside the cabinet;
One or more clamping (107) types attached to the rear cover;
A lock (207) set for accommodating separate racks inside the cabinet; and
Hinges (203) attached at one side of the inside rear cover;
a mechanical lock set; and
a centralized universal key.
2. The CPU cabinet as claimed in claim 1, wherein the cabinet is made from steel, metal, plastic and other materials fastened on spot besides a movable door fixed with a shaft inserted at plurality of sleeves provided on alternative sides of two adjacent cabinet covers.
3. The CPU cabinet as claimed in claim 1, wherein one or more lock (207) sets with a lock plate (211) and a lock mount (209) are arranged to form one or more separate rack for placing the components like RAM, ROM, Storage devices etc.,
4. The CPU cabinet as claimed in claim 1, wherein one or more cable try are fastened inside the cabinet to fix the flow of cables from one component to other component and to outwards in a dedicated casing to overcome the short circuit issues.
5. The CPU cabinet as claimed in claim 1, wherein the hinges (203) are attached to one side of the inside rear cover for fixing smart grounding cable (205) in one embodiment to shorten the electric grounding problems.
6. The CPU cabinet as claimed in claim 1, wherein one or more cable guides (105, 215) catered either on top and side covers of cabinet with electric grommet to draw electric wires and data cables in and out of cabinet and to avoid electromagnetic interference.
7. The CPU cabinet as claimed in claim 1, wherein the rear cover / bottom cover (103) is provided with air vents (111, 213) to flow the air in and out of cabinet to maintain a constant temperature inside the cabinet.
8. The CPU cabinet as claimed in claim 1, wherein one or more clamping arrangements (107, 109) are fastened towards the outer side of rear cover to place or to fix the cabinet at any preferred location.
9. The CPU cabinet as claimed in claim 1, wherein a mechanical lock is fastened to the movable door arrangement and is provided with a customized central key to maintain all the cabinets.
10. CPU cabinet installation method, comprising the steps of:
a. Selecting a custom built cabinet based on the client preference and
assembled with spot welding and fastness.
b. Placing a CPU inside the cabinet along with some peripherals like storage devices, RAM etc. in separate racks fastened at inner side to the covers of cabinet.
c. Drawing and fixing the electrical wires and data cables to dedicated
casings provided inside the cabinet.
d. Fastening a smart grounding cable to the hinges arranged inside the
cabinet for minimizing electric grounding issues.
e. Connecting the electric wires and data cables that are drawn out of the cabinet via cable guides sealed with electrical grommets to a monitor and other components at respective places to work continuously without any effect to the productivity.
f. After properly assembling all the connections, the entire cabinet is closed and locked with a centralized universal key to secure the CPU along with the peripherals and accessories and forbidding un authorised access to inside of the CPU or un authorised access to its cables, peripherals and accessories, allowing the users to continuously use the computer, as they were using earlier.
| # | Name | Date |
|---|---|---|
| 1 | 202241072724-STATEMENT OF UNDERTAKING (FORM 3) [15-12-2022(online)].pdf | 2022-12-15 |
| 2 | 202241072724-POWER OF AUTHORITY [15-12-2022(online)].pdf | 2022-12-15 |
| 3 | 202241072724-FORM FOR SMALL ENTITY(FORM-28) [15-12-2022(online)].pdf | 2022-12-15 |
| 4 | 202241072724-FORM FOR SMALL ENTITY [15-12-2022(online)].pdf | 2022-12-15 |
| 5 | 202241072724-FORM 1 [15-12-2022(online)].pdf | 2022-12-15 |
| 6 | 202241072724-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [15-12-2022(online)].pdf | 2022-12-15 |
| 7 | 202241072724-EVIDENCE FOR REGISTRATION UNDER SSI [15-12-2022(online)].pdf | 2022-12-15 |
| 8 | 202241072724-DRAWINGS [15-12-2022(online)].pdf | 2022-12-15 |
| 9 | 202241072724-DECLARATION OF INVENTORSHIP (FORM 5) [15-12-2022(online)].pdf | 2022-12-15 |
| 10 | 202241072724-COMPLETE SPECIFICATION [15-12-2022(online)].pdf | 2022-12-15 |
| 11 | 202241072724-Correspondence_Form-1, Form-5, POA, Form-28 And Msme Certificate_19-12-2022.pdf | 2022-12-19 |
| 12 | 202241072724-FORM-9 [16-06-2023(online)].pdf | 2023-06-16 |
| 13 | 202241072724-RELEVANT DOCUMENTS [22-08-2023(online)].pdf | 2023-08-22 |
| 14 | 202241072724-POA [22-08-2023(online)].pdf | 2023-08-22 |
| 15 | 202241072724-MSME CERTIFICATE [22-08-2023(online)].pdf | 2023-08-22 |
| 16 | 202241072724-FORM28 [22-08-2023(online)].pdf | 2023-08-22 |
| 17 | 202241072724-FORM 18A [22-08-2023(online)].pdf | 2023-08-22 |
| 18 | 202241072724-FORM 13 [22-08-2023(online)].pdf | 2023-08-22 |
| 19 | 202241072724-FER.pdf | 2023-08-31 |
| 20 | 202241072724-Power of Attorney-060923.pdf | 2023-10-13 |
| 21 | 202241072724-Form 13-060923.pdf | 2023-10-13 |
| 22 | 202241072724-Form 1-060923.pdf | 2023-10-13 |
| 23 | 202241072724-ENDORSEMENT BY INVENTORS [14-12-2023(online)].pdf | 2023-12-14 |
| 24 | 202241072724-FORM 3 [21-01-2024(online)].pdf | 2024-01-21 |
| 25 | 202241072724-FER_SER_REPLY [21-01-2024(online)].pdf | 2024-01-21 |
| 26 | 202241072724-ENDORSEMENT BY INVENTORS [21-01-2024(online)].pdf | 2024-01-21 |
| 27 | 202241072724-CORRESPONDENCE [21-01-2024(online)].pdf | 2024-01-21 |
| 28 | 202241072724-CLAIMS [21-01-2024(online)].pdf | 2024-01-21 |
| 29 | 202241072724-US(14)-HearingNotice-(HearingDate-22-02-2024).pdf | 2024-01-23 |
| 30 | 202241072724-Correspondence to notify the Controller [20-02-2024(online)].pdf | 2024-02-20 |
| 31 | 202241072724-Written submissions and relevant documents [28-02-2024(online)].pdf | 2024-02-28 |
| 32 | 202241072724-Annexure [28-02-2024(online)].pdf | 2024-02-28 |
| 33 | 202241072724-PatentCertificate19-03-2024.pdf | 2024-03-19 |
| 34 | 202241072724-IntimationOfGrant19-03-2024.pdf | 2024-03-19 |
| 1 | SearchHistoryE_23-08-2023.pdf |