Tamper prevention system having a shroud to partially cover a release mechanism

ABSTRACT

Apparatuses, devices, systems, and methods are provided for prevention of tampering with cables and associated systems. In one aspect, an anti-tamper adapter is provided that can inhibit or prohibit cable tampering for existing cables. In a further aspect, dummy plugs or blocking plugs can employ disclosed anti-tamper adapters to facilitate blocking ports or outlets that are intended to remain undisturbed for a period of time. The provided embodiments can economically and flexibly facilitate cable tamper prevention in a wide array of cable technologies.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. patent applicationSer. No. 12/851,865, filed on Aug. 6, 2010, and entitled CABLE TAMPERPREVENTION, which application in turn claims priority to U.S.Provisional Patent Application Ser. No. 61/327,493, filed on Apr. 23,2010, and entitled CABLE TAMPER PREVENTION, the entireties of whichapplications are hereby incorporated by reference.

FIELD OF THE INVENTION

The subject disclosure is directed to cable tamper prevention and, morespecifically, to apparatuses, systems, and methods pertaining topreventing tampering with communications cables and associated systems.

BACKGROUND OF THE INVENTION

Racks, frames, cabinets and the like (referred to herein as “racks” or“equipment racks”) support equipment components such as computer andother electronic equipment units, e.g., servers, communicationsswitches, patch panels, enclosures and the like. The equipmentcomponents can include patch panels, equipment units, equipment facepanels, and the like extending between the vertical members along thefront side of the rack. These panels can have slots and other openingsfor mounting of patch blocks of outlets, adapters, or other devices orto allow access to control portions of the equipment components. Forexample, a patch panel typically comprises a connecting hardware system(e.g., arrays of outlets, ports, or adapters, etc.) that facilitatescable termination, connection, and cabling administration via the useand administration of standard-conforming adapters or plugs.

These connections are made by cables, cords, or other categories ofwires (referred to hereinafter as “cables”). Interconnect cables areprimarily used as intra-equipment jumpers or patch cords and aregenerally available in standard lengths and colors. For example, sometypical applications include patching active electronics to nearby patchpanels, cable cross-connection on distribution frames, and connectingwork area outlets to terminal equipment. Patch cords typically comprisea length of cable with a plug or outlet on one, or both ends.

In addition, these racks can support a vast array of equipmentcomponents including patch panels and other equipment having many portsconnected to various types of cables. For instance, the equipmentcomponents can be used for telephony, networking, and othercommunication related applications using, for example, fiber and coppercables. As a result, the associated computer networks and services canprovide a wide array of efficient computing capabilities throughout alarge work area, while providing mission critical services essential tothe function of an organization alongside less essential services.

Due to the sensitive nature of the equipment components housed in theseracks, ideally, the racks can be located in access-restricted areas toprevent undesired access by unauthorized personnel. At the same time,racks located in restricted access areas can be arranged in such a wayto provide easy access to the patch panels, equipment units, equipmentface panels, and the like to expose arrays of outlet ports tomaintenance personnel. However, even in such restricted access areas theequipment components and associated connections can be subject toinadvertent tampering (e.g., removal of the wrong cable, etc.).

In other situations, economic or other considerations can dictate thatsuch access to the outlet ports are not as strictly controlled (e.g., atemporary development setup, a startup company lacking financialresources to implement rigorous access controls, equipment racks locatednear office or common areas, etc.). As a result, access to suchconnections can be poorly controlled and subject to casual tamperingwith equipment component connections by unauthorized personnel as wellas inadvertent tampering.

In yet other situations, special administrative controls can beimplemented that require heightened awareness of potentially affectedequipment when performing maintenance in restricted access areas. Forexample, when mission critical equipment components are collocated withnon-essential equipment components, system administrators can desireimplementing special administrative or logistical controls forperforming maintenance in such areas. Accordingly, to preventinadvertent interruption of essential services associated with theconnection of mission critical equipment components when performingmaintenance on non-essential equipment components, system administratorscan require, e.g., physical separation of different classes of equipmentcomponents, two-party verification of equipment components and/orconnections prior to commencing work, special color coding, etc.However, such administrative measures can be costly and can still besubject to human error.

Thus, in either situation, ensuring physical security to preventunauthorized tampering with the equipment components and associatedconnections can be a challenge either due to cost considerations,manpower considerations, space considerations, etc. For example, whilesome methods to prevent cable and connection tampering have beendescribed, still other methods focus on the use of electronic orsoftware based connection-specific alarms. However, such methods aremerely reactive rather than proactive. That is, while suchconnection-specific alarms can alert personnel to unexpected connectioninterruption due to tampering or other causes, the methods do noteffectively prevent tampering. In other examples, where a mechanismnotifies system administrators for a network and records events when anenclosure, cover, or door is opened or removed, such mechanisms can failto address inadvertent tampering or unintended disconnection ofessential equipment components by authorized personnel.

In still other outlet-based tamper prevention devices, conventionaldevices can require proprietary outlets or plugs, re-termination of anexisting patch cable, excessive manpower required for installation orassembly, and/or excessive manpower for removal re-termination if suchdevices are no longer desired or warranted. In addition, in still otheroutlet-based tamper prevention devices, if such devices are notreusable, then the use thereof can be a significant cost factor inattempting to thwart tampering with equipment components and associatedconnections.

Although the above-identified methods or devices can work for theirintended purposes, such methods or devices do not effectively addressthe considerations as described (e.g., cost, proprietary outlets orplugs, ease and flexibility of use, manpower requirements, raisingawareness of mission critical connections, proactive prevention oftampering, inefficient use of costly equipment rack space, etc.). It isthus desired to provide enhanced cable anti-tamper devices, systems, andmethodologies for cable tamper prevention that improve upon these andother deficiencies of conventional tamper prevention systems.

SUMMARY OF THE INVENTION

The following presents a simplified summary of the specification toprovide a basic understanding of some aspects of the specification. Thissummary is not an extensive overview of the specification. It isintended to neither identify key or critical elements of thespecification nor delineate any scope particular to any embodiments ofthe specification, or any scope of the claims. Its sole purpose is topresent some concepts of the specification in a simplified form as aprelude to the more detailed description that is presented later.

In various embodiments, the disclosed subject matter providesapparatuses, devices, systems, and methodologies for prevention oftampering with cables and associated systems. In one aspect, ananti-tamper adapter is provided that can inhibit or prohibit cabletampering for existing cables. In further aspects, the providedembodiments can economically and flexibly facilitate cable tamperprevention in a wide array of cable technologies.

Thus, in various embodiments, cable tamper prevention systems areprovided that can be adapted to accept an existing or standardcommunications plug in a reversible manner. The provided systems caninhibit actuation of the release mechanism when the standardcommunications plug is attached to an associated outlet. In othernon-limiting implementations, a dummy plug or blocking plug can beadapted to employ disclosed apparatuses, devices, systems, andmethodologies for tamper prevention that can facilitate blocking portsor outlets that are intended to remain undisturbed for a period of time.

Further embodiments of the disclosed subject matter provide cableanti-tamper adapters having a resilient catch in a channel of an adapterbody that reversibly engages a recess in a plug. In an aspect, theresilient catch can limit plug travel in the adapter body in areversible manner to allow removal of the plug for reuse of anassociated cable without the cable anti-tamper adapter.

In yet other embodiments, methodologies for cable tamper prevention caninclude locking a plug into an anti-tamper adapter (e.g., reversibly orotherwise) to align a portion of the anti-tamper adapter that inhibitsactuation of a release mechanism associated with the plug.

These and other additional features of the disclosed subject matter aredescribed in more detail below.

BRIEF DESCRIPTION OF THE DRAWINGS

The devices, components, assemblies, structures, and methodologies ofthe disclosed subject matter are further described with reference to theaccompanying drawings in which:

FIG. 1 depicts a front perspective view of an exemplary prior art patchpanel, outlets, and patch cables in an equipment rack suitable for usewith exemplary embodiments of the disclosed subject matter;

FIG. 2 illustrates an exemplary prior art fiber optic adapter panel,adapters, and patch cables suitable for use with further embodiments ofthe disclosed subject matter;

FIG. 3 illustrates an exemplary prior art Registered Jack (RJ) typeequipment panel, outlets, and patch cables suitable for use withembodiments as described herein;

FIGS. 4-6 depict perspective and plan views of an RJ-45 plug andassociated connector illustrating an exemplary application of disclosedembodiments;

FIG. 7 depicts views of an exemplary embodiment of an anti-tamperadapter suitable for use with RJ-type plugs as described herein;

FIGS. 8-9 depict perspective views of a non-limiting implementation ofan anti-tamper adapter suitable for use with RJ-type plugs;

FIG. 10 depicts a cross-section of a perspective view for exemplaryembodiments of an anti-tamper adapter suitable for use with RJ-typeplugs as described herein;

FIG. 11 depicts views of an exemplary non-limiting removal tool or keyfor disconnecting a connected RJ-type plug using exemplary embodimentsof an anti-tamper adapter as described herein;

FIGS. 12-13 depict perspective views illustrating further aspects of anexemplary removal tool or key for disconnecting a connected RJ-type plugusing embodiments of an anti-tamper adapter as described herein;

FIG. 14 depicts a cross-sectional perspective view of a removal tool orkey for disconnecting a connected RJ-type plug using an exemplaryanti-tamper adapter of the disclosed subject matter;

FIG. 15 illustrates an exploded view of an RJ-type plug and exemplaryembodiments of an anti-tamper adapter and removal tool or key fordisconnecting a connected RJ-type plug as described herein;

FIG. 16 illustrates a cross-sectional perspective view of an RJ-typeplug depicting various aspects of an installed anti-tamper adapter;

FIG. 17 depicts a cross-sectional perspective view of a disclosedanti-tamper adapter illustrating various aspects of a non-limitingremoval tool or key for disconnecting a connected RJ-type plug employingthe disclosed anti-tamper adapter;

FIG. 18 depicts a cross-sectional perspective view of a non-limitingremoval tool or key for disconnecting a connected RJ-type plug employingan exemplary anti-tamper adapter as described herein, where theanti-tamper adapter is omitted for clarity;

FIG. 19 illustrates a cross-sectional perspective view of an RJ-typeplug depicting various aspects of an exemplary anti-tamper adapter andremoval tool or key for disconnecting a connected RJ-type plug employingthe anti-tamper adapter;

FIGS. 20-21 illustrate further aspects of an RJ-type plug and anexemplary anti-tamper adapter as described herein;

FIG. 22 depicts still further aspects of an RJ-type plug, an exemplaryanti-tamper adapter, and removal tool or key for disconnecting aconnected RJ-type plug employing the anti-tamper adapter;

FIG. 23 illustrates further aspects of an exemplary removal tool or keyfor disconnecting a connected RJ-type plug employing furthernon-limiting embodiments of the disclosed anti-tamper adapter;

FIG. 24 illustrates additional aspects of an exemplary removal tool orkey for disconnecting a connected RJ-type plug and further non-limitingembodiments of an anti-tamper adapter as described herein;

FIG. 25 depicts a perspective view of further non-limiting embodimentsof an anti-tamper adapter suitable for use with RJ-type plugs asdescribed herein;

FIG. 26 depicts an exemplary anti-tamper adapter and a furthernon-limiting embodiment of a removal tool or key for connecting anddisconnecting a connected RJ-type plug using exemplary embodiments of ananti-tamper adapter;

FIG. 27 depicts a perspective view further illustrating aspects of anexemplary removal tool or key for connecting and disconnecting aconnected RJ-type plug using embodiments of an anti-tamper adapter;

FIG. 28 illustrates an exploded view of an RJ-type plug and exemplaryembodiments of an anti-tamper adapter and removal tool or key forconnecting and disconnecting a connected RJ-type plug, where the removaltool or key for connecting and disconnecting a connected RJ-type plug isdepicted with an insertion end of the removal tool or key adapted to beinserted into an exemplary anti-tamper adapter;

FIG. 29 depicts cross-sectional views for exemplary embodiments of ananti-tamper adapter suitable for use with RJ-type plugs, where theinsertion end of the removal tool or key is illustrated at variouspositions with respect to aspects of an exemplary anti-tamper adapter;

FIG. 30 depicts cross-sectional views for exemplary embodiments of ananti-tamper adapter, where an assembly comprising a removal tool or keyand an exemplary anti-tamper adapter are depicted at various positionswith respect to an exemplary outlet;

FIG. 31 illustrates an exploded view of an RJ-type plug and exemplaryembodiments of an anti-tamper adapter and removal tool or key forconnecting and disconnecting a connected RJ-type plug, where the removaltool or key for connecting and disconnecting a connected RJ-type plug isdepicted with an extraction end of the removal tool or key adapted to beinserted into an exemplary anti-tamper adapter;

FIG. 32 depicts cross-sectional views for exemplary embodiments of ananti-tamper adapter suitable for use with RJ-type plugs, where theextraction end of the removal tool or key is illustrated at variouspositions with respect to aspects of an exemplary anti-tamper adapterfitted to an RJ-type plug and connected to an exemplary outlet;

FIG. 33 depicts cross-sectional views for exemplary embodiments of ananti-tamper adapter, where aspects of a removal tool or key are depictedat various extents of insertion with respect to an exemplary anti-tamperadapter connected to an exemplary outlet;

FIG. 34 depicts perspective views of further non-limiting embodiments ofa removal tool or key suitable for use with an exemplary anti-tamperadapter connected as described;

FIG. 35 depicts a cross-sectional view of exemplary embodiments of ananti-tamper adapter, where aspects of a removal tool or key are depictedwith respect to an exemplary anti-tamper fitted to an RJ-type plug;

FIG. 36 illustrates further aspects of exemplary embodiments of ananti-tamper adapter, where an anti-tamper adapter is depicted in thecontext of a plug connected to an exemplary outlet;

FIGS. 37-39 depict further exemplary embodiments of an anti-tamperadapter, where aspects of a dummy or blocking RJ-type plug areillustrated; and

FIG. 40 depicts a block diagram demonstrating methodologies for cabletamper prevention in accordance with aspects of the disclosed subjectmatter.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS Overview

As used herein, the term “equipment component” is intended to refer toequipment components (e.g., enclosures, equipment units, patch panels,multimedia units, servers, communications switches, recording andplayback devices, home computer and networking devices), whetherrack-mountable or standalone (e.g., not rack-mountable) that can benefitfrom one or more embodiments of the disclosed subject matter.Additionally, as used herein, the terms “integrated” and “integrating”are intended to refer to the act of incorporating, forming, or unitingotherwise separate component parts into a whole. Moreover, the terms“plug,” “standard communications plug,” “blocking plug,” and “dummyplug” are typically used herein to denote that a dummy or blocking plugcan be a facsimile of a “plug” or “standard communications plug” thatcan comprise features and spatial relations that provide a formcomplementary to an outlet associated with the “plug.” That is, a “dummyplug” or a “blocking plug” can comprise the minimum features that allowit to be plugged into an outlet associated with the “plug” in additionto having features which allow the “dummy plug” or “blocking plug” toemploy disclosed apparatuses, devices, systems, and methodologies fortamper prevention. Accordingly, it can be understood that in somecontexts, the terms “plug,” “blocking plug,” and “dummy plug” can beused interchangeably.

While a brief overview is provided, copper cables, and associatedoutlets, plugs, patch panels etc., as well as fiber optic cables, andassociated outlets, adapters, patch panels etc., are described hereinfor the purposes of illustration and not limitation. In addition tocopper cables etc., and fiber optic cables etc., the non-limiting terms“cable” and “plug” are intended to encompass any of a family oftechnologies designed to connect and transfer signals or electricalcurrent between and/or among equipment components (e.g., power cables,patch cables, cords, patch cords, etc.). Additionally, while RegisteredJack (RJ) type outlets and plugs (e.g., RJ-45, RJ-11, etc.) aredescribed herein for the purpose of illustrating various non-limitingimplementations, it should be appreciated that the disclosed subjectmatter is not so limited. For example, one skilled in the art canappreciate that the illustrative embodiments can have application withrespect to other cable, plug, and outlet technologies.

As described in the background, conventional cable tamper preventiondevices and methods suffer from drawbacks associated with excessivecost, use of proprietary outlets or plugs, difficulty and inflexibilityof use, excessive manpower, reactive efforts to address tampering,inefficient use of costly equipment rack space, etc. These and otherdrawbacks can be appreciated upon review of FIGS. 1-6, which provideadditional context surrounding the embodiments of the disclosed subjectmatter.

For example, FIG. 1 depicts a front perspective view 100 of an exemplaryone rack unit (1RU) patch panel 102, outlets 104, and patch cables 106in an equipment rack 108 suitable for use with exemplary embodiments ofthe disclosed subject matter. Typically, racks located in restrictedaccess areas can be arranged in such a way to provide easy access to thepatch panel 102, equipment units, equipment face panels, and the like toexpose arrays of outlets 104 or ports to maintenance personnel. As canbe seen in FIG. 1, the close proximity of adjacent outlets 104 canprovide an opportunity for inadvertent tampering that can cause unwantedservice interruption. In less restricted areas, patch panel 102 canprovide similar access, but can be further subject to unauthorizedtampering due to less strictly controlled physical access to areascontaining rack 108. As a result, various embodiments of the disclosedsubject matter, can provide an additional measure of cable tamperingprevention for outlets 104 and attached patch cables 106, for example,whether the tampering is inadvertent (e.g., wrong outlet 104 ismistakenly selected for disconnection) or otherwise (e.g., intentionalunauthorized access of outlets 104 and attached patch cables 106).

FIG. 2 illustrates an exemplary fiber optic adapter panel, adapters, andpatch cables suitable for use with further embodiments of the disclosedsubject matter. For instance, FIG. 2 depicts an exemplary LucentConnector (LC) fiber optic adapter plate assembly 200 in which detailsof the attachment of adapter 202 to adapter panel 204 and fiber opticcable 206 to fiber optic adapter 202 are shown to further illustrate theclose proximity with which different connections can be made. As can beseen in FIG. 2, fiber optic cable 206, terminated with plug 208comprising resilient latch 210, can be plugged into and retained infiber optic adapter 202 by virtue of latch protrusions 212 that mate toand engage with corresponding recesses (not shown) in fiber opticadapter 202 as plug 208 is inserted into fiber optic adapter 202.Typically, until such time as resilient latch 210 is depressed orotherwise manipulated to disengage latch protrusions 212 from thecorresponding recesses in fiber optic adapter 202, fiber optic cable 206will remain connected to fiber optic adapter 202. However, due to theclose proximity of adjacent fiber optic adapters 202 (or outlets 104 ofFIG. 1), such connections are subject to inadvertent tampering (e.g.,wrong fiber optic adapter 202 is mistakenly selected for disconnection).

FIG. 3 illustrates 300 an exemplary RJ type equipment panel, outlets,and patch cables suitable for use with embodiments as described herein,in which details of the attachment of outlet 302 to equipment panel 304and patch cable 306 to outlet 302 are depicted. FIG. 3 depicts an RJ-45plug 308 with shroud 310 adjacent to an RJ-11 plug 308. As can be seenin FIG. 3, patch cable 306, terminated with plug 308 comprisingresilient latch 312, can be plugged into and retained to outlet 302 byvirtue of latch protrusions (e.g., a shoulder) (not shown) that mate toand engage with corresponding recesses 314 in outlet 302 as plug 308 isinserted into outlet 302. As described above, until such time asresilient latch 312 is depressed or otherwise manipulated to disengagelatch protrusions from the corresponding recesses 314 in outlet 302,patch cable 306 will remain connected to outlet 302. As furtherdescribed above, due to the close proximity of adjacent outlets 302 (oroutlets 104 of FIG. 1), such connections are subject to inadvertenttampering (e.g., wrong outlet 302 is mistakenly selected fordisconnection).

FIG. 4 depicts a perspective view of an RJ-45 plug 308 and associatedoutlet 302 illustrating an exemplary application of disclosedembodiments, in which details of patch cable 306 and outlet 302 areshown as described above regarding FIG. 3. As can be seen in FIG. 4,which depicts a conventional RJ-45 plug 308, the plug 308 can comprise aplug body 402 having standardized external dimensions, as well as arecess 404 molded into plug body 402 and/or formed during patch cable306 termination, and shoulder 406. According to convention, thedirection of insertion (e.g., direction of normal insertion) orconnection of plug 308 into outlet 302 is in the direction indicated at408. In addition, plug 308 can be described as having a front portion(e.g., facing outlet 302) facing the direction of insertion 408 and arear portion (opposite the front portion), where FIG. 4 depicts plug 308as being viewed from the rear of the plug 308 as indicated. According tothe orientation given in FIG. 4, FIG. 5 depicts plan views of an RJ-45plug 308, and FIG. 6 depicts perspective views of an RJ-45 plug 308further illustrating applications of disclosed embodiments.

For instance, FIG. 5 depicts a left side view 502, a top view 504, abottom view 506, a front end view 508, and a rear end view 510. Asdescribed, plug 308 can comprise a plug body 402 having standardizedexternal dimensions, as well as a recess 404 molded into plug body 402and/or formed during patch cable 306 termination, and a shoulder 406. Inaddition, plug 308 can comprise a length of cable 512 to form patchcable 306, for example. In addition, a resilient latch 312 that, whenplug 308 is plugged into outlet 302, latch protrusions 514 (e.g., ashoulder) can mate to and engage with corresponding recesses 314 inoutlet 302 as plug 308 is inserted into outlet 302. FIG. 5 also depictsan array 516 of conductors that engage a corresponding array ofconductors in outlet 302 to provide communication signal paths.

Thus, an RJ-45 outlet 302 can receive an RJ-45 plug 308 connectingconductors of cable 512 through the array 516 of conductors to thecorresponding array of conductors in outlet 302 to provide communicationsignal paths to an equipment component utilizing outlet 302. Asdescribed above, until such time as resilient latch 312 is depressed orotherwise manipulated to disengage latch protrusions 514 (e.g., ashoulder) from the corresponding recesses 314 in outlet 302, patch cable306 will remain connected to outlet 302. As further described above, dueto the close proximity of adjacent outlets 302 (or outlets 104 of FIG.1, adjacent fiber optic adapters 202 of FIG. 2, etc.), such connectionsare subject to inadvertent tampering (e.g., wrong outlet 302 ismistakenly selected for disconnection, etc.). FIG. 6 depicts perspectiveviews of an RJ-45 plug 308 as viewed from the top right front 602 andthe bottom right front 604 according to the orientations given.

Having provided an overview of cable tamper prevention problems andsolutions, in various embodiments, the disclosed subject matter providescable tamper prevention apparatuses, systems, and methodologies forcable tamper prevention. In one non-limiting aspect, the disclosedsubject matter improves upon conventional cable tamper preventionmethodologies by proactively inhibiting cable tampering while avoidingthe drawbacks associated proprietary plugs and outlets.

As described above, copper cabling, outlets, patch panels, plugs, RJtype plugs, fiber optic cabling, connectors, patch panels, adapters,etc., are described, or depicted herein for the purposes of illustrationand not limitation. Thus, variations of the disclosed embodiments assuggested by the disclosed apparatuses, systems and methodologies areintended to be encompassed within the scope of the subject matterdisclosed herein. For example, the various embodiments of theapparatuses, systems, and methodologies of the disclosed subject mattercan include additional existing or as yet developed types of cabling,plugs, and outlets or adapters.

As a further example, while RJ-45 plugs 308 have been depicted forillustration and not limitation, various equipment component connectionsand patch cables (e.g., such as fiber optic, audio, video, power, etc.)that include retention mechanisms between the plug and outlet areintended to be encompassed within the scope of the subject matterdisclosed herein. Moreover, as further described below regarding FIG.37, for example, a dummy or blocking plug adapted to the form of astandard plug (e.g., such as an RJ-Type, fiber optic, audio, video,power, etc.) outlet or complementary to an outlet associated with theplug can employ disclosed apparatuses, devices, systems, andmethodologies for tamper prevention that can facilitate blocking portsthat are intended to remain undisturbed for a period of time. Inaddition, variations encompassed within the scope of the disclosedsubject matter can include separation of component parts intosubassemblies or further integration of some components or parts intoassemblies, variation in the location, number, and/or arrangement ofcomponents or parts, etc.

Exemplary Cable Tamper Prevention

In view of the above described deficiencies, various embodiments of thedisclosed subject matter can facilitate cable tamper prevention withoutrequiring re-termination of existing cables. For example, FIG. 7 depictsviews of an exemplary embodiment of an anti-tamper adapter or apparatus700 suitable for use with RJ-type plugs 308 as described herein. Forinstance, FIG. 7 depicts a left side view 702, a top view 704, a bottomview 706, a front end view 708, and a rear end view 710 of anti-tamperadapter 700 according to the orientation as described with regard toFIGS. 4-6. FIGS. 8-9 depict perspective views 802 (front right bottom),804 (front right top), 902 (rear left bottom), and 904 (rear right top)of a non-limiting implementation of an anti-tamper adapter 700 suitablefor use with RJ-type plugs 308 (or suitably adapted dummy or blockingplugs). In addition, FIG. 10 depicts a cross-section 1000 of aperspective view for exemplary embodiments of an anti-tamper adapter 700suitable for use with RJ-type plugs 308 (or suitably adapted dummy orblocking plugs) as described herein.

According to various embodiments, the disclosed subject matter providesan anti-tamper adapter 700 comprising a body 712 having a channel atleast partially defined by a rear opening 714 in the body 712 (e.g., atthe rear portion of the channel). The body 712 can accept a plug 308(e.g., a standardized communications plug, an existing plug, forexample, that has been terminated, an RJ type plug, a fiber optics plug,other plug, dummy plug, or blocking plug, etc.). Note that the rearportion can be sized to allow the plug 308 to pass into the body 712 ina direction coincident with a direction of normal insertion of the plug308 into an associated outlet 302. For example, plug 308 is normallyinserted from the front of plug 308 toward the outlet 302. In a similardirection (e.g., in a direction coincident with a direction of normalinsertion), front of plug 308 can be inserted into body 712 at the rearportion of the channel.

According to an aspect, body 712 can comprise one or more shoulder(s) orprotrusion(s) 716 that can extend into the channel located proximate thefront portion of the channel (e.g., the portion of the body 712 oppositethe rear portion). The one or more shoulder(s) or protrusions 716 canlimit plug 308 travel in the direction coincident with the direction ofnormal insertion. For instance, shoulders 716 can engage shoulder 406 ofplug 308 as plug 308 is inserted into body 712. Thus, the one or moreshoulder(s) or protrusion(s) 716 in the channel can limit the maximumtravel of plug 308 into body 712 in the direction of normal insertion.

In a further aspect, body 712 can comprise one or more resilient catchesor protrusion(s) 718 in the channel that can reversibly engage one ormore recesses 404 in plug 308. Accordingly, resilient catches orprotrusion(s) 718 can limit plug 308 travel within the body 712 at leastin the direction opposite the direction of normal insertion. Forinstance, as plug 308 is inserted into body 712, resilient catches orprotrusion(s) 718 can extend outward from the channel, allowing one ormore recesses 404 to be positioned under the resilient catches orprotrusion(s) 718. As the one or more recesses 404 pass under the one ormore resilient catches or protrusion(s) 718, the one or more resilientcatches or protrusion(s) 718 can at first spring away from the channel,and then can return to a resting position in the one or more recesses404 of plug 308.

As a result, the one or more resilient catches or protrusion(s) 718, inconjunction with the one or more recesses 404 of plug 308, canreversibly or releasably lock or fix the plug 308 into a predeterminedposition in the anti-tamper adapter 700. Thus, in cooperation with theone or more shoulder(s) or protrusion(s) 716, or standing alone with theone or more recesses 404 of plug 308, the one or more resilient catchesor protrusion(s) 718 can reversibly or releasably lock or fix the plug308 into a predetermined position in the anti-tamper adapter 700.Consequently, various embodiments can advantageously be retrofitted toexisting plugs (e.g., plugs 308, 208, etc.) without requiringre-termination of existing patch cables.

As a further advantage, various embodiments of the exemplary anti-tamperadapter 700 can be removed and reused due, in part, to the reversible orreleasable manner of locking or fixing to the existing plug 308. Forexample, once it is determined that tamper prevention via anti-tamperadapter 700 is no longer desired, the anti-tamper adapter 700 can beunlocked and removed from plug 308 leaving the plug 308 in its originalunaltered condition. As a further example, by manipulating the one ormore resilient catches or protrusion(s) 718 out of the one or morerecesses 404 of plug 308, the plug 308 can be moved from itspredetermined position in the anti-tamper adapter 700, and the plug 308can be removed from the anti-tamper adapter 700 in the oppositedirection from which it was inserted into body 712 (e.g., the directionopposite the direction of normal plug 308 insertion). Preferably,various embodiments of the disclosed subject matter can facilitatedisconnecting the plug 308 from the outlet 302 so as to provide accessto the front of plug 308 and anti-tamper adapter 700 before allowing theabove described manipulation (e.g., without destroying or otherwiserendering useless the anti-tamper adapter 700) of the one or moreresilient catches or protrusion(s) 718.

As can be seen from FIGS. 7-10, for example, the one or more resilientcatches or protrusion(s) 718 are depicted, for purposes of illustrationand not limitation, as catches or protrusion(s) 718, formed on asemi-rigid arm 720 molded into body 712, and extending into the channel.However, other mechanisms for reversibly or releasably locking or fixingthe plug 308 into a predetermined position in the anti-tamper adapter700 are contemplated by the disclosed subject matter. For instance,various embodiments employing similar reversibly or releasably lockingor fixing functions can include screws, spring ball and detent, andother means of reversibly or releasably locking or fixing plug 308 intoa predetermined position in the anti-tamper adapter 700.

In addition, for various permanent, semi-permanent, or disposableembodiments of anti-tamper adapter 700, catches or protrusion(s) 718 canbe formed in a manner giving the catches or protrusion(s) 718 lessresilience (e.g., via rigid structures, adhesives, etc.). In suchexemplary non-limiting embodiments, it can be appreciated that attemptsto remove plug 308 from anti-tamper adapter 700 can result inpotentially irretrievable damage to one or more of the plug 308 or theanti-tamper adapter 700. Thus, the various embodiments as describedherein are intended to encompass a wide range of variations suitable forparticular design considerations.

Referring again to FIG. 7, anti-tamper adapter 700 can further comprisea plug release guard or release shroud 722 located on the body 712(e.g., a molded body, etc.) proximate to the front portion of thechannel. The plug release guard or release shroud 722 can at leastpartially surround a plug release or release mechanism (not shown),e.g., resilient latch 210 or 312, of the plug 308. Thus, plug releaseguard or release shroud 722 can inhibit or prevent access and/or inhibitor prevent actuation of the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206) when the plug 308 is inserted into the associated outlet(e.g., outlet 202 or 302), by for example, the close proximity of theplug release guard or release shroud 722 (or housing 724 as furtherdescribed below) to the surface of a panel (204 or 304) supporting theplug 308 attached outlet (e.g., outlet 202 or 302). This close proximitycan prevent normal access (e.g., without a tool or key as describedherein) to one or more sides of the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206). As a result, various embodiments of the anti-tamperadapter 700 can facilitate cable tamper prevention (e.g., eitherinadvertent or intentional) of a plug 308 (or plug 208 of fiber opticcable 206) fitted with an embodiment of anti-tamper adapter 700 when theplug 308 (or plug 208 of fiber optic cable 206) is connected or insertedinto an associated outlet (e.g., outlet 302 or 202 for fiber optic cable206, etc.).

As mentioned above, anti-tamper adapter 700 can further comprise ahousing 724 on body 712 that at least partially surrounds the plugrelease guard or release shroud 722 or release mechanism (not shown),e.g., resilient latch 210 or 213, of the plug 308. Thus, housing 724 caninhibit or prevent access and/or inhibit or prevent actuation of theplug release or release mechanism (e.g., resilient latch 210 or 312) ofthe plug 308 (or plug 208 of fiber optic cable 206) when the plug 308 isinserted into the associated outlet (e.g., outlet 202 or 302). Forinstance, the housing 724 can be positioned relative to the plug releaseguard or release shroud 722, such that it at least partially surroundsthe plug release guard or release shroud 722.

In addition, the housing can further shroud the plug release or releasemechanism (e.g., resilient latch 210 or 312) to prevent or inhibitactuation (e.g., prevent or inhibit normal actuation) of the releasemechanism when the plug 308 (e.g., a standard communications plug suchas a fiber optic plug, and RJ type plug, or communications cable plug,audio plug, video plug, etc.) is attached to an associated outlet (e.g.,outlet 302 or 202 for fiber optic cable 206, etc.). Moreover, housing724 can be located relative to plug release guard or release shroud 722,so as to comprise an access aperture (e.g., 726 of front and rear endviews 708 and 710, respectively) between the housing 724 and the plugrelease guard or release shroud 722 that can permit a removal tool orkey (described below) to be positioned proximate to the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 (orplug 208 of fiber optic cable 206), when the removal tool (describedbelow) is inserted into the cable anti-tamper adapter 700. It can beunderstood that other arrangements or access apertures suitable forpermitting a removal tool (described below) to be positioned proximateto the plug release or release mechanism (e.g., resilient latch 210 or312) of the plug 308 can be contemplated upon consideration of thedisclosed subject matter, for example, regarding FIGS. 23-24 below.

Accordingly, as described above, the close proximity of housing 724 tothe surface of a panel (204 or 304) supporting the plug 308 attachedoutlet (e.g., outlet 202 or 302) can prevent normal access (e.g.,without a tool or key as described herein) to one or more sides of theplug release or release mechanism (e.g., resilient latch 210 or 312) ofthe plug 308 (or plug 208 of fiber optic cable 206). As a result,various embodiments of the anti-tamper adapter 700 can facilitate cabletamper prevention (e.g., either inadvertent or intentional) of a plug308 (or plug 208 of fiber optic cable 206) fitted with an embodiment ofanti-tamper adapter 700 when the plug 308 (or plug 208 of fiber opticcable 206) is connected or inserted into an associated outlet (e.g.,outlet 302 or 202 for fiber optic cable 206). In further non-limitingembodiments as described below, dummy plugs or blocking plugs can beadapted to employ an embodiment of anti-tamper adapter 700 to facilitateblocking ports or outlets that are intended to remain undisturbed for aperiod of time.

Thus, in various aspects, the disclosed subject matter provides cabletamper prevention apparatuses (e.g., anti-tamper adapter 700) that canadvantageously provide cost-effective tamper prevention with or withoutthe use of proprietary outlets or plugs, while offering ease andflexibility of use, and without excessive manpower requirements (e.g.,two party verification of connection during maintenance, rigorous accesscontrols, etc.). As additional advantages, the various embodiments canbe employed to complement reactive efforts to address tampering (e.g.,connection or enclosure based alarms) and can allow more efficient useof costly equipment rack space, for example, where mission criticalservice connection can be located in close proximity to less essentialservice connections.

In a further aspect, various embodiments of anti-tamper adapter 700 canbe comprised of a rigid or semi-rigid material, such as a moldableplastic or polymer, in addition to more rigid materials such, forexample, as metals or ceramics. For instance, a molded plasticanti-tamper adapter 700 can include one or more of a molded body 712, aplug release guard or release shroud 722, and/or a housing 724. In yetanother aspect, plug release guard or release shroud 722, and/or ahousing 724, as well as other components (e.g., 716, 718, etc.), can bemolded integral to molded body 712 or separately and subsequentlyattached or integrated as desired. In a further aspect, the moldableplastic or polymer can be selected based on a color scheme according toan intended use of the anti-tamper adapter 700 (e.g., a standardizedcolor scheme), for example, to signify mission critical serviceconnections, etc.

FIG. 11 depicts views of an exemplary non-limiting removal tool or keyfor disconnecting a connected RJ-type plug using exemplary embodimentsof an anti-tamper adapter as described herein. For instance, FIG. 11depicts a left side view 1102, a top view 1104, a bottom view 1106, afront end view 1108, and a rear end view 1110 of exemplary non-limitingremoval tool or key 1100 according to the orientation as described withregard to FIGS. 4-6. FIGS. 12-13 depict perspective views 1202 (frontright bottom), 1204 (front left top), 1302 (rear right bottom), and 1304(rear left top) illustrating further aspects of an exemplary removaltool or key 1100 for disconnecting a connected RJ-type plug usingembodiments of an anti-tamper adapter 700 as described herein.Additionally, FIG. 14 depicts a cross-sectional perspective view 1400 ofa removal tool or key 1100 for disconnecting a connected RJ-type plug(e.g., plug 308) using an exemplary anti-tamper adapter 700 of thedisclosed subject matter.

According to various embodiments, the disclosed subject matter providesa removal tool or key 1100 comprising a body 1112. According to anaspect, as described above, body 1112 can be comprised of a rigid orsemi-rigid material, such as a moldable plastic or polymer, in additionto more rigid materials such as metals or ceramics. For example, removaltool or key 1100 (e.g., a molded plastic removal tool or key 1100) caninclude one or more of a molded body 1112 and a plug release arm 1114that permits a plug release region 1116 of the removal tool or key 1100to be placed in proximity to a plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206) when the removal tool or key 1100 is inserted into an accessaperture 726 on a anti-tamper adapter 700 as described above.

For instance, the removal tool or key 1100 can permit the plug releaseregion 1116 to enter through the access aperture 726 created by plugrelease guard or release shroud 722 and housing 724, whereas normalmeans (e.g., manual manipulation) to actuate a plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206) would be inhibited or prevented when theplug 308 (or plug 208 of fiber optic cable 206) is connected to outlet302 (or 202) by one or more of the plug release guard or release shroud722 and housing 724. Thus, plug release arm 1114 can permit a plugrelease region 1116 of plug release arm 1114 to selectively manipulatethe plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308 (or plug 208 of fiber optic cable 206), for example,when the plug release arm 1114 is manipulated in a direction orthogonalto the direction of normal insertion of plug 308 as described above.

For instance, plug release arm 1114 can comprise a resilient length of asemi-rigid material as described herein. Thus, application of a force inthe direction indicated by 1118 (e.g., a direction orthogonal to thedirection of normal insertion of plug 308) would cause plug releaseregion 1116 of plug release arm 1114 to move downward toward body 1112.As further described below, this motion, in conjunction with theproximity of plug release region 1116 to a plug release or releasemechanism (e.g., resilient latch 210 or 312), can cause selectivemanipulation of the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206)having an attached anti-tamper adapter 700. Accordingly, this selectivemanipulation of plug release or release mechanism (e.g., resilient latch210 or 312) with removal tool or key 1100 can allow removal ordisconnection of the plug 308 (or plug 208 of fiber optic cable 206)having an attached anti-tamper adapter 700.

Referring again to FIG. 11, in a further aspect, exemplary non-limitingimplementations of removal tool or key 1100 can comprise a channel 1120(e.g., empty region indicated at 1120 on rear end view 1110) formed inbody 1112. Channel 1120 can, in various aspects, accommodate a cable(e.g., fiber optic, copper, coaxial, etc.) to be used as a guide forplacing the removal tool or key 1100 in position prior to using todisconnecting or removing plug 308 (or plug 208 of fiber optic cable206) having an attached anti-tamper adapter 700 from a outlet 302 (or202). Advantageously, the channel 1120 can be left open on the bottom ofbody 1112 of removal tool or key 1100 to allow easy installation onanti-tamper adapter 700 of removal tool or key 1100.

According to a further aspect, various non-limiting implementations ofbody 1112 can comprise a cavity 1122 (e.g., indicated as shaded region1122 on front end view 1108), that accepts exemplary embodiments ofanti-tamper adapter 700. For instance, cavity 1122 can be sizedappropriately (e.g., larger than the relevant outer dimensions ofanti-tamper adapter 700 body 712) to receive body 712 of anti-tamperadapter 700, when embodiments of removal tool or key 1100 are placed inposition for selectively manipulating the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206) having an attached anti-tamper adapter700. In that regard, the cavity 1122, acting in conjunction withrelevant outer dimensions of anti-tamper adapter 700 body 712, can actas a guide for positioning removal tool or key 1100 to be placed inposition for selectively manipulating the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206).

In still other aspects, as described above, various embodiments ofremoval tool or key 1100 can be comprised of a rigid or semi-rigidmaterial, such as a moldable plastic or polymer, in addition to morerigid materials such as metals or ceramics. For example, a moldedplastic removal tool or key 1100 can include one or more of a moldedbody 1112, a plug release arm 1114, and/or a plug release region 1116 ofplug release arm 1114. In yet another aspect, plug release arm 1114and/or plug release region 1116 of plug release arm 1114 can be formedseparately from molded body 1112 and subsequently attached or integratedas desired. In a further aspect, the moldable plastic or polymer can beselected based on a color scheme according to an intended use of theremoval tool or key 1100 (e.g., a standardized color scheme), forexample, to signify mission critical service connections, etc.

In yet other aspects of the disclosed subject matter, due to thecomplementary structures of anti-tamper adapter 700 and removal tool orkey 1100, complementary variations in the shapes of anti-tamper adapter700 body 712, removal tool or key 1100 body 1112, and/or complementaryvariations in the access aperture 726 and plug release arm 1114 (and/orplug release region 1116 of plug release arm 1114), and the like, can beexploited to further effect cable tamper prevention or control schemes.For instance, a first complementary structure (e.g., level 1 or otherdesignation) of anti-tamper adapter 700 and removal tool or key 1100 canbe used for a first level of cable tamper prevention or control. In thisinstance, a level 1 removal tool or key 1100 can be, for example,generally issued to technicians having relatively low expertise,responsibility, and/or situational awareness for work on systemsdesignated as level 1 and employing a level 1 anti-tamper adapter 700having a complementary structure to a level 1 removal tool or key 1100.

As a further example, a second complementary structure (e.g., level 2 orother designation) of anti-tamper adapter 700 and removal tool or key1100 can be used for a second level of cable tamper prevention orcontrol. At this level of control, a level 2 removal tool or key 1100can be issued on a more restricted basis to technicians havingrelatively higher expertise (or supervisors having responsibility overcritical systems, for example), responsibility, and/or situationalawareness for work on systems designated as level 2 (e.g., missioncritical service connections) and employing anti-tamper adapter 700having a complementary structure to a level 2 removal tool or key 1100.

It can be understood that such variations in cable tamper prevention orcontrol schemes are limitless as a result of the flexibility afforded byvarious non-limiting implementations as described herein. For instance,with minor variations in mold dimensions, such variations ofcomplementary structure can be made possible, without undue expense thatwould be required for cable tamper prevention systems employingproprietary outlets and plugs. For example, consider the expense andinventory requirements for the exemplary two-level tamper prevention andcontrol scheme using proprietary outlets and plugs. Moreover, with theability to implement the various non-limiting embodiments as describedherein on existing connections without having to cut and re-terminatecables, as well as the ability to remove and reuse variousimplementations of anti-tamper adapters 700, various implementations ofthe disclosed subject matter can avoid the tradeoff of having todedicate cables using proprietary outlets and plugs or spend extraman-hours and expense to cut and re-terminate cables that change tamperprevention and control designation (e.g., level 1 to level 2, tamperprevention desired to not desired, etc.).

While FIGS. 7-10 and 11-14 describe various non-limiting implementationsof anti-tamper adapters 700 and removal tool or key 1100, respectively,further aspects of the disclosed embodiments and details of operationare described with regard to FIGS. 15-22. For example, FIG. 15illustrates an exploded view of an RJ-type plug (e.g., plug 308) andexemplary embodiments of an anti-tamper adapter 700 and removal tool orkey 1100 for disconnecting the connected RJ-type plug (e.g., plug 308)as described herein. For instance, in an exemplary cable tamperprevention system, FIG. 15 depicts the relative positioning of exemplarycomponents as described herein. Thus, an exemplary anti-tamper adapter700 can be placed over plug 308 by inserting the front of plug 308 intothe rear portion of anti-tamper adapter 700.

As previously described, anti-tamper adapter 700 can facilitate fixing(e.g., releasably, reversibly, or otherwise) the longitudinal positionof the plug 308 within the channel of body 712 of the anti-tamperadapter 700. The fixed longitudinal position allows the front of plug308 to extend from the front portion of anti-tamper adapter 700 to allowplug 308 (e.g., a standard communications plug such as a fiber opticplug, and RJ type plug, or communications cable plug, audio plug, videoplug, etc.) to be attached to an associated outlet (e.g., outlet 302 or202 for fiber optic cable 206, etc.). According to various embodiments,until such time as it is desired to remove plug 308 from outlet 302, theanti-tamper adapter 700 can inhibit or prevent access and/or inhibit orprevent actuation of the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206) when the plug 308 is inserted into the associated outlet(e.g., outlet 202 or 302).

According to further embodiments, when it is desired to remove plug 308from outlet 302, the anti-tamper adapter 700 can permit access toremoval tool or key 1100 to permit selective manipulation or actuationof the plug release or release mechanism (e.g., resilient latch 210 or312) of the plug 308 (or plug 208 of fiber optic cable 206) when theplug 308 is inserted into the associated outlet (e.g., outlet 202 or302). As can be seen in FIG. 15, various non-limiting implementations ofthe removal tool or key 1100 can be positioned on anti-tamper adapter700 from the rear of anti-tamper adapter 700.

Thus, access aperture (e.g., 726 of front and rear end views 708 and710, respectively) between the housing 724 and the plug release guard orrelease shroud 722 of exemplary anti-tamper adapter 700 can permitremoval tool or key 1100 to be positioned proximate to the plug releaseor release mechanism (e.g., resilient latch 210 or 312) of the plug 308(or plug 208 of fiber optic cable 206), when the removal tool (describedbelow) is inserted into the cable anti-tamper adapter 700. Accordingly,in various non-limiting embodiments of removal tool or key 1100, plugrelease arm 1114 can permit a plug release region 1116 of plug releasearm 1114 to selectively manipulate the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206) when the plug release arm 1114 is manipulated in adirection orthogonal to the direction of normal insertion of plug 308 asdescribed above.

FIG. 16 illustrates a cross-sectional perspective view 1600 of anRJ-type plug (e.g., plug 308) depicting various aspects of an installedembodiment of anti-tamper adapter 700. As described above, shoulder(s)or protrusion(s) 716 can extend into the channel located proximate thefront portion of the channel (e.g., the portion of the body 712 oppositethe rear portion). The one or more shoulder(s) or protrusion(s) 716 canlimit plug 308 travel in the direction coincident with the direction ofnormal insertion. For instance, shoulders or protrusion(s) 716 canengage shoulder 406 of plug 308 as plug 308 is inserted into body 712 ofexemplary anti-tamper adapter 700. Thus, the one or more shoulder(s) orprotrusion(s) 716 in the channel can limit the maximum travel of plug308 into body 712 in the direction of normal insertion (e.g., in adirection toward the front of the plug 308).

As further described above, body 712 of exemplary anti-tamper adapter700 can comprise one or more resilient catches or protrusion(s) 718 inthe channel that can reversibly engage one or more recesses 404 in plug308. Accordingly, resilient catches or protrusion(s) 718 can limit plug308 travel within the body 712 at least in the direction opposite thedirection of normal insertion. As a result, the one or more resilientcatches or protrusion(s) 718, in conjunction with the one or morerecesses 404 of plug 308, can reversibly or releasably lock or fix theplug 308 into a predetermined position (e.g., in a predeterminedlongitudinal position) in the exemplary anti-tamper adapter 700.

Thus, in cooperation with the one or more shoulder(s) or protrusion(s)716, or standing alone with the one or more recesses 404 of plug 308,the one or more resilient catches or protrusion(s) 718 can reversibly orreleasably lock or fix the plug 308 into a predetermined position (e.g.,a predetermined longitudinal position) in the exemplary anti-tamperadapter 700. For instance, it can be noted from FIG. 16 that, withoutthe use of the one or more shoulder(s) or protrusion(s) 716, it can bepossible to slide the exemplary anti-tamper adapter 700 in a directiontoward the rear of plug 308 if only relying on the ramped profile of theone or more resilient catches or protrusion(s) 718.

Thus, it can be understood that for embodiments without the one or moreshoulder(s) or protrusion(s) 716, further non-limiting embodiments ofanti-tamper adapter 700 can comprise alternative profiles (e.g.,non-ramped) of the one or more resilient catches or protrusion(s) 718 toreversibly or releasably lock or fix the plug 308 into a predeterminedposition (e.g., a predetermined longitudinal position) in the exemplaryanti-tamper adapter 700. Additionally, or alternatively, as describedabove, implementations of anti-tamper adapter 700 can employ othermechanisms for locking or fixing the plug 308 into a predeterminedposition (e.g., a predetermined longitudinal position) in theanti-tamper adapter 700 (e.g., reversibly, releasably, or otherwise) ascontemplated by the disclosed subject matter.

In further non-limiting implementations, as described above, for variouspermanent, semi-permanent, or disposable embodiments of anti-tamperadapter 700, catches or protrusion(s) 718 can be formed in a mannergiving the catches or protrusion(s) 718 less resilience. In suchexemplary non-limiting embodiments, it can be appreciated that attemptsto remove plug 308 from anti-tamper adapter 700 can result inpotentially irretrievable damage to one or more of the plug 308 or theanti-tamper adapter 700.

In addition, as further described above, the anti-tamper adapter can beremoved and reused due, in part, to the reversible or releasable mannerof locking or fixing to the existing plug 308. For example, once it isdetermined that tamper prevention via anti-tamper adapter 700 is nolonger desired, the exemplary anti-tamper adapter 700 can be unlockedand removed from plug 308 leaving the plug 308 in its original unalteredcondition. As a further example, by manipulating the one or moreresilient catches or protrusion(s) 718 out of the one or more recesses404 of plug 308, the plug 308 can be moved from its predeterminedposition in the anti-tamper adapter 700, and the plug 308 can be removedfrom the anti-tamper adapter 700 in the opposite direction from which itwas inserted into body 712 (e.g., the direction opposite the directionof normal plug 308 insertion).

For instance, it can be noted from FIG. 16, that the crevice formed at1602 between exemplary anti-tamper adapter 700 and plug 308 can accept ascrewdriver, a shim, or other prying or wedging device. By prying orwedging at location 1602, the one or more resilient catches orprotrusion(s) 718 can be lifted out of the one or more recesses 404 ofplug 308, thereby allowing removal of the exemplary anti-tamper adapter700 (e.g., moving exemplary anti-tamper adapter 700 in a directiontoward the front of plug 308). Preferably, various embodiments of thedisclosed subject matter can facilitate disconnecting the plug 308 fromthe outlet 302 so as to provide access to the front of plug 308 andanti-tamper adapter 700 before allowing the above described manipulation(e.g., without destroying or otherwise rendering useless the anti-tamperadapter 700) of the one or more resilient catches or protrusion(s) 718.

FIG. 16 further depicts relative locations of plug release guard orrelease shroud 722, housing 724, and resilient latch 312 for anexemplary anti-tamper adapter 700. For instance, although depicted in across-sectional perspective view, it can be noted from FIG. 16 that theplug release guard or release shroud 722 can at least partially surroundthe plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308. Accordingly, plug release guard or release shroud 722can inhibit or prevent access and/or inhibit or prevent actuation of theplug release or release mechanism (e.g., resilient latch 210 or 312) ofthe plug 308 (or plug 208 of fiber optic cable 206) when the plug 308 isinserted into the associated outlet (e.g., outlet 202 or 302), by, forexample, the close proximity of the plug release guard or release shroud722 (or housing 724 as further described below) to the surface of apanel (204 or 304) supporting the plug 308 attached outlet (e.g., outlet202 or 302). As can be seen, this close proximity can prevent normalaccess (e.g., without a tool or key as described herein) to one or moresides of the plug release or release mechanism (e.g., resilient latch210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206).

In addition, it can be seen in FIG. 16 that housing 724 can inhibit orprevent access and/or inhibit or prevent actuation of the plug releaseor release mechanism (e.g., resilient latch 210 or 312) of the plug 308(or plug 208 of fiber optic cable 206) when the plug 308 is insertedinto the associated outlet (e.g., outlet 202 or 302). For instance, thehousing 724 can be positioned relative to the plug release guard orrelease shroud 722, such that it at least partially surrounds the plugrelease guard or release shroud 722. Moreover, the housing 724 canfurther shroud the plug release or release mechanism (e.g., resilientlatch 210 or 312) to prevent actuation (e.g., prevent normal actuation)of the release mechanism when the plug 308 (e.g., a standardcommunications plug such as a fiber optic plug, and RJ type plug, orcommunications cable plug, audio plug, video plug, etc.) is attached toan associated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.).

In FIG. 16, it is further apparent that housing 724 can be locatedrelative to plug release guard or release shroud 722, so as to comprisean access aperture (e.g., 726 of front and rear end views 708 and 710,respectively) between the housing 724 and the plug release guard orrelease shroud 722. Thus, the access aperture can permit an exemplaryremoval tool or key 1100 to be positioned proximate to the plug releaseor release mechanism (e.g., resilient latch 210 or 312) of the plug 308(or plug 208 of fiber optic cable 206), when exemplary removal tool orkey 1100 is inserted into the cable anti-tamper adapter 700. Asdescribed above, other arrangements or access apertures suitable forpermitting a removal tool or key to be positioned proximate to the plugrelease or release mechanism (e.g., resilient latch 210 or 312) of theplug 308 can be contemplated, for example, regarding FIGS. 23-24 below.

FIG. 17 depicts a cross-sectional perspective view 1700 of a disclosedanti-tamper adapter 700 illustrating various aspects of a non-limitingremoval tool or key 1100 for disconnecting a connected RJ-type plug(e.g., plug 308) employing the disclosed anti-tamper adapter 700. InFIG. 17, it can be seen how various non-limiting implementations ofremoval tool or key 1100 comprising a body 1112 can comprise a cavity1122 that can accept exemplary embodiments of anti-tamper adapter 700.Thus, FIG. 17 depicts cavity 1122 as sized appropriately (e.g., largerthan the relevant outer dimensions of anti-tamper adapter 700 body 712)to receive body 712 of anti-tamper adapter 700, when embodiments ofremoval tool or key 1100 are placed in position for selectivelymanipulating the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206)having an attached anti-tamper adapter 700.

In that regard, the cavity 1122, acting in conjunction with relevantouter dimensions of anti-tamper adapter 700 body 712, can act as a guidefor positioning removal tool or key 1100 when it is to be placed inposition for selectively manipulating the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308. Also notefrom relative positioning depicted in FIG. 17 that plug release arm 1114can permit a plug release region 1116 of plug release arm 1114 toselectively manipulate the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206) when the plug release arm 1114 is manipulated in a directionorthogonal to the direction of normal insertion of plug 308 as describedabove.

For instance, FIG. 18 depicts a cross-sectional perspective view 1800 ofa non-limiting removal tool or key 1100 for disconnecting a connectedRJ-type plug (e.g., plug 308) employing an exemplary anti-tamper adapter700 as described herein, where the anti-tamper adapter is omitted forclarity. Note from FIG. 18 that application of a force in the directionindicated by 1118 (e.g., a direction orthogonal to the direction ofnormal insertion of plug 308) would cause plug release region 1116 ofplug release arm 1114 to move upward toward body 1112, engaging andselectively manipulating the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308.

As a further example, FIG. 19 illustrates a cross-sectional perspectiveview 1900 of an RJ-type plug (e.g., plug 308) depicting various aspectsof an exemplary anti-tamper adapter 700 and removal tool or key 1100 fordisconnecting a connected RJ-type plug (e.g., plug 308) employing theexemplary anti-tamper adapter 700. In addition, FIGS. 20-21 illustratefurther aspects of an RJ-type plug (e.g., plug 308) and an exemplaryanti-tamper adapter 700 as described herein, in which FIG. 21 depictsexemplary removal tool or key 1100 (omitted in FIG. 20) fordisconnecting a connected RJ-type plug (e.g., plug 308) employing theexemplary anti-tamper adapter 700. FIG. 22 depicts still further aspectsof an RJ-type plug (e.g., plug 308), an exemplary anti-tamper adapter700, and an exemplary removal tool or key 1100 for disconnecting aconnected RJ-type plug employing the anti-tamper adapter 700.

FIG. 23 illustrates further aspects of an exemplary key or tool fordisconnecting a connected RJ-type plug (e.g., plug 308) employingfurther non-limiting embodiments of the disclosed anti-tamper adapter2302. For example, anti-tamper adapter 2302 can be comprised ofessentially the same components as described above. For instance,exemplary anti-tamper adapter 2302 can comprise one or more shoulder(s)or protrusion(s) 716, one or more resilient catches or protrusion(s) 718that can reversibly engage one or more recesses 404 (not shown) in plug308, a plug release guard or release shroud 722 that can at leastpartially surround a plug release or release mechanism (not shown),e.g., resilient latch 210 or 312, of the plug 308, and housing 724 thatcan perform similar functions as previously described.

In addition, or alternatively, exemplary anti-tamper adapter 2302 canfurther comprise an access aperture (e.g., keyhole 2304) on a side(e.g., right side) of housing 724 and/or the plug release guard orrelease shroud 722 that can permit a removal tool or key to bepositioned proximate to the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206), when the removal tool or key is inserted into the cableanti-tamper adapter 2302.

For instance, in FIG. 23, exemplary anti-tamper adapter 2302 is depictedcomprising keyhole 2304 on the side of housing 724. In variousembodiments, keyhole 2304 can permit an appropriately shaped removaltool or key (not shown) to be positioned from the side of housing 724and proximate to the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 (or plug 208 of fiber optic cable206), when the removal tool or key is inserted into the cableanti-tamper adapter 2302.

As further example, the removal tool or key, when inserted into keyhole2304 can engage a support structure 2306 (e.g., such as a key landing).According to further aspects, support structure 2306 can provide support(e.g., rotational support, leverage, stability, alignment, etc.) for theend of the removal tool or key. Thus, the removal tool or key can bemanipulated in a direction to cause the removal tool or key to engageand selectively manipulate or actuate the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206) having an attached anti-tamper adapter2302. For example, when an appropriately shaped removal tool or key isinserted into keyhole 2304 and rotated clockwise, the removal tool orkey can engage and selectively manipulate or actuate the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 (orplug 208 of fiber optic cable 206) having an attached anti-tamperadapter 2302.

FIG. 24 illustrates additional aspects of an exemplary key or tool fordisconnecting a connected RJ-type plug (e.g., plug 308) and furthernon-limiting embodiments of an anti-tamper adapter 2400 as describedherein. For example, anti-tamper adapter 2400 can be comprised of someessentially similar components as described above. For instance,exemplary anti-tamper adapter 2302 can comprise one or more shoulder(s)or protrusion(s) 716, one or more resilient catches or protrusion(s) 718that can reversibly engage one or more recesses 404 in plug 308 (notshown), etc. However, note from FIG. 24 that exemplary anti-tamperadapter 2400 lacks a housing 724 as previously described. Instead, plugrelease guard or release shroud 2402 can be extended toward the frontportion of the channel in body 2404.

Thus, as compared to anti-tamper adapter 700 having a plug release guardor release shroud 722 that can at least partially surround a plugrelease or release mechanism (not shown), e.g., resilient latch 210 or312, of the plug 308, plug release guard or release shroud 2402 ofanti-tamper adapter 2400 surrounds substantially more of the plugrelease or release mechanism (not shown), e.g., resilient latch 210 or312, of the plug 308. Note further from FIG. 24 that exemplaryanti-tamper adapter 2400 can further comprise an access aperture (e.g.,a keyhole 2406) on a side (e.g., right side) of the plug release guardor release shroud 2402 that can permit a removal tool or key to bepositioned proximate to the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206), when the removal tool or key is inserted into the cableanti-tamper adapter 2400. In addition, while exemplary anti-tamperadapter 2400 can further comprise a support structure (not shown)similar to support structure 2306, such a support structure can beimplemented in further non-limiting implementations of exemplaryanti-tamper adapter 2400.

FIG. 25 depicts a perspective view 2500 of a further non-limitingembodiment of an anti-tamper adapter 2502 suitable for use with RJ-typeplugs 308 (or suitably adapted dummy or blocking plugs) as describedherein. FIG. 26 depicts an exemplary anti-tamper adapter 2502 and afurther non-limiting embodiment of a removal tool or key 2602 forconnecting and disconnecting a connected RJ-type plug 308 usingexemplary embodiments of an anti-tamper adapter 2502 as describedherein. For instance, FIG. 25 depicts a right front view of anti-tamperadapter 2502 and FIG. 26 depicts a right rear view of anti-tamperadapter 2502 according to the orientation as described with regard toFIGS. 4-6.

According to various embodiments, the disclosed subject matter providesan anti-tamper adapter 2502 comprising a body 2512 having a channel atleast partially defined by a rear opening 2514 in the body 2512 (e.g.,at the rear portion of the channel). The body 2512 can accept a plug 308(e.g., a standardized communications plug, an existing plug, forexample, that has been terminated, an RJ type plug, a fiber optics plug,other plug, dummy plug, or blocking plug, etc.). Note that the rearportion can be sized to allow the plug 308 to pass into the body 2512 ina direction coincident with a direction of normal insertion of the plug308 into an associated outlet 302. For example, plug 308 is normallyinserted from the front of plug 308 toward the outlet 302. In a similardirection (e.g., in a direction coincident with a direction of normalinsertion), front of plug 308 can be inserted into body 2512 at the rearportion of the channel.

According to an aspect, body 2512 can comprise one or more shoulder(s)or protrusion(s) 2516 that can extend into the channel located proximatethe front portion of the channel (e.g., the portion of the body 2512opposite the rear portion). The one or more shoulder(s) or protrusion(s)2516 can limit plug 308 travel in the direction coincident with thedirection of normal insertion. For instance, shoulders 2516 can engageshoulder 406 of plug 308 as plug 308 is inserted into body 2512. Thus,the one or more shoulder(s) or protrusion(s) 2516 in the channel canlimit the maximum travel of plug 308 into body 2512 in the direction ofnormal insertion.

In a further aspect, body 2512 can comprise one or more resilientcatches or protrusion(s) 2518 in the channel that can reversibly engageone or more recesses 404 in plug 308. Accordingly, resilient catches orprotrusion(s) 2518 can limit plug 308 travel within the body 2512 atleast in the direction opposite the direction of normal insertion. Forinstance, as plug 308 is inserted into body 2512, resilient catches orprotrusion(s) 2518 can extend outward from the channel, allowing one ormore recesses 404 to be positioned under the resilient catches orprotrusion(s) 2518. As the one or more recesses 404 pass under the oneor more resilient catches or protrusion(s) 2518, the one or moreresilient catches or protrusion(s) 2518 can at first spring away fromthe channel, and then can return to a resting position in the one ormore recesses 404 of plug 308.

As a result, the one or more resilient catches or protrusion(s) 2518, inconjunction with the one or more recesses 404 of plug 308, canreversibly or releasably lock or fix the plug 308 into a predeterminedposition in the anti-tamper adapter 2502. Thus, in cooperation with theone or more shoulder(s) or protrusion(s) 2516, or standing alone withthe one or more recesses 404 of plug 308, the one or more resilientcatches or protrusion(s) 2518 can reversibly or releasably lock or fixthe plug 308 into a predetermined position in the anti-tamper adapter2502. Consequently, various embodiments can advantageously beretrofitted to existing plugs (e.g., plugs 308, 208, etc.) withoutrequiring re-termination of existing patch cables.

As described above, various embodiments of the exemplary anti-tamperadapter 2502 can be removed and reused due, in part, to the reversibleor releasable manner of locking or fixing to the existing plug 308. Forinstance, if it is determined that tamper prevention via anti-tamperadapter 2502 is no longer desired, the anti-tamper adapter 2502 can beunlocked and removed from plug 308 leaving the plug 308 in its originalunaltered condition. As another example, by manipulating the one or moreresilient catches or protrusion(s) 2518 out of the one or more recesses404 of plug 308, the plug 308 can be moved from its predeterminedposition in the anti-tamper adapter 2502, and the plug 308 can beremoved from the anti-tamper adapter 2502 in the opposite direction fromwhich it was inserted into body 2512 (e.g., the direction opposite thedirection of normal plug 308 insertion). Preferably, various embodimentsof the disclosed subject matter can facilitate disconnecting the plug308 from the outlet 302 so as to provide access to the front of plug 308and anti-tamper adapter 2502 before allowing the above describedmanipulation (e.g., without destroying or otherwise rendering uselessthe anti-tamper adapter 2502) of the one or more resilient catches orprotrusion(s) 2518.

As can be seen from FIGS. 25, 29 and 32, for example, the one or moreresilient catches or protrusion(s) 2518 are depicted, for purposes ofillustration and not limitation, as catches or protrusion(s) 2518,formed on a semi-rigid arm 2520 molded into body 2512, and extendinginto the channel. However, other mechanisms for reversibly or releasablylocking or fixing the plug 308 into a predetermined position in theanti-tamper adapter 2502 are contemplated by the disclosed subjectmatter. For instance, various embodiments employing similar reversiblyor releasably locking or fixing functions can include screws, springball and detent, and other means of reversibly or releasably locking orfixing plug 308 into a predetermined position in the anti-tamper adapter2502.

In addition, for various permanent, semi-permanent, or disposableembodiments of anti-tamper adapter 2502, catches or protrusion(s) 2518can be formed in a manner giving the catches or protrusion(s) 2518 lessresilience (e.g., via rigid structures, adhesives, etc.). In suchexemplary non-limiting embodiments, it can be appreciated that attemptsto remove plug 308 from anti-tamper adapter 2502 can result inpotentially irretrievable damage to one or more of the plug 308 or theanti-tamper adapter 2502. Thus, the various embodiments as describedherein are intended to encompass a wide range of variations suitable forparticular design considerations.

Referring again to FIG. 25, anti-tamper adapter 2502 can furthercomprise a plug release guard or release shroud 2522 located on the body2512 (e.g., a molded body, etc.) proximate to the front portion of thechannel. The plug release guard or release shroud 2522 can at leastpartially surround a plug release or release mechanism (not shown),e.g., resilient latch 210 or 312, of the plug 308. Thus, plug releaseguard or release shroud 2522 can inhibit or prevent access and/orinhibit or prevent actuation of the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206) when the plug 308 is inserted into the associatedoutlet (e.g., outlet 202 or 302), by for example, the close proximity ofthe plug release guard or release shroud 2522 to the surface of a panel(204 or 304) supporting the plug 308 attached outlet (e.g., outlet 202or 302). This close proximity can prevent normal access (e.g., without atool or key as described herein) to one or more sides of the plugrelease or release mechanism (e.g., resilient latch 210 or 312) of theplug 308 (or plug 208 of fiber optic cable 206).

Note from FIG. 25 that exemplary anti-tamper adapter 2502 lacks ahousing such as housing 724 as previously described. Instead, plugrelease guard or release shroud 2522 can be extended toward the frontportion of the channel in body 2512. Thus, as compared to anti-tamperadapter 700 having a plug release guard or release shroud 722 that canat least partially surround a plug release or release mechanism (notshown), e.g., resilient latch 210 or 312, of the plug 308, plug releaseguard or release shroud 2522 of anti-tamper adapter 2502 surroundssubstantially more of the plug release or release mechanism (not shown),e.g., resilient latch 210 or 312, of the plug 308. Moreover, plugrelease guard or release shroud 2522 can be adapted to comprise anaccess aperture between the body 2512 and the plug release guard orrelease shroud 2522 that can permit a removal tool or key (describedbelow) to be inserted and positioned proximate to the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 (orplug 208 of fiber optic cable 206), when the removal tool (describedbelow) is inserted into the cable anti-tamper adapter 2502. It can beunderstood that other arrangements or access apertures suitable forpermitting a removal tool (described below) to be positioned proximateto the plug release or release mechanism (e.g., resilient latch 210 or312) of the plug 308 can be contemplated upon consideration of thedisclosed subject matter, for example, as described above.

As can be seen in FIG. 25, anti-tamper adapter 2502 can further compriseone or more blocking mechanism(s) 2528 (e.g., blocking arm(s) orblocking tab(s)) adapted to inhibit or prevent normal actuation (e.g.,without a tool or key as described herein) of the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 (orplug 208 of fiber optic cable 206). For instance, anti-tamper adapter2502 can comprise one or more blocking mechanism(s) 2528 (e.g., blockingarm(s) or blocking tab(s)) located on one or more of plug release guardor release shroud 2522 and/or body 2512 (e.g., a molded body, etc.)proximate to the channel in body 2512. The position of the one or moreblocking mechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) inrelation to an inserted plug 308 can be determined such that uponinsertion of plug 308 (or plug 208 of fiber optic cable 206) into anexemplary anti-tamper adapter 2502, the one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) can providean impediment to normal actuation (e.g., without a tool or key asdescribed herein) of the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308.

For instance, by virtue of a close proximity between one or moreblocking mechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)),the plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308, and plug body 402 of plug 308, the one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) ofanti-tamper adapter 2502 can prevent normal actuation of the plugrelease or release mechanism (e.g., resilient latch 210 or 312) of theplug 308 (or plug 208 of fiber optic cable 206). As a further example,upon insertion of plug 308 into exemplary anti-tamper adapter 2502, oneor more blocking mechanism(s) 2528 (e.g., blocking arm(s) or blockingtab(s)) of anti-tamper adapter 2502 can be positioned in the crevice orvertex formed by the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 and plug body 402 of plug 308. Thus,to allow actuation of the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308, and thus allow removal of aplug 308 with an installed anti-tamper adapter 2502 from an outlet 302,the one or more blocking mechanism(s) 2528 (e.g., blocking arm(s) orblocking tab(s)) can first be repositioned out of crevice or vertexformed by the plug release or release mechanism (e.g., resilient latch210 or 312) of the plug 308 and plug body 402 of plug 308. As furtherdescribed below regarding FIGS. 27-33, an exemplary removal tool or key2602 can be adapted to reposition one or more blocking mechanism(s) 2528(e.g., blocking arm(s) or blocking tab(s)) for connecting anddisconnecting a connected RJ-type plug 308 employing embodiments ofanti-tamper adapter 2502.

As a result, various embodiments of the anti-tamper adapter 2502 canfacilitate cable tamper prevention (e.g., either inadvertent orintentional) of a plug 308 (or plug 208 of fiber optic cable 206) fittedwith an embodiment of anti-tamper adapter 2502 when the plug 308 (orplug 208 of fiber optic cable 206) is connected or inserted into anassociated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.). Thus, in various aspects, the disclosed subject matter providescable tamper prevention apparatuses (e.g., anti-tamper adapter 2502)that can advantageously provide cost-effective tamper prevention with orwithout the use of proprietary outlets or plugs, while offering ease andflexibility of use, and without excessive manpower requirements (e.g.,two party verification of connection during maintenance, rigorous accesscontrols, etc.). As additional advantages, the various embodiments canbe employed to complement reactive efforts to address tampering (e.g.,connection or enclosure based alarms) and can allow more efficient useof costly equipment rack space, for example, where mission criticalservice connection can be located in close proximity to less essentialservice connections.

In a further aspect, various embodiments of anti-tamper adapter 2502 canbe comprised of a rigid or semi-rigid material, such as a moldableplastic or polymer, in addition to more rigid materials such, forexample, as metals or ceramics. For instance, a molded plasticanti-tamper adapter 2502 can include one or more of a molded body 2512and/or a plug release guard or release shroud 2522. In yet anotheraspect, plug release guard or release shroud 2522, as well as othercomponents (e.g., 2516, 2518, etc.), can be molded integral to moldedbody 2512 or separately and subsequently attached or integrated asdesired. In a further aspect, the moldable plastic or polymer can beselected based on a color scheme according to an intended use of theanti-tamper adapter 2502 (e.g., a standardized color scheme), forexample, to signify mission critical service connections, etc.

FIG. 27 depicts a perspective view further illustrating aspects of anexemplary removal tool or key 2602 for connecting and disconnecting aconnected RJ-type plug 308 using embodiments of anti-tamper adapter2502. According to various embodiments, the disclosed subject matterprovides a removal tool or key 2602. According to an aspect, asdescribed above, removal tool or key 2602 can be comprised of a rigid orsemi-rigid material, such as a moldable plastic or polymer, in additionto more rigid materials such as metals or ceramics. For example, removaltool or key 2602 (e.g., a molded plastic removal tool or key 2602) caninclude one or more of an insertion end 2604 and an extraction end 2606that facilitates positioning or repositioning one or more of a plugrelease or release mechanism (e.g., resilient latch 210 or 312) of theplug 308 (or plug 208 of fiber optic cable 206), one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)), and so onwhen the removal tool or key 2602 is inserted into an anti-tamperadapter 2502 fitted to plug 308 as described above.

Note that FIG. 27 depicts a bottom view of removal tool or key 2602according to the orientation as depicted. Note further that removal toolor key 2602 is depicted as having an insertion end 2604 and anextraction end 2606. As used herein regarding ends of the removal toolor key 2602, the terms “insertion” and “extraction” refer to theoperation of inserting or connecting a plug 308 (or plug 208 of fiberoptic cable 206) employing an embodiment of anti-tamper adapter 2502into an associated outlet (e.g., outlet 302 or 202 for fiber optic cable206, etc.) and extracting or disconnecting the plug 308 employing anembodiment of anti-tamper adapter 2502, respectively. Recall that theone or more blocking mechanism(s) 2528 (e.g., blocking arm(s) orblocking tab(s)) of anti-tamper adapter 2502 can prevent normalactuation of the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206)when plug 308 is inserted into anti-tamper adapter 2502.

Thus, when plug 308 employing anti-tamper adapter 2502 is to be insertedor connected into an associated outlet (e.g., outlet 302 or 202 forfiber optic cable 206, etc.), the one or more blocking mechanism(s) 2528(e.g., blocking arm(s) or blocking tab(s)) can first be repositioned outof crevice or vertex formed by the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 and plug body 402 ofplug 308 by the insertion of the insertion end 2604 of removal tool orkey 2602 into anti-tamper adapter 2502. Note that the insertion end 2604can comprise one or more surfaces 2608 that can be adapted to engage,manipulate, or otherwise reposition the one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)), therebyallowing the plug release or release mechanism (e.g., resilient latch210 or 312) of the plug 308 to be depressed or repositioned as the plug308 is inserted or connected to an associated outlet (e.g., outlet 302or 202 for fiber optic cable 206, etc.).

Similarly, extraction end 2606 can comprise one or more surfaces 2610that can be adapted to engage, manipulate, or otherwise reposition theone or more blocking mechanism(s) 2528 (e.g., blocking arm(s) orblocking tab(s)) allowing the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 to be depressed orrepositioned as the plug 308 upon disconnection from an associatedoutlet (e.g., outlet 302 or 202 for fiber optic cable 206, etc.).Connection and disconnection (e.g., insertion and extraction,respectively) of a plug 308 are more fully described below regardingFIGS. 28-33.

According to further aspects, exemplary removal tool or key 2602 canfurther comprise a plug release region 2612 of extraction end 2606adapted to selectively manipulate the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206), for example, when the extraction end 2606 is insertedinto an anti-tamper adapter 2502 fitted to plug 308 as described above.Note that the configuration of the plug release region 2612 (e.g.,construction, composition, shape of plug release region 2612, locationof plug release region 2612 relative to one or more surfaces 2610) isadapted to first reposition any of the one or more blocking mechanism(s)2528 prior to selectively manipulating the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 as theextraction end 2606 is inserted into an anti-tamper adapter 2502 fittedto plug 308.

For instance, plug release region 2612 can comprise a ramped or invertedramp profile in a semi-rigid material as described herein, where theprofile can be selected and located relative to the one or more surfaces2610, such that repositioning of the one or more blocking mechanisms2528 (e.g., blocking arm(s) or blocking tab(s)) occurs prior to theprofile engaging and selectively manipulating the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308.Thus, insertion of extraction end 2606 in the direction indicated inFIG. 30 below (e.g., a direction orthogonal to the direction of normalinsertion of plug 308) would cause plug release region 2612 to engagethe plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308. As extraction end 2606 of removal tool or key 2602 isfurther inserted into anti-tamper adapter 2502 fitted to plug 308, theramped profile of plug release region 2612 is further pressed againstthe plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308, the plug release mechanism is allowed to slide down theramp and towards plug 308 body 402. Note that the one or more blockingmechanism(s) 2528 would have been repositioned by the one or moresurfaces 2610 prior to selectively manipulating the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 asthe extraction end 2606 is inserted into an anti-tamper adapter 2502fitted to plug 308.

In still other aspects, as described above, various embodiments ofremoval tool or key 2602 can be comprised of a rigid or semi-rigidmaterial, such as a moldable plastic or polymer, in addition to morerigid materials such as metals or ceramics. In a further aspect, themoldable plastic or polymer can be selected based on a color schemeaccording to an intended use of the removal tool or key 2602 (e.g., astandardized color scheme), for example, to signify mission criticalservice connections, etc. In yet other aspects of the disclosed subjectmatter, due to the complementary structures of anti-tamper adapter 2502and removal tool or key 2602, complementary variations in the shapes ofanti-tamper adapter 2502 body 2512, removal tool or key 2602 insertionend 2604, and/or extraction end 2606, and the like, can be exploited tofurther effect cable tamper prevention or control schemes as furtherdescribed above.

FIG. 28 illustrates an exploded view of an RJ-type plug 308 andexemplary embodiments of an anti-tamper adapter 2502 and removal tool orkey 2602 for connecting and disconnecting a connected RJ-type plug 308,where the removal tool or key 2602 for connecting and disconnecting aconnected RJ-type plug 308 is depicted with an insertion end 2604 of theremoval tool or key 2602 adapted to be inserted into an exemplaryanti-tamper adapter 2502. FIG. 29 depicts cross-sectional views 2900 forexemplary embodiments of an anti-tamper adapter 2502 suitable for usewith RJ-type plugs 308, where the insertion end 2604 of the removal toolor key 2602 is illustrated at various positions with respect to aspectsof an exemplary anti-tamper adapter 2502. For instance, in the top sideview 2902, the one or more surfaces 2608 of insertion end 2604 can beobserved to be adapted to engage the one or more blocking mechanism(s)2528 (e.g., blocking arm(s) or blocking tab(s)) of anti-tamper adapter2502 as described above. As removal tool or key 2602 is inserted intoanti-tamper adapter 2502 fitted to plug 308 in top side view 2904 andright-side section view 2906, the one or more surfaces 2608 of insertionend 2604 can be observed to engage and reposition (e.g., to anon-blocking position) the one or more blocking mechanism(s) 2528 (e.g.,blocking arm(s) or blocking tab(s)) of anti-tamper adapter 2502.

FIG. 30 depicts 3000 further cross-sectional views (3002, 3004) forexemplary embodiments of an anti-tamper adapter 2502, where an assemblycomprising a removal tool or key 2602 and an exemplary anti-tamperadapter 2502 are depicted at various positions with respect to anexemplary outlet 302. For instance, whereas views 2904 and 2906 of FIG.29 depicted anti-tamper adapter 2502 fitted to plug 308 with the one ormore blocking mechanism(s) 2528 (e.g., blocking arm(s) or blockingtab(s)) repositioned in anticipation of connecting plug 308 to outlet302, views 3002 depict the plug 308 employing anti-tamper adapter 2502connected to outlet 302 (view 3002) and with removal tool or key 2602removed (view 3004) thereby allowing the one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) to bepositioned to inhibit or prevent normal actuation (e.g., without a toolor key as described herein) of the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206).

FIG. 31 illustrates an exploded view of an RJ-type plug 308 andexemplary embodiments of an anti-tamper adapter 2502 and removal tool orkey 2602 for connecting and disconnecting a connected RJ-type plug 308,where the removal tool or key for connecting and disconnecting aconnected RJ-type plug 308 is depicted with an extraction end 2606 ofthe removal tool or key 2602 adapted to be inserted into an exemplaryanti-tamper adapter 2502. FIG. 32 depicts cross-sectional views 3200 forexemplary embodiments of an anti-tamper adapter 2502 suitable for usewith RJ-type plugs 308, where the extraction end 2606 of the removaltool or key 2602 is illustrated at various positions with respect toaspects of an exemplary anti-tamper adapter 2502 fitted to plug 308 andconnected to an exemplary outlet 302. For instance, in the top side view3202, the one or more surfaces 2610 of extraction end 2606 can beobserved to be adapted to engage the one or more blocking mechanism(s)2528 (e.g., blocking arm(s) or blocking tab(s)) of anti-tamper adapter2502 as described above. As removal tool or key 2602 is inserted intoanti-tamper adapter 2502 fitted to plug 308 in top side view 3204, theone or more surfaces 2610 of extraction end 2604 can be observed toengage and reposition (e.g., to a non-blocking position) the one or moreblocking mechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) ofanti-tamper adapter 2502. As can be seen in FIG. 32, plug release region2612 can comprise a ramped or an inverted ramp profile, where theprofile can be selected and located relative to the one or more surfaces2610, such that repositioning of the one or more blocking mechanism(s)2528 (e.g., blocking arm(s) or blocking tab(s)) occurs prior to theprofile engaging and selectively manipulating the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308.

FIG. 33 depicts 3300 cross-sectional views (3302, 3304) for exemplaryembodiments of an anti-tamper adapter 2502, where aspects of a removaltool or key 2602 are depicted at various extents of insertion withrespect to an exemplary anti-tamper adapter 2502 connected to anexemplary outlet 302. For instance, whereas views 3202 and 3204 of FIG.32 depicted anti-tamper adapter 2502 fitted to plug 308 with the one ormore blocking mechanism(s) 2528 (e.g., blocking arm(s) or blockingtab(s)) positioned to inhibit or prevent normal actuation (e.g., withouta tool or key as described herein) of the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206), views 3302 and 3304 depict plug 308employing anti-tamper adapter 2502 connected to outlet 302 (view 3002)and with removal tool or key 2602 extraction end 2606 inserted therebyallowing the one or more blocking mechanism(s) 2528 (e.g., blockingarm(s) or blocking tab(s)) to be repositioned (e.g., to a non-blockingposition) and allowing normal actuation (e.g., with removal tool or key2602) of the plug release or release mechanism (e.g., resilient latch210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206).

It can be understood various modifications can be made to the disclosedprevention or control schemes as a result of the flexibility afforded byvarious non-limiting implementations as described herein. For instance,for the purpose of illustration and not limitation, FIGS. 34-36demonstrate further non-limiting aspects of exemplary anti-tamperadapter. For example, FIG. 34 depicts perspective views 3400 of furthernon-limiting embodiments of a removal tool or key 3402 for connectingand disconnecting a connected RJ-type plug 308 using embodiments ofanti-tamper adapter (e.g., anti-tamper adapter 2502, anti-tamper adapter3502 as further described below, etc.).

As a non-limiting example, exemplary removal tool or key 3402 cancomprise a hole 3404 adapted to allow connection of the removal tool orkey 3402 to a keychain, lanyard, and so on. As further described aboveregarding FIG. 27, removal tool or key 3402 can be comprised of a rigidor semi-rigid material, such as a moldable plastic or polymer, inaddition to more rigid materials such as metals or ceramics. As afurther example, removal tool or key 3402 (e.g., a molded plasticremoval tool or key 3402) can include extraction end 3406 thatfacilitates positioning or repositioning one or more of a plug releaseor release mechanism (e.g., resilient latch 210 or 312) of the plug 308(or plug 208 of fiber optic cable 206), one or more blockingmechanism(s) (e.g., one or more blocking mechanism(s) 2528, blockingarm(s) or blocking tab(s)), and so on when the removal tool or key 3402is inserted into an anti-tamper adapter 2502 (or anti-tamper adapter3502 as further described below, etc.) fitted to plug 308 as describedabove.

Note that FIG. 27 depicts one or more of an insertion end 2604 and anextraction end 2606 that facilitates positioning or repositioning one ormore of a plug release or release mechanism (e.g., resilient latch 210or 312) of the plug 308 (or plug 208 of fiber optic cable 206), one ormore blocking mechanism(s) 2528 (e.g., blocking arm(s) or blockingtab(s)), and so on when the removal tool or key 2602 is inserted into ananti-tamper adapter 2502 fitted to plug 308 as described above. However,as can be understood from FIG. 34, removal tool or key 3402 extractionend 3406 can be adapted to provide the disparate functions provided bythe insertion end 2604 and extraction end 2606 of removal tool or key2602 in FIG. 27.

As a further illustration, note that removal tool or key 3402 extractionend 3406 can comprise one or more surfaces 3410 that can be adapted toengage, manipulate, or otherwise reposition the one or more blockingmechanism(s) 2528 (e.g., one or more blocking mechanism(s) 2528,blocking arm(s) or blocking tab(s)) allowing the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 to bedepressed or repositioned as the plug 308 upon disconnection from anassociated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.). However, note further that the one or more surfaces 3410(likewise for one or more surfaces 2610) can allow connection anddisconnection (e.g., insertion and extraction, respectively) of a plug308 as more fully described above regarding FIGS. 28-33.

According to further aspects, exemplary removal tool or key 3402 canfurther comprise a plug release region 3412 of extraction end 3406adapted to selectively manipulate the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206), for example, when the extraction end 3406 is insertedinto an anti-tamper adapter (e.g., anti-tamper adapter 2502, anti-tamperadapter 3502 as further described below, etc.) fitted to plug 308 asdescribed above. Note that the configuration of the plug release region3412 (e.g., construction, composition, shape of plug release region3412, location of plug release region 3412 relative to one or moresurfaces 3410) is adapted to first reposition any of the one or moreblocking mechanism(s) (e.g., one or more blocking mechanism(s) 2528)prior to selectively manipulating the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 as the extraction end2606 is inserted into an anti-tamper adapter (e.g., anti-tamper adapter2502, anti-tamper adapter 3502 as further described below, etc.) fittedto plug 308.

For instance, plug release region 3412 can comprise a ramped or invertedramp profile in a semi-rigid material as described herein, where theprofile can be selected and located relative to the one or more surfaces3410, such that repositioning of the one or more blocking mechanisms(e.g., one or more blocking mechanisms 2528, blocking arm(s) or blockingtab(s)) occurs prior to the profile engaging and selectivelymanipulating the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308. Thus, insertion of extraction end3406 in the direction indicated in FIG. 30 above (e.g., a directionorthogonal to the direction of normal insertion of plug 308) would causeplug release region 3412 to engage the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308.

As further described above regarding FIG. 27, as extraction end 3406 ofremoval tool or key 3402 is further inserted into anti-tamper adapter(e.g., anti-tamper adapter 2502, anti-tamper adapter 3502 as furtherdescribed below, etc.) fitted to plug 308, the ramped profile of plugrelease region 3412 is further pressed against the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308,the plug release mechanism is allowed to slide down the ramp and towardsplug 308 body 402. Note that the one or more blocking mechanism(s) 2528would have been repositioned by the one or more surfaces 3410 prior toselectively manipulating the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 as the extraction end 3406is inserted into an anti-tamper adapter (e.g., anti-tamper adapter 2502,anti-tamper adapter 3502 as further described below, etc.) fitted toplug 308.

Referring again to FIG. 34, it can be appreciated that various aspectsregarding other exemplary implementations disclosed herein can beincluded in exemplary removal tool or key (e.g., removal tool or key3402, 2602, 1100, etc.) and vice versa. For instance, exemplary removaltool or key (e.g., removal tool or key 3402, 2602, 1100, etc.) canfurther comprise one or more annotations 3414 and 3416 depictinginformation about the exemplary removal tool or key (e.g., removal toolor key 3402, 2602, 1100, etc.), such as for example, manufacturer names,instructions for use, etc.

In a further aspect, exemplary removal tool or key (e.g., removal toolor key 3402, 2602, 1100, etc.) can comprise one or more inletted orrecessed portions 3418, 3420, and so on to enhance compatibility, easeof use, ergonomics, etc. For instance, exemplary removal tool or key(e.g., removal tool or key 3402, 2602, 1100, etc.) can comprise one ormore inletted or recessed portions 3418 that can accept a portion of aspecific type of cable (e.g., twisted pair, coaxial, fiber, etc.)intended for use with the anti-tamper adapter exemplary removal tool orkey (e.g., removal tool or key 3402, 2602, 1100, etc.) to providealignment of exemplary removal tool or key (e.g., removal tool or key3402, 2602, 1100, etc.) with its associated anti-tamper adapter. In yetanother aspect, exemplary removal tool or key (e.g., removal tool or key3402, 2602, 1100, etc.) can comprise one or more inletted or recessedportions 3420 that can facilitate use with a specific (e.g., proprietaryor otherwise) implementation of plug, for example, as furtherdemonstrated below regarding FIG. 35.

FIG. 35 depicts a cross-sectional view 3500 of exemplary embodiments ofan anti-tamper adapter 3502, where aspects of removal tool or key 3402are further depicted with respect to exemplary anti-tamper adapter 3502fitted to an RJ-type plug 308. For the purposes of illustration and notlimitation, exemplary anti-tamper adapter 3502 can comprise features andallow functions similar to exemplary anti-tamper adapter 2502 asdescribed above regarding FIG. 25. Thus, similar reference characters asfor anti-tamper adapter 2502 are used in describing anti-tamper adapter3502. As described above, exemplary removal tool or key (e.g., removaltool or key 3402, 2602, 1100, etc.) can comprise one or more inletted orrecessed portions 3420 as depicted in detail 3504 that can facilitateuse of removal tool or key (e.g., removal tool or key 3402, 2602, 1100,etc.) with a specific (e.g., proprietary or otherwise) implementation ofplug, for example, RJ-type plug 308. For instance, RJ-type plug 308 cancomprise slim-line boots suitable for high-density applications, wherethe one or more inletted or recessed portions 3420 can facilitate use ofand anti-tamper adapter (e.g., anti-tamper adapter 2502, anti-tamperadapter 3502, etc.) fitted to a specific implementation of plug 308.

FIG. 36 illustrates further aspects of exemplary embodiments of ananti-tamper adapter 3502, where anti-tamper adapter 3502 is depicted inthe context of a plug 308 connected to an exemplary outlet 302. Invarious implementations, outlet 302 can comprise one or more statuslights 3602 associated with outlet 302. To that end, exemplarynon-limiting implementations of anti-tamper adapter (e.g., anti-tamperadapter 2502, anti-tamper adapter 3502, etc.) can comprise one or moreinletted or recessed portions (e.g., holes, channels, cutouts, windows,doors, and the like, fixed or otherwise, etc.) in body 2512 adapted toallow observation of one or more status lights 3602 associated withoutlet 302 when a plug 308 employing exemplary anti-tamper adapter(e.g., anti-tamper adapter 2502, anti-tamper adapter 3502, etc.). Asdescribed above, various other modifications can be implemented to oneor more of anti-tamper adapters, removal tool or keys, and so on withoutdeparting from the scope of the disclosed subject matter.

In other non-limiting implementations, a dummy plug, a blocking plug,etc. can be adapted to employ disclosed apparatuses, devices, systems,and methodologies for tamper prevention that can facilitate blockingports or outlets that are intended to remain undisturbed for a period oftime. For instance, FIGS. 37-40 depict further exemplary embodiments ofan anti-tamper adapter (e.g., anti-tamper adapter 702, anti-tamperadapter 2502, anti-tamper adapter 3502, etc.), where aspects of a dummyor blocking plug 3702 (e.g., an RJ-type dummy plug, blocking plug, etc.)are illustrated. As described above, a dummy plug or a blocking plug canbe a facsimile of a plug, and can comprise features and spatialrelations that provide a form complementary to an outlet associated withthe plug. That is, a dummy plug or a blocking plug can comprise theminimum features that allow it to be plugged into an outlet associatedwith the plug in addition to having features that allow the dummy plugor blocking plug to employ disclosed apparatuses, devices, systems, andmethodologies for tamper prevention.

For example, FIGS. 37-40 depict an exemplary RJ-type dummy or blockingplug 3702 employing anti-tamper adapter 3502 to facilitate blockingports or outlets that are intended to remain undisturbed for a period oftime. For the purposes of illustration and not limitation, exemplaryRJ-type dummy or blocking plug 3702 and exemplary anti-tamper adapter3502 can comprise features and allow functions similar to that describedabove regarding FIGS. 25, 35, etc. Thus, similar reference characters asfor anti-tamper adapter 3502, plug 308, and so on, are used indescribing exemplary RJ-type dummy or blocking plug 3702 and exemplaryanti-tamper adapter 3502. As further described below a dummy plug or ablocking plug (e.g., exemplary RJ-type dummy or blocking plug 3702,etc.) can be adapted to the form of an associated standard plug or astandard communications plug (e.g., such as an RJ-Type, fiber optic,audio, video, power, etc.) outlet or plug. For instance, as describedabove regarding FIGS. 3-5, an exemplary RJ-type dummy or blocking plug3702 can be adapted to the form of the associated outlet or port. Forexample, exemplary RJ-type dummy or blocking plug 3702 can compriseresilient latch 312, and can be plugged into and retained to an outletor port (e.g., outlet 302, etc.). As described above, until such time asresilient latch 312 is depressed or otherwise manipulated to disengagelatch protrusions from the corresponding recesses 314 in outlet 302,exemplary RJ-type dummy or blocking plug 3702 can remain connected tooutlet 302.

As can be seen in FIG. 37, for example, exemplary RJ-type dummy orblocking plug 3702 can further comprise a plug body 402 havingstandardized external dimensions, as well as a recess 404 molded intoplug body 402, and shoulder 406. According to convention exemplaryRJ-type dummy or blocking plug 3702 can follow the direction ofinsertion (e.g., direction of normal insertion) for connection of plug308 into outlet 302 as described. In addition, exemplary RJ-type dummyor blocking plug 3702 can be described as having a front portion (e.g.,facing outlet 302) facing the direction of insertion 408 (not shown) anda rear portion (opposite the front portion), where FIG. 37 depictsexemplary RJ-type dummy or blocking plug 3702 as being viewed fromrespective directions as indicated.

In addition, as described for plug 308, exemplary RJ-type dummy orblocking plug 3702 can further comprise a recess 3704 that, in lieu ofan array 516 of conductors of plug 308 in FIG. 5, can limit or otherwiseavoid contacting the corresponding array of conductors in outlet 302.For instance, it can be understood that for a dummy plug or a blockingplug (e.g., exemplary RJ-type dummy or blocking plug 3702, etc.) used inconjunction with an anti-tamper adapter (e.g., anti-tamper adapter 702,anti-tamper adapter 2502, anti-tamper adapter 3502, etc.) to block aport or outlet that is intended to remain undisturbed for a period oftime, electrical connections between a dummy plug or a blocking plug andan outlet could be undesirable. Thus, recess 3704 of exemplary RJ-typedummy or blocking plug 3702 is provided. Accordingly, an RJ-45 outlet302, for example, can receive an exemplary RJ-type dummy or blockingplug 3702 to block usage of outlet 302. Used alone, it can be seen thatexemplary RJ-type dummy or blocking plug 3702 can simply be removed whenit is no longer desirable to block outlet 302. However, without more,exemplary RJ-type dummy or blocking plug 3702 can be removed from itsassociated outlet or port without regard for authorization. In otherwords, further anti-tamper prevention is desired.

Thus, as a further advantage, because exemplary RJ-type dummy orblocking plug 3702 can be adapted to the form of the associated outletor port as described above, exemplary RJ-type dummy or blocking plug3702 can employ an anti-tamper adapter (e.g., anti-tamper adapter 702,anti-tamper adapter 2502, anti-tamper adapter 3502, etc.) to facilitateblocking ports or outlets that are intended to remain undisturbed for aperiod of time.

For example, as described above regarding FIGS. 16, 25, etc., FIGS.38-39 depicts anti-tamper adapter 3502 comprising a body 2512 that cancomprise one or more shoulder(s) or protrusion(s) 2516. The one or moreshoulder(s) or protrusion(s) 2516 can extend into the channel locatedproximate the front portion of the channel (e.g., the portion of thebody 2512 opposite the rear portion). The one or more shoulder(s) orprotrusion(s) 2516 can limit exemplary RJ-type dummy or blocking plug3702 travel in the direction coincident with the direction of normalinsertion. For instance, shoulders 2516 can engage shoulder 406 ofexemplary RJ-type dummy or blocking plug 3702 as exemplary RJ-type dummyor blocking plug 3702 is inserted into body 2512. Thus, the one or moreshoulder(s) or protrusion(s) 2516 in the channel can limit the maximumtravel of exemplary RJ-type dummy or blocking plug 3702 into body 2512in the direction of normal insertion.

In a further aspect, body 2512 can comprise one or more resilientcatches or protrusion(s) 2518 in the channel that can reversibly engageone or more recesses 404 in exemplary RJ-type dummy or blocking plug3702. Accordingly, resilient catches or protrusion(s) 2518 can limitexemplary RJ-type dummy or blocking plug 3702 travel within the body2512 at least in the direction opposite the direction of normalinsertion. For instance, as exemplary RJ-type dummy or blocking plug3702 is inserted into body 2512, resilient catches or protrusion(s) 2518can extend outward from the channel, allowing one or more recesses 404to be positioned under the resilient catches or protrusion(s) 2518. Asthe one or more recesses 404 pass under the one or more resilientcatches or protrusion(s) 2518, the one or more resilient catches orprotrusion(s) 2518 can at first spring away from the channel, and thencan return to a resting position in the one or more recesses 404 ofexemplary RJ-type dummy or blocking plug 3702.

As a result, the one or more resilient catches or protrusion(s) 2518, inconjunction with the one or more recesses 404 of exemplary RJ-type dummyor blocking plug 3702, can reversibly or releasably lock or fix theexemplary RJ-type dummy or blocking plug 3702 into a predeterminedposition in the anti-tamper adapter 2502. Thus, in cooperation with theone or more shoulder(s) or protrusion(s) 2516, or standing alone withthe one or more recesses 404 of exemplary RJ-type dummy or blocking plug3702, the one or more resilient catches or protrusion(s) 2518 canreversibly or releasably lock or fix the exemplary RJ-type dummy orblocking plug 3702 into a predetermined position in the anti-tamperadapter 2502.

Thus, as yet another advantage, because exemplary RJ-type dummy orblocking plug 3702 can be adapted to a form complementary to theassociated outlet or port as described above, exemplary anti-tamperadapters (e.g., anti-tamper adapters 702, anti-tamper adapters 2502,anti-tamper adapters 3502, etc.) can be used either to facilitate portblocking as described using exemplary RJ-type dummy or blocking plug3702, or to limit cable tampering using plug 308. Thus, as furtherdescribed above, exemplary RJ-type dummy or blocking plug 3702 can beremoved from its associated outlet or port, because release shroud(e.g., plug release guard or release shroud 2522, etc.) can be arrangedto permit insertion of a removal tool (not shown) (e.g., removal tool orkey 2602, 3402, etc.) in proximity to the release mechanism (e.g., plugrelease or release mechanism such as resilient latch 210, 312, and soon) for selective manipulation of the release mechanism. As yet anotheradvantage, for embodiments of anti-tamper adapters that do notcontemplate being employed with plugs attached to cables, (e.g., forport blocking purposes only, etc.), exemplary RJ-type dummy or blockingplug 3702 can be integrated (e.g., molded with or otherwise formedintegral to) with an associated anti-tamper adapter or anti-tamper means(e.g., anti-tamper adapter 700, 2302, 2400, 2502, 3502, etc.) asdesired.

Accordingly, in various embodiments, the disclosed subject matterprovides tamper prevention systems (e.g., cable tamper preventionsystems, etc.), anti-tamper adapters, and cable tamper preventionapparatuses as described above. For instance, exemplary tamperprevention systems can comprise a molded body (e.g., body 712, 2404,2512, etc.) adapted to accept a standard communications plug (e.g., astandard communications plug such as a fiber optic plug, and RJ typeplug, or communications cable plug, audio plug, video plug, etc.), suchas plug 308 (or plug 208 of fiber optic cable 206, etc.) and/or a dummyplug or a blocking plug (e.g., exemplary RJ-type dummy or blocking plug3702, etc.). For example, molded body (e.g., body 712, 2404, 2512, etc.)can be configured to accept a standard communications plug, such as plug308 (or plug 208 of fiber optic cable 206, etc.), at a rear portion ofthe molded body (e.g., body 712, 2404, 2512, etc.) and/or a dummy plugor a blocking plug (e.g., exemplary RJ-type dummy or blocking plug 3702,fiber optic, audio, video, power, and so on dummy or blocking plug,etc.).

In addition, the molded body can comprise one or more protrusion(s)(e.g., one or more catches or protrusion(s) 718 (2518), resilient orotherwise, combinations thereof and so on) that can be adapted to engagea recess (e.g., one or more recesses 404 in plug 308) in the standardcommunications plug and/or the dummy or blocking plug to reversibly fixa position of the standard communications plug and/or the dummy orblocking plug in the molded body (e.g., body 712, 2404, 2512, etc.) asthe standard communications plug and/or the dummy or blocking plug isinserted into the molded body in a longitudinal direction along an axisof the molded body. As a further example, the molded body (e.g., body712, 2404, 2512, etc.) can be configured to reversibly fix the positionof the standard communications plug and/or the dummy or blocking plug asit is positioned toward a front portion of the molded body. In yet otherexemplary implementations, the disclosed systems can comprise one ormore protrusion(s) (e.g., one or more shoulder(s) or protrusion(s) 716(2516)) on the molded body (e.g., body 712, 2404, 2512, etc.) that canbe adapted to engage a shoulder (e.g., shoulder 406 of plug 308, etc.)of the standard communications plug to further fix the position of thestandard communications plug in the molded body.

Further non-limiting embodiments of exemplary tamper prevention systemscan include a release shroud (e.g., plug release guard or release shroud722, 2402, 2522, etc.) on the molded body (e.g., body 712, 2404, 2512,etc.). According to an aspect, the release shroud can be adapted to atleast partially shroud a release mechanism (e.g., plug release orrelease mechanism such as resilient latch 210, 312, and so on) of thestandard communications plug 308 (or plug 208 of fiber optic cable 206,etc.) to inhibit actuation of the release mechanism when the standardcommunications plug and/or the dummy or blocking plug is attached to anassociated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.). According to still further aspects, the release shroud cancomprise an access aperture (e.g., access aperture 2406, etc.) adaptedto permit insertion of a removal tool into the release shroud allowingthe removal tool to actuate the release mechanism (e.g., plug release orrelease mechanism such as resilient latch 210, 312, and so on).

In other non-limiting embodiments of exemplary tamper preventionsystems, the systems can further comprise a housing (e.g., housing 724)on the molded body (e.g., body 712, etc.) that can be adapted to atleast partially surround the release shroud (e.g., plug release guard orrelease shroud 722, etc.). In addition, the housing (e.g., housing 724)can further shroud the release mechanism (e.g., plug release or releasemechanism such as resilient latch 210, 312, and so on) to preventactuation of the release mechanism when the standard communications plug(e.g., plug 308 or plug 208 of fiber optic cable 206, etc.) and/or thedummy or blocking plug (e.g., exemplary RJ-type dummy or blocking plug3702, etc.) is attached to an associated outlet (e.g., outlet 302 or 202for fiber optic cable 206, etc.).

In yet other exemplary implementations, the housing (e.g., housing 724)and release shroud (e.g., plug release guard or release shroud 722,etc.) can be arranged to permit insertion (e.g., via an access aperture726 of front and rear end views 708 and 710, respectively, between thehousing 724 and the plug release guard or release shroud 722) of a key(e.g., removal tool or key 1100, 2602, etc.) in proximity to the releasemechanism (e.g., plug release or release mechanism such as resilientlatch 210, 312, and so on) for selective manipulation of the releasemechanism when the key is actuated.

In still other exemplary implementations, tamper prevention systems cancomprise one or more blocking mechanism(s) 2528 (e.g., blocking arm(s)or blocking tab(s)) located proximate the release shroud and adapted toinhibit actuation of the release mechanism (e.g., plug release orrelease mechanism such as resilient latch 210, 312, and so on) when thestandard communications plug 308 (or plug 208 of fiber optic cable 206,etc.) and/or the dummy or blocking plug (e.g., exemplary RJ-type dummyor blocking plug 3702, etc.) is inserted into the molded body (e.g.,body 712, 2404, 2512, etc.).

As a further example, the disclosed subject matter, in various aspects,provides exemplary non-limiting cable anti-tamper and port blockingadapters (e.g., anti-tamper adapter 700, 2302, 2400, 2502, 3502, etc.).For instance, in an aspect, exemplary cable anti-tamper adapters cancomprise a body (e.g., body 712, 2404, 2512, etc.) having a channel thataccepts a plug (e.g., a standard communications plug such as a fiberoptic plug, and RJ type plug, or communications cable plug, audio plug,video plug, etc.), such as plug 308 (or plug 208 of fiber optic cable206, etc.) and/or a dummy plug or a blocking plug adapted to a formcomplementary to an associated outlet (e.g., exemplary RJ-type dummy orblocking plug 3702, fiber optic, audio, video, power, and so on dummy orblocking plug, etc.).

For instance, as described above, a dummy plug or a blocking plug can bea facsimile of a plug, and which can comprise features and spatialrelations that provide a form complimentary to an outlet associated withthe plug. That is, a dummy plug or a blocking plug can comprise theminimum features that allow it to be plugged into an outlet associatedwith the plug, in addition to having features that allow the dummy plugor blocking plug to employ disclosed apparatuses, devices, systems, andmethodologies for tamper prevention. Accordingly, in a further aspect,the channel can comprise a rear portion and a front portion, in whichthe rear portion can be sized to allow the plug (e.g., plug 308) and/orthe dummy or blocking plug to pass into the body (e.g., body 712, 2404,2512, etc.) in a direction coincident with a direction of normalinsertion of the plug and/or the dummy or blocking plug into anassociated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.), as described above regarding FIGS. 7, 16, 25, 34, 37, etc.

In addition, the channel can include one or more shoulder(s) (e.g., oneor more shoulder(s) or protrusion(s) 716 (2516)) in the channel locatedproximate the front portion that can limit travel of plug (e.g., plug308) in the direction coincident with the direction of normal insertionas further described above. In further aspects of exemplary anti-tamperadapters (e.g., anti-tamper adapter 700, 2302, 2400, etc.), theanti-tamper and port blocking adapters can comprise one or more catches(e.g., one or more catches or protrusion(s) 718 (2518), resilient orotherwise, combinations thereof and so on) in the channel. According toanother aspect, the one or more catches can reversibly engage one ormore recesses (e.g., one or more recesses 404 in plug 308) in the plugand/or the dummy or blocking plug. According to other aspects, the oneor more catches can limit plug travel and/or the dummy or blocking plugtravel in the direction opposite the direction of normal insertion asdescribed above, for example, regarding FIGS. 7 16, 25, 34, 37, etc.

In still further non-limiting implementations of anti-tamper and portblocking adapters (e.g., anti-tamper adapter 700, 2302, 2400, 2502,3502, etc.), the anti-tamper adapters can comprise a plug release guard(e.g., plug release guard or release shroud 722, 2402, 2522, etc.)located on the body proximate to the front portion of the channel.According to various embodiments, the plug release guard can at leastpartially surround the plug release (e.g., plug release or releasemechanism such as resilient latch 210, 312, and so on) of the plug 308(or plug 208 of fiber optic cable 206, etc.) and/or the dummy orblocking plug (e.g., exemplary RJ-type dummy or blocking plug 3702,etc.) when the plug and/or the dummy or blocking plug is inserted intothe associated outlet (e.g., outlet 302 or 202 for fiber optic cable206, etc.). In further embodiments, the plug release guard can inhibitactuation of the plug release when the plug and/or the dummy plug isinserted into the associated outlet.

In yet other exemplary embodiments, plug release guard (e.g., plugrelease guard or release shroud 722, 2402, 2522, etc.) can extendproximate to a plane defined by a panel (e.g., panel 204, 304, etc.)containing the associated outlet (e.g., outlet 302 or 202 for fiberoptic cable 206, etc.) when the plug and/or the dummy or blocking plugis inserted into the associated outlet. By extending to such aproximity, the plug release guard can prohibit actuation of the plugrelease (e.g., plug release or release mechanism such as resilient latch210, 312, and so on). Moreover, in a further aspect of anti-tamper andport blocking adapters (e.g., anti-tamper adapter 2302, 2400, 2502,3502, etc.) the plug release guard (e.g., plug release guard or releaseshroud 722, 2402, 2522, etc.) can include an access aperture (e.g.,access aperture 726, 2406, etc.) that can permit insertion of a key(e.g., removal tool or key) in proximity to the plug release (e.g., plugrelease or release mechanism such as resilient latch 210, 312, and soon) for selective manipulation of the plug release when the key isactuated as described above, for example, regarding FIG. 24.

Thus, in an aspect of exemplary anti-tamper and port blocking adapters(e.g., anti-tamper adapter 700, 2302, 2406, etc.), a key can comprise anarm that permits a plug release region of the key (e.g., a plug releasearm 1114 and a plug release region 1116 of the removal tool or key 1100)to be placed in proximity to the plug release (e.g., plug release orrelease mechanism such as resilient latch 210, 312, and so on) when thekey is inserted into the access aperture. According to variousembodiments, the arm can permit the plug release region to selectivelymanipulate the plug release when the arm is manipulated in a directionorthogonal to the direction of normal insertion as further describedabove, for example, regarding FIGS. 11, 23, and 24.

In addition, other exemplary embodiments of anti-tamper and portblocking adapters (e.g., anti-tamper adapter 700, 2302, etc.) caninclude a housing (e.g., housing 724) on the body (e.g., body 712,etc.). The housing, according to an aspect, can at least partiallysurround the plug release guard (e.g., plug release guard or releaseshroud 722, etc.). According to a further aspect, the housing can bepositioned relative to the plug release guard to permit a removal tool(e.g., removal tool or key 1100) to be positioned proximate to the plugrelease (e.g., plug release or release mechanism such as resilient latch210, 312, and so on) when the removal tool is inserted into the cableanti-tamper adapter. For example, the removal tool or key 1100,according to an aspect can comprise a tool body (e.g., body 1112) and aplug release extension (e.g., collectively a plug release arm 1114 and aplug release region 1116 of the removal tool or key 1100). In a furtheraspect, the plug release extension can actuate the plug release when theplug release extension is manipulated in a direction orthogonal to thedirection of normal insertion as further described above, for example,regarding FIGS. 7 and 16, etc.

In still other non-limiting implementations, cable anti-tamper and portblocking adapters can comprise one or more blocking tab(s) 2528 (e.g.,blocking arms or mechanisms) located proximate the release guard 2522and adapted to inhibit actuation of the plug release (e.g., plug releaseor release mechanism such as resilient latch 210, 312, and so on) whenthe standard communications plug 308 (or plug 208 of fiber optic cable206, etc.) and/or the dummy or blocking plug (e.g., exemplary RJ-typedummy or blocking plug 3702, etc.) is inserted into the body (e.g., body712, 2404, 2502, 3502, etc.). In addition, according to a furtheraspect, a key 2602 for selective manipulation of the plug release cancomprise at least one surface (e.g., one of surfaces 2608, one ofsurfaces 2610, etc.) adapted to reposition the at least one blocking tabto allow selective manipulation of the plug release by a second surface(e.g., surface or profile 2612, etc.) adapted to engage and selectivelymanipulate the plug release. In yet other implementations, a key 3402for selective manipulation of the plug release can comprise at least onesurface (e.g., one of surfaces 3410, etc.) adapted to reposition the atleast one blocking tab to allow selective manipulation of the plugrelease by a second surface (e.g., surface or profile 3412, etc.)adapted to engage and selectively manipulate the plug release.

As yet another example, an exemplary non-limiting cable tamperprevention apparatus, according to aspects of the disclosed subjectmatter, can comprise an anti-tamper means (e.g., anti-tamper adapter700, 2302, 2400, 2502, 3502, etc.) for installing on an existing plug(e.g., an existing standard communications plug such as a fiber opticplug, and RJ type plug, or communications cable plug, audio plug, videoplug, etc.), such as plug 308 (or plug 208), of an associated cable(e.g., cable 306, fiber optic cable 206, etc.) and/or a dummy plug or ablocking plug adapted to a form complementary to an associated outlet(e.g., exemplary RJ-type dummy or blocking plug 3702, fiber optic,audio, video, power, and so on dummy or blocking plug, etc.). In afurther aspect, the anti-tamper means can be installable on an existingplug without requiring re-termination (e.g., cutting off the old plugand reinstalling a new plug on the cable) of the associated cable. Asdescribed above, it can be understood that for embodiments ofanti-tamper adapters or anti-tamper means that do not contemplate beingemployed with plugs attached to cables, (e.g., for port blockingpurposes only, etc.), exemplary RJ-type dummy or blocking plug 3702 canbe integrated (e.g., molded with or otherwise formed integral to) withan associated anti-tamper adapter or anti-tamper means (e.g.,anti-tamper adapter 700, 2302, 2400, 2502, 3502, etc.) as desired.

According to another aspect, the anti-tamper means can be configured toallow passage of a removal tool (e.g., removal tool or key 1100, 2602,3402, etc.) for manipulation of the release mechanism (e.g., resilientlatch 210 or 312) on the existing plug, such as plug 308 (or plug 208 offiber optic cable 206, etc.) and/or the dummy or blocking plug (e.g.,exemplary RJ-type dummy or blocking plug 3702, etc.). For instance, theremoval tool for removing the existing plug and/or the dummy or blockingplug can be further configured to manipulate the release mechanism onthe existing plug and/or the dummy or blocking plug by applying anexternal force (e.g., manual manipulation by a user, technician, etc.)to the removal tool in a direction orthogonal to the direction of normalinsertion of the existing plug and/or the dummy or blocking plug asfurther described above regarding, for example, FIGS. 7, 16, 24, etc. Inyet another aspect, the anti-tamper means can be further configured toallow passage of a removal tool (e.g., removal tool or key 2602, 3402,etc.) for manipulation of the release mechanism on the existing plugand/or the dummy or blocking plug and for repositioning one or moreblocking tab(s) 2528 (e.g., blocking arm(s), blocking mechanisms(s),etc.) adapted to inhibit actuation of the release mechanism.

In further aspects, an exemplary cable tamper prevention apparatus cancomprise a locking means for fixing a longitudinal position of theexisting plug and/or the dummy or blocking plug within the anti-tampermeans. For example, as described above regarding FIGS. 7, 16, 23, 24,37-39, etc., one or more catches or protrusion(s) 718 (2518), resilientor otherwise, combinations thereof, and so on) can engage a recess(e.g., one or more recesses 404 in plug 308, one or more recesses 404 inexemplary RJ-type dummy or blocking plug 3702, etc.) in the existingplug and/or the dummy or blocking plug to fix (e.g., reversibly orotherwise) a position of the existing plug and/or the dummy or blockingplug in the molded body (e.g., body 712, 2404, 2512, etc.). In addition,as further described above, one or more protrusion(s) (e.g., one or moreshoulder(s) or protrusion(s) 716 (2516)) on the molded body (e.g., body712, 2404, 2512, etc.) can engage a shoulder (e.g., shoulder 406 of plug308, shoulder 406 of exemplary RJ-type dummy or blocking plug 3702,etc.) of the existing plug and/or the dummy or blocking plug to furtherfix the position of the existing plug and/or the dummy or blocking plugin the molded body.

Thus, in cooperation with the one or more shoulder(s) or protrusion(s)716 (2516), or standing alone with the one or more recesses 404 of theexisting plug and/or the dummy or blocking plug, the one or more catchesor protrusion(s) 718 (2518) can lock or fix (e.g., reversibly,releasably, or otherwise) the existing plug and/or the dummy or blockingplug into a predetermined position (e.g., in a predeterminedlongitudinal positions) within the anti-tamper means (e.g., anti-tamperadapter 700, 2302, 2400, 2502, 3502, etc.). In addition, the anti-tampermeans can be further configured to be installed on the existing plugand/or the dummy or blocking plug by inserting a front portion of theexisting plug and/or the dummy or blocking plug, through a rear portionof the anti-tamper means, and in a direction coincident with a directionof normal insertion of the existing plug as further described aboveregarding FIGS. 7, 16, 24, 37-39, etc.

Accordingly, in further non-limiting implementations of a cable tamperprevention apparatus, the apparatus can comprise a means for preventingunaided manipulation of a release mechanism on the existing plug and/orthe dummy or blocking plug. As described above, regarding for example,FIGS. 7, 11, 16, 23, 24, 25, 35, 37, etc., means for preventing unaidedmanipulation of a release mechanism on the existing plug and/or thedummy or blocking plug can comprise any of a plug release guard orrelease shroud 722, 2402, 2522, a housing 724, portions or combinationsthereof, and so on.

In yet other exemplary implementations, tamper prevention systems cancomprise a molded body (e.g., body 2512, etc.) adapted to accept astandard communications plug (e.g., a standard communications plug suchas a fiber optic plug, and RJ type plug, or communications cable plug,audio plug, video plug, etc.), such as plug 308 (or plug 208 of fiberoptic cable 206, etc.) and/or a dummy or blocking plug adapted to a formcomplementary to an outlet (e.g., exemplary RJ-type dummy or blockingplug 3702, fiber optic, audio, video, power, and so on dummy or blockingplug, etc.) associated with the standard communications plug. Asdescribed above, a dummy plug or a blocking plug can be a facsimile of aplug, and which can comprise features and spatial relations that providea form complimentary to an outlet associated with the plug. That is, adummy plug or a blocking plug can comprise the minimum features thatallow it to be plugged into an outlet associated with the plug, as wellas having features that allow the dummy plug or the blocking plug toemploy disclosed apparatuses, devices, systems, and methodologies fortamper prevention For example, molded body (e.g., body 2512, etc.) canbe configured to accept a standard communications plug, such as plug 308(or plug 208 of fiber optic cable 206, etc.), at a rear portion of themolded body (e.g., body 2512, etc.) and/or a dummy or blocking plug(e.g., exemplary RJ-type dummy or blocking plug 3702, etc.).

In addition, the molded body can comprise one or more protrusion(s)(e.g., one or more catches or protrusion(s) 2518, resilient orotherwise, combinations thereof and so on) that can be adapted to engagea recess (e.g., one or more recesses 404 in plug 308, one or morerecesses 404 in dummy or blocking plug 3702, etc.) in the standardcommunications plug and/or the dummy or blocking plug (e.g., exemplaryRJ-type dummy or blocking plug 3702, etc.) to reversibly fix a positionof the standard communications plug and/or the dummy or blocking plug inthe molded body (e.g., body 2512, etc.) as the standard communicationsplug and/or the dummy or blocking plug is inserted into the molded bodyin a longitudinal direction along an axis of the molded body. As afurther example, the molded body (e.g., body 2512, etc.) can beconfigured to reversibly fix the position of the standard communicationsplug and/or the dummy or blocking plug as the standard communicationsplug and/or the dummy or blocking plug is positioned toward a frontportion of the molded body. In yet other exemplary implementations, thedisclosed systems can comprise one or more protrusion(s) (e.g., one ormore shoulder(s) or protrusion(s) 2516) on the molded body (e.g., body2512, etc.) that can be adapted to engage a shoulder (e.g., shoulder 406of plug 308, etc.) of the standard communications plug and/or the dummyplug to further fix the position of the standard communications plugand/or the dummy plug in the molded body.

Further non-limiting embodiments of exemplary tamper prevention systemscan include a release shroud (e.g., plug release guard or release shroud2522, etc.) on the molded body (e.g., body 2512, etc.). According to anaspect, the release shroud can be adapted to at least partially shroud arelease mechanism (e.g., plug release or release mechanism such asresilient latch 210, 312, and so on) of the standard communications plug308 (or plug 208 of fiber optic cable 206, etc.) and/or the dummy orblocking plug (e.g., exemplary RJ-type dummy or blocking plug 3702,etc.) to inhibit actuation of the release mechanism when the standardcommunications plug and/or the dummy or blocking plug is attached to anassociated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.). According to still further aspects, the release shroud cancomprise an access aperture (e.g., access aperture 2406, etc.) adaptedto permit insertion of a removal tool into the release shroud allowingthe removal tool to actuate the release mechanism (e.g., plug release orrelease mechanism such as resilient latch 210, 312, and so on).

In yet other exemplary implementations, release shroud (e.g., plugrelease guard or release shroud 2522, etc.) can be arranged to permitinsertion of a removal tool (e.g., removal tool or key 2602, etc.) inproximity to the release mechanism (e.g., plug release or releasemechanism such as resilient latch 210, 312, and so on) for selectivemanipulation of the release mechanism.

In still other exemplary implementations, tamper prevention systems cancomprise one or more blocking mechanism(s) 2528 (e.g., blocking arm(s)or blocking tab(s)) located proximate the release shroud and adapted toinhibit actuation of the release mechanism (e.g., plug release orrelease mechanism such as resilient latch 210, 312, and so on) when thestandard communications plug 308 (or plug 208 of fiber optic cable 206,etc.) and/or the dummy or blocking plug (e.g., exemplary RJ-type dummyor blocking plug 3702, etc.) is inserted into the molded body (e.g.,body 712, 2404, 2502, etc.).

In view of the structures and devices described supra, methodologiesthat can be implemented in accordance with the disclosed subject matterwill be better appreciated with reference to the flowchart of FIG. 40.While, for purposes of simplicity of explanation, the methodologies areshown and described as a series of blocks, it is to be understood andappreciated that such illustrations or corresponding descriptions arenot limited by the order of the blocks, as some blocks may occur indifferent orders and/or concurrently with other blocks from what isdepicted and described herein. Any non-sequential, or branched, flowillustrated via a flowchart should be understood to indicate thatvarious other branches, flow paths, and orders of the blocks, can beimplemented which achieve the same or a similar result. Moreover, notall illustrated blocks may be required to implement the methodologiesdescribed hereinafter.

Exemplary Methodologies for Cable Tamper Prevention

FIG. 40 depicts a block diagram demonstrating methodologies 4000 forcable tamper prevention in accordance with aspects of the disclosedsubject matter. For instance, methodologies 4000 can comprise, at 4002,inserting a plug 308 (e.g., a standard communications plug such as afiber optic plug, and RJ type plug, or communications cable plug, audioplug, video plug, etc.) and/or a dummy or blocking plug (e.g., exemplaryRJ-type dummy or blocking plug 3702, fiber optic, audio, video, power,and so on dummy or blocking plugs, etc.) into an anti-tamper adapter(e.g., anti-tamper adapter 700, 2302, 2400, 2502, 3502, etc.) in adirection coincident with a direction of normal insertion of the pluguntil the plug 308 and/or the dummy or blocking plug (e.g., exemplaryRJ-type dummy or blocking plug 3702, etc.) extends from the anti-tamperadapter (e.g., anti-tamper adapter 700, 2302, 2400, etc.). For example,at 4002, a plug 308 and/or a dummy or blocking plug (e.g., exemplaryRJ-type dummy or blocking plug 3702, etc.) can be inserted into a rearportion of an anti-tamper adapter (e.g., anti-tamper adapter 700, 2302,2400, 2502, 3502, etc.) until the plug 308 and/or exemplary RJ-typedummy or blocking plug 3702 extends from a front portion of theanti-tamper adapter (e.g., anti-tamper adapter 700, 2302, 2400, 2502,3502, etc.).

In addition, methodologies 4000 can include locking (e.g., reversibly,releasably, or otherwise) the plug 308 and/or exemplary RJ-type dummy orblocking plug 3702 into a predetermined position (e.g., as determined byone or more shoulder(s) or protrusion(s) 716 (2516), one or more catchesor protrusion(s) 718 (2518), resilient or otherwise, combinationsthereof and so on) in the anti-tamper adapter (e.g., anti-tamper adapter700, 2302, 2400, 2502, 3502, etc.) at 4004. Thus, at 4004, methodologies4000 can include aligning a portion (e.g., a plug release guard orrelease shroud 722, 2402, 2522, a housing 724, portions or combinationsthereof, and so on) of the anti-tamper adapter that inhibits actuationof a release mechanism (e.g., resilient latch 210 or 312) associatedwith the plug 308 (or plug 208 of fiber optic cable 206, etc.) and/orexemplary RJ-type dummy or blocking plug 3702.

Methodologies 4000 can further include connecting the plug 308 and/orexemplary RJ-type dummy or blocking plug 3702 to an associated outlet(e.g., outlet 302 or 202 for fiber optic cable 206, etc.) at 4006. Infurther non-limiting embodiments of methodologies 4000, at 4008, aremoval tool or key (e.g. a connector removal tool or key 1100, etc.)can be inserted into the anti-tamper adapter (e.g., anti-tamper adapter700, 2302, 2400, 2502, 3502, etc.). For instance, at 4008, methodologies4000 can further include inserting the removal tool (e.g., removal toolor key 1100, etc.) proximate to the rear portion of an anti-tamperadapter (e.g. removal tool or key 1100 into anti-tamper adapter 700,2502, 3502, etc.). In yet other non-limiting embodiments ofmethodologies 4000, the removal tool (e.g. a removal tool or key) can beinserted on a side of the anti-tamper adapter (e.g., anti-tamper adapter2302, 2400, etc.).

Accordingly, at 4010, a portion of the removal tool (e.g., a plugrelease arm 1114 of the removal tool or key 1100) can be manipulated ina direction orthogonal to the direction of normal insertion of the plug308 and/or exemplary RJ-type dummy or blocking plug 3702 to actuate therelease mechanism plug release or release mechanism (e.g., resilientlatch 210 or 312, etc.) associated with plug 308 (or plug 208 of fiberoptic cable 206) and/or exemplary RJ-type dummy or blocking plug 3702.In addition, methodologies 4000 can further include disconnecting theplug 308 (or plug 208 of fiber optic cable 206, etc.) and/or exemplaryRJ-type dummy or blocking plug 3702 from the associated outlet (e.g.,outlet 302 or 202 for fiber optic cable 206, etc.) at 4012.

In still other exemplary implementations of methodologies 4000,connecting the plug 308 and/or exemplary RJ-type dummy or blocking plug3702 to an associated outlet (e.g., outlet 302 or 202 for fiber opticcable 206, etc.) at 4006 can alternately include inserting a firstportion (e.g., one or more surfaces 2608, one or more surfaces 2610, oneor more surfaces 3410, etc.) of the removal tool (e.g., removal tool orkey 2602, 3402, etc.) thereby repositioning one or more blockingmechanism(s) (e.g., blocking arm(s), blocking tab(s), etc.) locatedproximate to, and inhibiting actuation of, the release mechanism (e.g.,resilient latch 210 or 312, etc.) associated with plug 308 (or plug 208of fiber optic cable 206) and/or exemplary RJ-type dummy or blockingplug 3702. In yet other non-limiting embodiments, methodologies 4000 forcable tamper prevention can include actuating the release mechanism(e.g., resilient latch 210 or 312, etc.) with a second portion (e.g.,surface 2612, surface 3412, etc.) of the removal tool (e.g., removaltool or key 2602, removal tool or key 3402, etc.) associated with theplug (e.g., surface 2612, surface 3412, etc.) and disconnecting the plug308 (or plug 208 of fiber optic cable 206, etc.) and/or exemplaryRJ-type dummy or blocking plug 3702 from the associated outlet (e.g.,outlet 302 or 202 for fiber optic cable 206, etc.) at 4012.

In further non-limiting implementations of methodologies 4000, the plug308 (e.g., a standard communications plug such as a fiber optic plug,and RJ type plug, or communications cable plug, audio plug, video plug,etc.) and/or a dummy or blocking plug (e.g., exemplary RJ-type dummy orblocking plug 3702, fiber optic, audio, video, power, and so on dummy orblocking plug, etc.) can be unlocked (not shown) from its predeterminedposition in the anti-tamper adapter (e.g., anti-tamper adapter 700,2302, 2400, 2502, 3502, etc.), as described above, for example,regarding FIGS. 7, 16, etc. In addition, as further described above, theplug 308 and/or exemplary RI-type dummy or blocking plug 3702 can beremoved (not shown) from the anti-tamper adapter (e.g., anti-tamperadapter 700, 2302, 2400, 2502, 3502, etc.) in a reusable condition(e.g., in its original condition, same condition as before installationof the anti-tamper adapter, substantially the same condition, or readilyusable to accomplish substantially the same purpose as beforeinstallation of the anti-tamper adapter), for example when it isdetermined that cable tamper prevention is no longer desired for aparticular plug 308 (or plug 208 of fiber optic cable 206, etc.) and/orexemplary RI-type dummy or blocking plug 3702.

While the disclosed subject matter has been described in connection withthe preferred embodiments of the various figures, it is to be understoodthat other similar embodiments may be used with, or modifications andadditions may be made to, the described embodiments for performing thesame function of the disclosed subject matter without deviatingtherefrom. For example, one skilled in the art will recognize thataspects of the disclosed subject matter as described in the variousembodiments of the present application may apply to other types of cabletamper prevention and control applications.

As a further example, variations of process or apparatus parameters(e.g., dimensions, configurations, removal tool or key locations,arrangements, or motions required to selectively manipulate a plugrelease or release mechanism, application of dummy or blocking plugswith other anti-tamper adapters, process step order, etc.) may be madeto further optimize the provided structures, devices and methodologies,as shown and described herein. In any event, the structures and devices,as well as the associated methodologies, described herein have manyapplications in cable tamper prevention and control. Therefore, thedisclosed subject matter should not be limited to any single embodimentdescribed herein, but rather should be construed in breadth and scope inaccordance with the appended claims.

In addition, a variety of implementation specific details and/orexemplary alternatives to such details are provided in further supportand description of the various embodiments set forth herein. Where suchdetails or alternatives are not specifically represented in a figure,such figures nonetheless are intended to embrace all of such detailssince such details or alternatives as described can be appreciated byone of ordinary skill in the art in the context of such figures andembodiments as add-on(s) to and/or representative details, alternativesand/or substitutes for various element(s) of the figures.

1. A tamper prevention system comprising: a molded body adapted toaccept a blocking plug, the molded body having at least one protrusionadapted to engage a recess in the blocking plug to reversibly fix aposition of the blocking plug in the molded body as the blocking plug isinserted into the molded body in a longitudinal direction along an axisof the molded body; and a release shroud on the molded body adapted toat least partially shroud a release mechanism of the blocking plug toinhibit actuation of the release mechanism when the blocking plug isattached to an associated outlet.
 2. The tamper prevention system ofclaim 1, further comprising: at least a second protrusion on the moldedbody adapted to engage a shoulder of the blocking plug to furtherreversibly fix the position of the blocking plug in the molded body. 3.The tamper prevention system of claim 1, the release shroud comprisingan access aperture adapted to permit insertion of a removal tool intothe release shroud allowing the removal tool to actuate the releasemechanism.
 4. The tamper prevention system of claim 1, the blocking plugand associated outlet comprise at least one set of a blocking fiberoptic plug and associated outlet or a blocking Registered Jack (RJ) plugand associated outlet.
 5. The tamper prevention system of claim 1, themolded body further configured to accept the blocking plug at a rearportion of the molded body and reversibly fix the position of theblocking plug as it is positioned toward a front portion of the moldedbody.
 6. The tamper prevention system of claim 1, further comprising: ahousing on the molded body adapted to at least partially surround therelease shroud and further adapted to shroud the release mechanism toprevent actuation of the release mechanism when the blocking plug isattached to the associated outlet.
 7. The tamper prevention system ofclaim 6, the housing and release shroud are arranged to permit insertionof a key in proximity to the release mechanism for selectivemanipulation of the release mechanism when the key is actuated.
 8. Thetamper prevention system of claim 1, further comprising: at least oneblocking mechanism located proximate the release shroud and adapted toinhibit actuation of the release mechanism when the blocking plug isinserted into the molded body.
 9. The tamper prevention system of claim8, the release shroud is adapted to permit insertion of a removal toolin proximity to the release mechanism for selective manipulation of therelease mechanism when the removal tool is actuated.
 10. A cableanti-tamper and port blocking adapter comprising: a body having achannel that accepts at least one of a plug or a dummy plug adapted to aform complementary to an associated outlet, the channel having a rearportion and a front portion, the rear portion is sized to allow the atleast one of the plug or the dummy plug to pass into the body in adirection coincident with a direction of normal insertion of the atleast one of the plug or the dummy plug into the associated outlet; atleast a first shoulder in the channel located proximate the frontportion that limits at least one of plug or dummy plug travel in thedirection coincident with the direction of normal insertion; at leastone resilient catch in the channel that reversibly engages at least onerecess in at least one of the plug or the dummy plug and limits at leastone of plug or dummy plug travel in the direction opposite the directionof normal insertion; and a plug release guard located on the bodyproximate to the front portion that at least partially surrounds andinhibits actuation of a plug release of at least one of the plug or thedummy plug when the at least one of the plug or the dummy plug isinserted into the associated outlet.
 11. The cable anti-tamper and portblocking adapter of claim 10, further comprising: at least a secondshoulder in the channel located proximate the front portion that limitsat least one of plug or dummy plug travel in the direction coincidentwith the direction of normal insertion.
 12. The cable anti-tamper andport blocking adapter of claim 10, further comprising: a housing on thebody that at least partially surrounds the plug release guard, thehousing positioned relative to the plug release guard to permit aremoval tool to be positioned proximate to the plug release when theremoval tool is inserted into the cable anti-tamper adapter.
 13. Thecable anti-tamper and port blocking adapter of claim 10, the removaltool comprising a tool body and a plug release extension that actuatesthe plug release when the plug release extension is manipulated in adirection orthogonal to the direction of normal insertion.
 14. The cableanti-tamper and port blocking adapter of claim 10, the plug releaseguard extends proximate to a plane defined by a panel containing theassociated outlet to prohibit actuation of the plug release when the atleast one of the plug or the dummy plug is inserted into the associatedoutlet.
 15. The cable anti-tamper and port blocking adapter of claim 10,the dummy plug and associated outlet comprise at least one set of adummy fiber optic plug and associated outlet or a dummy Registered Jack(RJ) plug and associated outlet.
 16. The cable anti-tamper and portblocking adapter of claim 15, the dummy plug comprises a dummy RJ-45plug having a latch as a plug release.
 17. The cable anti-tamper andport blocking adapter of claim 14, the plug release guard furthercomprising an access aperture that permits insertion of a key inproximity to the plug release for selective manipulation of the plugrelease when the key is actuated.
 18. The cable anti-tamper and portblocking adapter of claim 17, the key comprises an arm that permits aplug release region of the key to be placed in proximity to the plugrelease when the key is inserted into the access aperture, the armpermits the plug release region to selectively manipulate the plugrelease when the arm is manipulated in a direction orthogonal to thedirection of normal insertion.
 19. The cable anti-tamper and portblocking adapter of claim 17, further comprising: at least one blockingtab located proximate the plug release guard and adapted to inhibitactuation of the plug release when the plug is inserted into the body.20. The cable anti-tamper and port blocking adapter of claim 19, the keycomprises at least one surface adapted to reposition the at least oneblocking tab to allow selective manipulation of the plug release by asecond surface adapted to engage and selectively manipulate the plugrelease.
 21. A cable tamper prevention apparatus, comprising: ananti-tamper means for installing on a dummy plug; a locking means forfixing a longitudinal position of the dummy plug within the anti-tampermeans; and a means for preventing unaided manipulation of a releasemechanism on the dummy plug.
 22. The cable tamper prevention apparatusof claim 21, the anti-tamper means is configured to accept at least oneof a fiber optic plug, a Registered Jack (RJ) plug, a dummy fiber opticplug, or a dummy RJ plug.
 23. The cable tamper prevention apparatus ofclaim 21, the anti-tamper means is further configured to be installed onthe dummy plug by inserting a front portion of the dummy plug through arear portion of the anti-tamper means and in a direction coincident witha direction of normal insertion of the dummy plug.
 24. The cable tamperprevention apparatus of claim 21, the anti-tamper means is furtherconfigured to allow passage of a removal tool for manipulation of therelease mechanism on the dummy plug.
 25. The cable tamper preventionapparatus of claim 24, further comprising: the removal tool for removingthe dummy plug configured to manipulate the release mechanism on thedummy plug by applying an external force to the removal tool in adirection orthogonal to the direction of normal insertion of theexisting plug.
 26. The cable tamper prevention apparatus of claim 24,the anti-tamper means further configured to allow passage of a removaltool for manipulating the release mechanism on the dummy plug and forrepositioning at least one blocking tab adapted to inhibit actuation ofthe release mechanism.
 27. A tamper prevention system comprising: amolded body adapted to accept a standard communications plug or ablocking plug adapted to a form complementary to an outlet associatedwith the standard communications plug, the molded body having at leastone protrusion adapted to engage a recess in the standard communicationsplug or the blocking plug to reversibly fix a position of the standardcommunications plug or the blocking plug in the molded body as thestandard communications plug or the blocking plug is inserted into themolded body in a longitudinal direction along an axis of the moldedbody; a release shroud on the molded body adapted to at least partiallyshroud a release mechanism of the standard communications plug or theblocking plug to inhibit actuation of the release mechanism when thestandard communications plug or the blocking plug is attached to theoutlet associated with the standard communications plug; and at leastone blocking mechanism located proximate the release shroud and adaptedto inhibit actuation of the release mechanism when the standardcommunications plug or the blocking plug is inserted into the moldedbody.
 28. The tamper prevention system of claim 27, further comprising:at least a second protrusion on the molded body adapted to engage ashoulder of the standard communications plug or the blocking plug tofurther reversibly fix the position of the standard communications plugor the blocking plug in the molded body.
 29. The tamper preventionsystem of claim 27, the release shroud comprising an access apertureadapted to permit insertion of a removal tool into the release shroudallowing the removal tool to at least one of actuate the releasemechanism or reposition the at least one blocking mechanism.
 30. Thetamper prevention system of claim 27, the molded body further configuredto accept the standard communications plug or the blocking plug at arear portion of the molded body and reversibly fix the position of thestandard communications plug or the blocking plug as the standardcommunications plug or the blocking plug is positioned toward a frontportion of the molded body.