Anti-theft device for portable electronic device

ABSTRACT

An anti-theft device for protecting a portable electronic device from theft or unauthorized removal in a retail environment is provided. A shroud may at least partially enclose a portable electronic device. A dock may releasably engage the shroud such that the shroud and portable electronic device are locked to the dock when engaged with the dock. A key may engage activate a lock mechanism to release the shroud and the portable electronic device from the dock.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S.application Ser. No. 16/278,295, filed on Feb. 18, 2019, which is acontinuation of U.S. application Ser. No. 15/977,401, filed May 11,2018, now U.S. Pat. No. 10,227,796, which is a continuation of U.S.application Ser. No. 15/392,598, filed on Dec. 28, 2016, now U.S. Pat.No. 9,970,217, which is a continuation of U.S. application Ser. No.14/300,476, filed on Jun. 10, 2014, now U.S. Pat. No. 9,567,776, whichis a non-provisional application that claims the benefit of priority ofU.S. Provisional Application No. 61/833,655 filed on Jun. 11, 2013, andU.S. Provisional Application No. 61/846,806 filed on Jul. 16, 2013, andU.S. Provisional Application No. 61/889,212 filed on Oct. 10, 2013, andU.S. Provisional Application No. 61/899,398 filed on Nov. 4, 2013, theentire disclosures of which are incorporated herein by reference.

FIELD OF THE INVENTION

Embodiments of the present invention relate generally to an anti-theftdevice for protecting a portable electronic device.

BACKGROUND OF THE INVENTION

A recent trend in work and retail store environments is to use smartdevices, sometimes cellphones, but more often tablets, as customerservice devices. This usage takes on two forms. One form is using atablet as a kiosk where customers can interact with the device. This maybe used to deliver information about the establishment or its productsto the consumer, or to act as an interface for customer loyalty programsin lieu of plastic cards. A second usage is for retail store associatesto carry such a device around the store to assist customers. Theassociate may use the device to display a layout of the store to show acustomer where an item is, check on a price of an item, or accessinformation regarding a product the customer is buying. In some stores,tablets are being used to check-out customers. Restaurants may use smartdevices at a table for ordering or game playing. Hospitals may allowdoctors and nurses to carry smart devices for mobile access to patient'shealth charts.

This trend requires customers, store associates and employees tointeract with smart devices that tend to be fairly expensive. In someinstances, the customer, store associate or employee may need to leavethe smart device unattended for a period of time to perform anothertask. Thus, there is a need for an anti-theft device for protecting aportable electronic device from theft, while allowing a sufficient levelof user interaction with the portable electronic device.

SUMMARY OF THE INVENTION

In one embodiment of the invention, an anti-theft device for protectinga portable electronic device from theft or unauthorized removal isprovided. The anti-theft device includes a sensor operably coupled tothe portable electronic device. The sensor is configured to generate asecurity signal when the sensor is removed from the portable electronicdevice. The sensor is further configured to generate a security signalbased on a location of the portable electronic device relative to anauthorized device, location, or perimeter. The sensor may be integratedwith the portable electronic device, or alternatively, the sensor may beattached to the portable electronic device. The anti-theft device mayfurther include a shroud configured to at least partially enclose theportable electronic device with the sensor operably engaged with theshroud. The anti-theft device may further include a key configured to bepaired with the portable electronic device and/or the sensor. The keymay be configured to communicate wirelessly with the portable electronicdevice and the sensor may be configured to generate a security signalwhen the portable electronic device is displaced a predetermineddistance from the key.

In another embodiment, an anti-theft device for protecting a portableelectronic device from theft or unauthorized removal is provided. Theanti-theft device includes a shroud configured to at least partiallyenclose the portable electronic device and a sensor operably engagedwith the shroud. The sensor is configured to generate a security signalwhen the sensor is removed from the shroud and/or the shroud is removedfrom the portable electronic device. The sensor is further configured togenerate a security signal based on a location of the portableelectronic device relative to an authorized device, location, orperimeter. The anti-theft device may further include a key configured tobe paired with the portable electronic device and/or the sensor. Theshroud may include a port configured to receive a wireless securitysignal from the key. The sensor may be integrated with the shroud.

In yet another embodiment, a method for protecting a portable electronicdevice from theft or unauthorized removal is provided. The methodincludes coupling a sensor to a portable electronic device and armingthe sensor such that the sensor is configured to generate a securitysignal when the sensor is removed from the portable electronic deviceand to generate a security signal based on a location of the electronicdevice relative to an authorized device, location, or perimeter. Themethod may further include at least partially enclosing the portableelectronic device with a shroud. The method may further include definingan authorized perimeter using the portable electronic device.

In another embodiment, a method for protecting a portable electronicdevice from theft or unauthorized removal is provided. The methodincludes detecting a location of a portable electronic device or asensor coupled to the portable electronic device and generating asecurity signal based on the location of the portable electronic devicerelative to an authorized device, location, or perimeter. The method mayfurther include generating a security signal when the sensor is removedfrom the portable electronic device. The method may further includedetecting a change in the light level of the sensor and/or the portableelectronic device for a predetermined period of time while the sensorand/or the portable electronic device is moving. The method may furtherinclude detecting displacement of the portable electronic device or thesensor relative to a key paired with the portable electronic device orthe sensor. The method may further include generating a security signalwhen the portable electronic device is displaced a predetermineddistance relative to an authorized device, location, or perimeter. Themethod may further include generating a security signal when theportable electronic device or the sensor is located outside of anauthorized perimeter. The method may further include generating asecurity signal when the portable electronic device or the sensor islocated inside an authorized perimeter. In addition, the method mayfurther include wirelessly communicating the security signal to a remotelocation.

In yet another embodiment, an anti-theft device for protecting aportable electronic device from theft or unauthorized removal isprovided. The anti-theft device includes a shroud configured to at leastpartially enclose the portable electronic device, and a dock configuredto releasably engage the shroud such that the shroud and portableelectronic device are locked to the dock when engaged with the dock. Thedock may include at least one finger configured to extend and retractrelative to the dock to engage and disengage the shroud. The shroud mayinclude a flexible cable that is configured to transfer power to theportable electronic device when the shroud is engaged with the dock. Theflexible cable may include a connector at one end for engaging theportable electronic device and at least one contact at an opposite end,wherein the connector and the at least one contact are in electricalcommunication with one another. The dock may include at least onecontact configured to be in electrical communication with the at leastone contact of the flexible cable when the shroud is engaged with thedock for charging the portable electronic device. Moreover, the flexiblecable may extend along an interior surface of the shroud. The shroud mayinclude a handle defining a groove and the at least one finger may bebiased to extend outwardly to engage the groove. Furthermore, the atleast one finger may be configured to automatically engage the shroudwhen the shroud is placed on the dock. In addition, the dock may includea mechanical lock for unlocking the at least one finger with amechanical key. Alternatively, the dock may include an electronic lockfor unlocking the at least one finger with an electronic key. In oneaspect, the electronic lock may include a switch configured to beactuated in response to rotation of the cam for turning the motor on oroff. The anti-theft device may include a sensor operably engaged withthe shroud. In another aspect, the shroud comprises a handle and arotatable member, wherein the rotatable member is configured to rotateabout the handle. The shroud and the portable electronic device may beconfigured to rotate relative to the dock when engaged therewith.

According to another embodiment of an anti-theft device, the anti-theftdevice includes a handle and a plurality of arms each configured toreleasably engage the handle and the portable electronic device. Theanti-theft device also includes a dock configured to releasably engagethe handle such that the handle and the portable electronic device arelocked to the dock when engaged with the dock. The dock comprises atleast one finger configured to extend and retract relative to the handleto engage and disengage the handle. In one aspect, the portableelectronic device is configured to be disengaged from the dock while theplurality of arms remain in engagement with the portable electronicdevice.

In another embodiment, a method for protecting a portable electronicdevice from theft or unauthorized removal is provided. The methodincludes coupling a shroud to a portable electronic device andreleasably engaging the shroud with a dock such that the shroud and theportable electronic device are locked to the dock when engaged with thedock. The dock includes at least one finger configured to extend andretract relative to the dock to engage and disengage the shroud.According to an aspect of the method, the coupling step includes atleast partially enclosing the portable electronic device with a shroud.The method may further include arming the dock for generating an audibleand/or a visible alarm signal in response to the shroud being separatedfrom the dock in an unauthorized manner.

BRIEF DESCRIPTION OF THE DRAWING FIGURES

FIG. 1 is a front view of a portable electronic device configured with asensor for use with an anti-theft device according to the invention.

FIG. 2 is a side view of the portable electronic device of FIG. 1.

FIG. 3 is a rear view of the portable electronic device of FIG. 1.

FIG. 4 is a rear view of another portable electronic device configuredwith a shroud for use with an anti-theft device according to theinvention.

FIG. 5 is a detail view showing the handle of the shroud of FIG. 4.

FIG. 6 is a perspective view showing the portable electronic device ofFIG. 4 and the shroud of FIG. 4 disposed on a dock.

FIG. 7 is a perspective view showing the dock of FIG. 6 in greaterdetail with the portable electronic device and the shroud removed.

FIG. 8 is a perspective view showing another anti-theft device forprotecting a portable electronic device according to the invention.

FIG. 8A is a cross-sectional view showing the anti-theft device and theportable electronic device of FIG. 8.

FIG. 9 is a perspective view showing a dock of the anti-theft device ofFIG. 8 with the portable electronic device and the shroud removed.

FIG. 9A is a partial perspective view showing an electro-mechanical lockmechanism for the dock of the anti-theft device of FIG. 8.

FIG. 9B is a partial top view showing the electro-mechanical lockmechanism for the dock of the anti-theft device of FIG. 8.

FIG. 9C is a schematic illustrating the electro-mechanical lockmechanism for the dock of the anti-theft device of FIG. 8.

FIG. 10 is a perspective view showing the portable electronic device andthe shroud of FIG. 8.

FIG. 11 is a perspective view showing the opposite side of the shroud ofFIG. 10.

FIG. 12 is a perspective view showing the dock and a portion of theshroud of the anti-theft device of FIG. 8 in greater detail with theremainder of the shroud and the portable electronic device removed.

FIG. 13 is a perspective view showing another anti-theft device forprotecting a portable electronic device according to the invention.

FIG. 14 is a perspective view showing a dock of the anti-theft device ofFIG. 13.

FIG. 14A is a partial top view showing a mechanical lock mechanism forthe dock of the anti-theft device of FIG. 13.

FIG. 14B is a partial perspective view showing the mechanical lockmechanism for the dock of the anti-theft device of FIG. 13.

FIG. 15 is a perspective view showing the shroud and the portableelectronic device of FIG. 13.

FIG. 16 is a perspective view of another anti-theft device forprotecting a portable electronic device according to the invention.

FIG. 17 is a front view of another anti-theft device for protecting aportable electronic device according to the invention.

FIG. 18 is a side view showing the anti-theft device and the portableelectronic device of FIG. 17.

FIG. 19 is a rear view showing a portion of the anti-theft device andthe portable electronic device of FIG. 17.

FIG. 20 is a top view showing the portion of the anti-theft device ofFIG. 19.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Reference will now be made to the accompanying drawing figures whereinidentical reference numerals denote the same or similar parts, elements,components, assemblies, subassemblies or the like throughout the variousviews. The attached drawing figures show exemplary embodiments of ananti-theft device 10 for protecting a portable electronic device 15, forexample, a tablet, against theft or unauthorized removal. As usedherein, the term “tablet” is intended to include without limitation alltypes of portable, personal computers, for example, laptop, notebook,mini-notebook, sub-notebook and netbook type computers, as well aspersonal data assistant (PDA) and personal mobile communications (e.g.,cell phone) type devices. The anti-theft device 10 may be suitable foruse by customers or employees, such as a retail store associate, ateacher, a nurse, a maintenance worker, or an airline pilot/attendant,in a variety of locations.

FIG. 1 shows a portable electronic device 15, and in particular atablet, for use with an anti-theft device 10 according to the invention.In one embodiment, the anti-theft device 10 includes a shroud 20 that isconfigured to at least partially enclose the portable electronic device15 (see, e.g., FIG. 1, FIG. 4, FIG. 6, FIG. 8, FIG. 10, FIG. 13 and FIG.15). The shroud 20 may include a sensor 24 attached to or otherwiseintegrated therewith. The shroud 20 may simply be secured to theportable electronic device 15 with a sensor 24 such that the sensor isconfigured to generate a notification signal when the shroud is removed,or when the portable electronic device 15 and the sensor 24 areseparated. Alternatively, the shroud 20 may be locked to the portableelectronic device 15 such that a key 25A or 25B or other authorization(e.g., pass code) is required to remove the shroud. For example, theshroud 20 may define an electrical sense loop with the portableelectronic device 15 such that removal of the shroud results in thegeneration of an alarm signal. The shroud 20 may include furtherfunctionality, such as a GPS receiver or the like, for identifying thelocation of the shroud, and/or an EAS tag. In one embodiment, the shroud20 is configured to communicate with a remote device, base unit orstation. For example, the shroud 20 may be configured to communicate asecurity signal to a remote base unit to provide notification to thebase unit. Moreover, the shroud 20 and/or the portable electronic device15 may be configured to communicate with a remote device or remote baseunit for locking/unlocking the shroud from a docking station or dock(individually and collectively referred to hereinafter as dock 50),and/or for arming/disarming the dock 50. Such communications may occurwirelessly using any suitable communications protocol (e.g., WiFi,Bluetooth, 3G, 4G, etc.).

As previously mentioned, a sensor 24 may be coupled to the portableelectronic device 15. The sensor 24 and/or portable electronic device 15is configured to generate a notification signal when the portableelectronic device is separated from the sensor. For example, the sensor24 and/or portable electronic device 15 may be configured to generate asecurity signal (e.g., an audible, a visible and/or haptic alarm) inresponse to detecting a security event. In one embodiment, the sensor 24is integrated with the portable electronic device 15, such as within abattery compartment of the device, or by being embedded or moldedtherein. The sensor 24 may be attached to the portable electronic device15, such as using a variety of techniques, including apressure-sensitive adhesive, a shroud, a clamp, or attaching to one ormore ports on the device. In yet another embodiment, the existingcomponents of the portable electronic device 15 may be configured togenerate a notification signal. Thus, a software application may beprovided that configures the portable electronic device 15 with thefunctionality.

In one embodiment, the sensor 24 is an EAS tag this is configured tocooperate with an EAS tower or controller to generate a notificationsignal should the tower or controller detect the EAS tag. Thus, the EAStower or controller may be configured to cause the sensor 24 to generatea notification signal should a security event be detected. In anotherembodiment, the anti-theft device 10 may include both a sensor 24 and anEAS tag. In one embodiment, the portable electronic device 15 includessoftware for communicating with an EAS tower and generating a securitysignal based on communication with the tower.

In some embodiments, the shroud 20 includes a handle 26 and/or strap 28for facilitating ease of handling the portable electronic device 15(see, e.g., FIG. 4 and FIG. 10). The handle 26 and/or strap 28 mayutilize other features, such as a swivel or rotatable component, thatallows the handle and/or strap to rotate at least 360 degrees about anorthogonal axis for ease of use (see, e.g., FIG. 5). The handle 26and/or strap 28 may include any suitable means to facilitate rotation,such as a bearing structure that allows pivoting relative to the handleand/or strap. For example, an embodiment of the anti-theft device shownin FIG. 4 and FIG. 5 includes a rotatable member 27 mounted for rotationwith respect to a handle 26 or other engagement feature, such that therotatable member 27 may rotate freely with respect to the handle 26 orengagement feature. The shroud 20 could also be tethered to the user orto a fixed object to provide further security, for example, with a clipor a strap 28. The shroud 20 may be configured to at least partiallyencapsulate the portable electronic device 15 and may be formed ofvarious suitable materials, such as a relatively rigid polymericmaterial. The shroud 20 may be sized and configured to closely conformto the shape of the portable electronic device 15. For example, FIGS. 4,10, 11, and 15 illustrate embodiments of a shroud 20 including a firstmember 21 and a second member 22 that are configured to cover the rearof the portable electronic device 15 and to engage the opposite ends andthe opposite sides of the portable electronic device 15. Thus, theshroud 20 may surround the periphery (e.g., the sides and ends) of theportable electronic device 15. The first and second members 21, 22 maybe engaged with one another in any desired manner, such as in a pressfit, snap fit, fasteners, etc.

As previously mentioned, the anti-theft device 10 may further include adock 50 for receiving and supporting the portable electronic device 15(see e.g., FIGS. 6, 13, 16 and 18). The dock 50 may be configured totemporarily secure the portable electronic device 15 thereto. In turn,the dock 50 may be configured to be fixed to a support surface, such asa fixture, a counter, a wall, or the like, for example, with one or morefasteners 51 (see, e.g., FIG. 8A and FIG. 13) and/or adhesive. In someinstances, the portable electronic device 15 is configured to be readilyplaced within the dock 50 and removed by an authorized user. Forexample, a retail store associate may utilize a tablet 15 forpoint-of-sale transactions and wish to temporarily secure the tabletagainst theft or unauthorized removal. As such, the dock 50 may also beconfigured to be alarmed, locked, and/or otherwise secured so thatunauthorized persons cannot remove the portable electronic device 15. Inone embodiment, the dock 50 includes an alarming device (e.g., an alarm52 and monitoring electronics 54) configured to arm when the portableelectronic device 15 is positioned within the dock, and to disarm whenthe portable electronic device is removed by an authorized user. Theportable electronic device 15 may be operably engaged with the dock 50and/or with an alarming device in a wireless manner (i.e., no tether isrequired), although wired means may be used if desired.

The dock 50 may include an alarm 52 and monitoring electronics 54 foractivating the alarm in the event that the shroud 20 and the portableelectronic device 15 are detached from the dock in an unauthorizedmanner. The monitoring electronics 54 may be configured to monitor oneor more sensors or switches and to activate an audible or visible alarmsignal in response to a security event. Moreover, the dock 50 mayinclude a processor or controller that is operably engaged with themonitoring electronics 54, a motor, switches, an alarm, etc.

The drawing figures show exemplary embodiments of a dock 50 configuredto support and secure the portable electronic device 15, although othershapes and configurations are possible for supporting a variety ofportable electronic devices. For example, the shroud 20 may include ahandle 26 or other engagement member that is configured to mate with acorresponding engagement feature of the dock 50. Moreover, the dock 50may be configured to support the portable electronic device 15 in one ofa plurality of desired orientations (e.g., portrait or landscape).Alternatively, the shroud 20 may be configured to rotate about the dockso as to be positioned in any desired orientation (e.g., rotatable 360degrees).

The dock 50 may include a mechanical mechanism or sensor, such as apressure or plunger switch, operably engaged with the alarm 52 andmonitoring electronics 54 that is configured to activate in response toengagement and disengagement with the portable electronic device 15and/or the shroud 20. Likewise, the dock 50 may include a mechanicalmechanism or sensor that is configured to sense if the dock has beenremoved from a support surface in an unauthorized manner. The authorizeduser may utilize a key 25A or 25B, pass code, or the like to disarm thealarm 52 and monitoring electronics 54. In some embodiments, the dock 50is configured to power and/or charge a portable electronic device 15that is docked on the dock. In this case, the anti-theft device 10 mayinclude a power cord coupled to the dock 50, inductive chargingfunctionality, or contact charging functionality. For example, the dock50 may pass power to the portable electronic device 15 with a power cord32A that is connected to a power input port of the portable electronicdevice via a connector 36 (see, e.g., FIGS. 13, 15, and 16). In somecases, an OEM cable 32A may be used for charging the portable electronicdevice 15 and may be routed from the dock 50 to the portable electronicdevice. An LED or other signaling device may be used to indicate thatthe anti-theft device 10 is armed. In addition, the alarm 52 andmonitoring electronics 54 may be configured to generate an alarm signal(e.g., an audible and/or visible alarm) in response to unauthorizedremoval of the portable electronic device 15 and/or shroud 20 from thedock 50.

In some embodiments, the shroud 20 may include a power source forpowering the portable electronic device 15. For example, the shroud 20could include a battery that is configured to provide power to theportable electronic device 15 while the portable electronic device isundocked from the dock 50. Thus, the shroud 20 may be configured toextend the battery life of an undocked portable electronic device 15.Moreover, the portable electronic device 15 may also be configured to becharged while docked. For instance, the shroud 20 may be configured tofacilitate passing power to the portable electronic device 15. In thisregard, the shroud 20 may include a cable, connector, or the like forpassing electrical power from the dock 50 to the portable electronicdevice 15 to power the internal battery of the portable electronicdevice 15. For example, FIG. 9 shows a dock 50 electrically connected toa cable 30 that may be coupled to an external power source (not shown).When the shroud 20 is docked on the dock 50, the dock is configured topass power to the shroud and/or the portable electronic device 15. Thecable 30 may also provide power to the alarm 52 and/or monitoringelectronics 54 within the dock 50.

In one embodiment, FIG. 11 shows a shroud 20 that includes a flexiblecord, cable, ribbon, substrate, or the like 32 that includes one or moreelectrical contact(s) 34 at one end for electrically communicating withthe dock 50, and a connector 36 at an opposite end for engaging a powerand/or data input port on the portable electronic device 15. FIG. 12shows the flexible cable 32 in a docked position on the dock 50 and withthe shroud 20 removed for purposes of clarity. The flexible cable 32 mayinclude one or more electrical conductors (e.g., power and ground)extending between the contact(s) 34 and the connector 36. The conductorsmay be coupled to a flexible substrate (e.g., a polymer material). Theconnector 36 may be any suitable connector configured to engage a powerand/or data input port of the portable electronic device 15, for examplea micro-USB connector. In one embodiment, the contacts 34 at the end ofthe flexible cable 32 may extend through an opening defined in theshroud 20 so as to be configured to electrically connect to one or morecorresponding contacts 53 provided on the dock 50 to facilitate contactcharging when the shroud is engaged with the dock. The flexible cable 32may be positioned within the shroud 20 such that the flexible cableextends along an interior surface of the shroud. The flexible cable 32may be coupled to the shroud 20 and be of a low profile (e.g., flat orribbon-like), such that the cable is not visible when the portableelectronic device 15 is secured within the shroud and does not hinderplacement of the portable electronic device within the shroud (see,e.g., the cross-sectional view shown in FIG. 8A). The electrical contactbetween the contacts 34 of the flexible cable 32 and the correspondingcontacts 53 provided on the dock 50 may also define a detectable senseloop that is in electrical connection with the monitoring electronics54. Thus, should the shroud 20 be removed from the dock 50 in anunauthorized manner (e.g., without first disarming the monitoringelectronics 54 with a key 25A), the monitoring electronics may sense thebreak in the sense loop and generate an alarm signal.

In some embodiments, the anti-theft device 10 comprises a lock mechanism40 for securing the portable electronic device 15 on the dock 50. Thelock mechanism 40 may include any combination of electrical, magnetic,inductive, and/or mechanical interaction. For example, the lockmechanism 40 may be configured to automatically lock when the portableelectronic device 15 is positioned onto the dock 50. In one embodimentshown in FIGS. 7-12, the dock 50 may include one or more fingers 42 thatare configured to extend and retract relative to the dock. For example,the dock 50 may include a pair of opposing fingers 42 at radiallyopposite locations. Alternatively, or in addition, the dock 50 mayinclude any number of fingers 42, for example, a plurality of fingersspaced equidistantly from one another around the periphery of the dock.The fingers 42 may be configured to automatically extend outwardly toengage the shroud 20 when the shroud with the portable electronic device15 is placed onto the dock 50.

For example, the fingers 42 may be spring-biased towards an extendedposition, or be configured to automatically extend outwardly in responseto the monitoring electronics 54 of the dock 50 detecting the presenceof the shroud 20. In some embodiments, the shroud 20 includes a handle26 defining an internal groove or slot 26A (see, e.g., FIGS. 10 and 15)that is configured to mate with the finger(s) 42. The groove or slot 26Amay extend at least partially about the circumference of the handle 26,and in some embodiments, about the entire circumference. The groove orslot 26A may be configured to allow the shroud 20 to pivot to aparticular orientation(s) relative to the dock 50. As shown in FIG. 9,the dock 50 may include a raised protrusion 44, and the fingers 42 maybe configured to extend/retract relative to the protrusion. The handle26 may include an opening 26B having a depth that is configured to matewith the protrusion 44, and thereby align the groove or slot 26A withthe fingers 42 when the shroud 20 is positioned onto the dock 50. FIG.15 shows another embodiment of a shroud 20 that is configured to beengaged by a dock 50. In this embodiment, the dock 50 also includes aplurality of fingers 42 that are configured to extend outwardly toengage a groove or slot 26A defined within a handle 26 of the shroud 20.

In order to release the shroud 20 and the portable electronic device 15from the dock 50, an authorized user could use an electronic key 25A orother suitable security means (e.g. a pass code) to disarm the alarmingdevice (e.g., alarm 52 and monitoring electronics 54) and/or disengagethe lock mechanism 40. For example, FIG. 8 shows that the dock 50includes a port 55A for communicating with an electronic key 25A forarming and/or disarming the alarming device. FIG. 13 and FIG. 14 showanother exemplary embodiment of an anti-theft device 10 according to theinvention wherein a mechanical key 25B is configured to mechanicallyengage a lock 55B to lock or unlock the shroud 20 from the dock 50.Thus, an authorized user may utilize a mechanical key 25B for manuallymoving the fingers 42 to an unlocked position, and in some cases, to alocked position. In some instances, a customized shroud or shroudadapter may be operably engaged with the portable electronic device 15that is configured to engage with the lock mechanism 40. This may beaccomplished with a shroud 20 that covers the portable electronic device15 except for the display 16, but could be accomplished in other ways,for example, by attaching locking features to the back of the portableelectronic device 15, for example using an adhesive.

FIG. 14A and FIG. 14B show one embodiment of a mechanical lock mechanism40. In this embodiment, a pair of fingers 42 is disposed on radiallyopposite sides of the dock 50. The fingers 42 may be spring-biasedtowards an extended position relative to the dock 50. FIG. 14A is apartial top view of the dock 50 for the purpose of illustrating themechanical lock mechanism 40. As shown, the fingers 42 may be separatedfrom one another in an extended position such that the gap therebetweenallows the fingers to be retracted towards one another to disengage fromthe shroud 20. A spring 45 may engage both fingers and thereby bias thefingers away from one another. In order to facilitate retraction of thefingers 42, the lock mechanism 40 may include a mechanically actuatedlock 55B. In this regard, FIG. 14B shows a partial perspective view ofthe dock 50 wherein the mechanical lock mechanism 40 is configured to beengaged by a mechanical key 25B (FIG. 13). Rotation of the mechanicalkey 25B results in rotation of a cam 46 that is configured to engageeach of the fingers 42. In this regard, the cam 46 may be a disk memberwith a camming surface 47 on opposing sides, wherein each cammingsurface 47 is configured to engage a respective finger 42. As thecamming surface 47 rotates it engages the corresponding finger 42 andforces the finger inwardly to overcome the biasing force of the spring45, and thereby retract the fingers within the dock 50. The cam 46 mayalso be spring-biased such that releasing the mechanical key 25B (FIG.13) results in biasing of the cam 46 in an opposite direction to therebyallow the fingers 42 to extend outwardly from the dock 50. The fingers42 are configured such that placement of the shroud 20 on the dock 50allows the handle 26 to slide over and engage the fingers 42 so as toovercome the biasing force of the spring 45 and urge the fingersinwardly until the shroud is seated on the dock. Once seated on the dock50, the fingers 42 are aligned with the groove or slot 26A defined inthe handle 26 of the shroud 20 and allowed to bias outwardly again.

Another embodiment of a lock mechanism 40 includes an electro-mechanicalconnection between the dock 50 and the shroud 20 and/or portableelectronic device 15. For instance, an electro-mechanical lock may beconfigured to move into place when triggered by the portable electronicdevice 15 being docked, such as with one or more pressure switches,optical switches, or similar means of detecting the presence of theportable electronic device 15.

FIGS. 9A-9C illustrate one embodiment of an electro-mechanical lockmechanism 40 suitable for use with an anti-theft device 10 according tothe invention. In this regard, FIG. 9A shows a partial perspective viewof a dock 50 wherein one finger 42 has been removed for purposes ofillustration. In this particular embodiment, the dock 50 includes fourfingers 42 equidistantly spaced apart from one another around theperiphery of the dock. The fingers 42 may be spring-biased outwardlyrelative to the dock 50. The dock 50 includes a motor 56 operablyengaged with a gear 57, which in turn is operably engaged with a cam 58.Actuating the motor 56 results in rotation of the gear 57, which alsorotates the cam 58. The cam 58 includes camming surfaces 58A that areconfigured to engage a respective finger 42 to allow the finger toretract relative to the dock 50. For example, the cam 58 may include oneor more camming surfaces 58A for engaging a respective finger 42 as thecam is rotated. Thus, rotation of the cam 58 facilitates retraction ofeach of the fingers 42 relative to the dock 50. Moreover, theelectro-mechanical lock mechanism 40 may include a switch 59 configuredto activate and deactivate the motor 56. FIG. 9C illustrates an exampleof such an electro-mechanical lock mechanism 40. For example, the cam 58may include a plurality of engagement members 58B that are configured toengage a switch 59 when the cam is rotated. Thus, rotation of the cam 58causes one of the engagement members 58B to engage the switch 59 to turnoff the motor 56. Thus, the timing of the activation of the motor 56 maybe tied to rotation of the cam 58, and a partial rotation of the cam(less than about 360 degrees) may retract each of the fingers 42.Moreover, the motor 56 may be operably engaged with the electronics ofthe dock 50 such that communication between the dock and an electronickey 25A facilitates activation of the motor. Similar to the embodimentdiscussed above, the fingers 42 may be configured such that placement ofthe shroud 20 on the dock 50 allows the handle 26 to slide over andengage the fingers 42 so as to overcome the biasing force of the springs45 and urge the fingers inwardly until the shroud is seated on the dock.Once the shroud 20 is seated on the dock 50, the fingers 42 may beallowed to bias outwardly again when the fingers are aligned with thegroove or slot 26A defined in the handle 26 of the shroud.

Another embodiment of a lock mechanism 40 is an electromagnetic lock. Inthis embodiment, the presence of the portable electronic device 15 maybe detected upon docking with the dock 50, and an electromagnet (notshown) would engage, thereby holding the portable electronic device 15to the dock 50 by a magnetic force.

In another embodiment of a lock mechanism 40 shown in FIG. 16, theanti-theft device 10 may include at least one arm 60 operably engagedwith the dock 50 and configured to releasably engage the shroud 20and/or portable electronic device 15. In one embodiment, the dock 50 mayinclude a plurality of arms 60 that are configured to extend and retractrelative to the dock 50 and/or the portable electronic device 15 to movebetween engaged and disengaged positions. For example, one or more arms60 may be operably engaged with the handle 26 and be configured toengage the shroud 20 and/or portable electronic device 15. FIGS. 17-20show one embodiment where a plurality of arms 60 is operably engagedwith the handle 26. In this example, four arms 60 are shown and areconfigured to be adjusted relative to the handle 26 to accommodatedifferent sized portable electronic devices 15. The arms 60 may beoffset from one another across one or more axes so that the arms mayallow for lateral adjustment relative to one another when engaging aportable electronic device 15 having smaller dimensions. FIG. 19 showsan exemplary embodiment wherein two pairs of opposing arms 60 extendparallel to one another and offset relative to one another along both alateral axis L2 and a longitudinal axis L1. The handle 26 may includeslots for receiving each arm such that each arm may slide to a desiredposition relative to the portable electronic device. In addition, eachof the arms 60 may have an engagement member 62 at its end for engaginga surface of the portable electronic device 15, for example, an edge anda front surface of a tablet, as best seen in FIG. 17 and FIG. 18. It isto be understood that the arms 60 and engagement members 62 may beconfigured to engage the portable electronic device 15 regardless ofwhether a shroud is also provided. Thus, the arms 60 and engagementmembers 62 may be used in either instance, with or without a shroud 20.

FIG. 19 shows that when the portable electronic device 15 is unlockedfrom the lock mechanism 40, the portable electronic device 15 may beremoved from the dock 50 while the arms 60 remain in engagement with theportable electronic device. Thus, the arms 60 do not interfere withlocking or unlocking the portable electronic device 15 to or from thedock 50. In addition, when unlocked from the dock 50, a user is able tocarry the portable electronic device 15 while the arms 60 remain engagedtherewith. Furthermore, the arm(s) 60 may be secured to the handle 26using any desired technique, such as directly or with an adapter platecoupled to the handle that is configured to receive and engage thearm(s) with the adapter plate. The arm(s) 60 may be mechanically securedto the handle 26 or an adapter plate using any suitable mechanism, suchas with one or more fasteners. Alternatively, or in addition, thearms(s) 60 may be locked and unlocked from the handle 26 using a key,such as an electronic key 25A or a mechanical key 25B.

In some embodiments, the arms 60 may be configured to extend and retractin a similar manner as that described above with respect to the lockmechanisms 40 configured to activate the fingers 42. Thus, activation ofthe mechanical key 25B with the lock 55B of the dock 50 may disengagethe arms 60 to allow an authorized user to remove the shroud 20 andportable electronic device 15 from the dock. For example, activation ofa mechanical lock 55B with a mechanical key 25B may result in extensionof at least one of the arms 60 so that the shroud 20 and portableelectronic device 15 may be removed. Alternatively, activation of themechanical lock 55B may simply unlock at least one of the arms 60 sothat the arms may be manually moved out of engagement with the shroud 20and portable electronic device 15. It is understood that any pluralityof arms 60 could be employed, such as two, three, four, or more arms.

An unlocking feature for removing the portable electronic device 15 ordisarming the alarming device may take many forms, including thosediscussed above. One embodiment is an electronic key 25A utilizing radiofrequencies, infrared, or some other electronic means to communicatewith the monitoring electronics 54 of the dock 50 and/or the alarmingdevice to allow the portable electronic device 15 to be released. Forexample, the dock 50 may include a port 55A for receiving a signal fromthe electronic key 55B having a unique identifying code recognizable bythe dock, but otherwise unrecognizable by other docks not associatedwith the code (e.g., in other departments or stores).

In one embodiment, the sensor 24 and/or shroud 20 may be coupled to theportable electronic device 15 via one or more connectors and input portson the device (e.g., power input, head phone jack, and/or accessoryports). For example, the sensor 24 and/or shroud 20 may include aconnector that releasably engages the head phone jack of the portableelectronic device. Should the connector be removed from the head phonejack of the portable electronic device, a notification signal may begenerated unless the user provides proper authorization (e.g., enteringa password or presenting a key 25A). In one embodiment, the connectorincludes a lock (e.g., mechanical and/or electrical engagement) 23 thatengages the head phone jack and that may only be disengaged from theconnector using a key 25A or other suitable means (e.g., a password).The head phone jack could be male or female depending on the type ofconnector utilized to operably engage the portable electronic devicewith the sensor and/or shroud.

In another embodiment, the anti-theft device includes functionality fordetecting changes in light level. For example, the anti-theft device 10may be configured to detect a change in light level while the portableelectronic device 15 is moving. Such movement and change in light level(e.g., from light to dark) may indicate that the portable electronicdevice 15 has been concealed in an unauthorized manner (e.g., by placingthe device in a bag or under an item of clothing). Various techniquescould be utilized for this purpose (e.g., light-detecting sensors,photodiodes, etc.) for detecting a change in light level. To reduce theincidence of false alarms, the anti-theft device 10 may also detectmovement of the portable electronic device 15, as well as the movementfor a predetermined period of time, which would distinguish instancesthat are not indicative of theft, such as where the portable electronicdevice 15 is dropped or the power is turned off. Where a security eventis detected, such as where a decrease in light level is detected for apredetermined period of time while the portable electronic device 15 ismoving, the sensor 24 and/or portable electronic device may beconfigured to communicate a security signal to a remote monitoringlocation. For example, the sensor 24 and/or portable electronic device15 could send a wireless security signal to a monitoring station fortriggering an alarm.

A key, fob, another mobile device, or the like 25A may be configured tobe paired with a portable electronic device. Thus, the term “key” is notintended to be limiting. In some embodiments, the pairing may occur whenthe portable electronic device 15 is removed from a dock 50, although adock is not necessary to do so. The pairing may occur between the key25A and the portable electronic device 15, or between the key 25A andthe sensor 24. For example, the pairing may be accomplished usingradiofrequency, acoustic waves, magnetic waves, infrared, or a varietyof other wireless or electronic couplings. Once this coupling hasoccurred, either the key 25A or the portable electronic device 15 maymonitor a specified or predetermined distance therebetween. The key 25Amay be held by a user in a pocket or on a lanyard or in any such manneras to maintain the key with the person. If a predetermined distance froman authorized location or area is exceeded, a notification signal (e.g.,an audible alarm) may be generated, either from the key 25A or theportable electronic device 15. In this manner, the anti-theft device 10is configured to warn a user who has left the portable electronic device15 behind. It may also serve as a warning to any unauthorized user whoattempts to steal the portable electronic device 15 and leaves theproximity of the authorized user. In addition to a notification signal,the portable electronic device 15 may be rendered inoperable should thedevice not be returned within the allowed distance within apredetermined period of time. Alternatively or in addition, thenotification signal may become progressively more pronounced should theportable electronic device 15 not be returned within the alloweddistance from the key 25A or as the portable electronic device travelsfurther from the key. Due to the pairing of the key 25A and the portableelectronic device 15, users of specific devices may be monitored and/orrecorded.

The proximity of the portable electronic device 15 in relation to thekey 25A may be determined using a variety of techniques. For example,the key 25A may be configured to monitor the strength of the wirelesssignal of the portable electronic device 15. Where the wireless signalbecomes too weak due to the portable electronic device 15 being locatedbeyond a predetermined distance or perimeter from the key 25A, anotification signal may be generated. Of course, the key 25A may beconfigured to generate a wireless signal, and the portable electronicdevice 15 or a sensor 24 associated with the portable electronic devicemay be configured to detect the wireless signal and perform a similarfunction. In other embodiments, the portable electronic device 15 mayinclude functionality (e.g., a GPS receiver, gyroscopes, and/oraccelerometers) for determining its location and communicating with thekey 25A to determine the distance therebetween. Likewise, the key 25Amay include such locating functionality. Should the distance between theportable electronic device 15 and the key 25A be greater than apredetermined distance, a notification signal may be generated.

It is understood that a notification signal could also be generated whenthe portable electronic device 15 is within a predetermined distancefrom the key 25A or some other device (e.g., a security gate). Thus, anotification signal could be generated should the key 25A (or some otherdevice) and the portable electronic device 15 be too close to oneanother. The key 25A and/or portable electronic device 15 could be codedto include the functionality of generating a notification signal shouldthe key and the portable electronic device be too close or too far awayfrom one another.

In one embodiment, the key 25A may include a “snooze” function wherebythe key may be configured to delay the generation of a notificationsignal for a predetermined period of time. For example, should the userof the portable electronic device 15 attend to another task andtemporarily leave the device behind, the key 25A or portable electronicdevice may interpret the inactivity as being indicative of a securityevent. Thus, the user may use the key 25A to delay the generation of anotification signal, but following the predetermined period of timeallowed for snoozing, a notification signal may be generated and/or theuser may be asked to provide authentication to the portable electronicdevice 15 before use may again be commenced. The predetermined period ofsnooze time may be preset into the key 25A or the portable electronicdevice 15, or the snooze time may be input by an authorized user.

In one embodiment, the key 25A and the portable electronic device 15 maybe paired or otherwise linked so as to provide bi-directionalcommunication therebetween. Thus, the key 25A and the portableelectronic device 15 may be wirelessly linked to one another such thatseparation beyond a predetermined distance results in a notificationsignal. Alternatively, the key 25A may unilaterally determine whetherthe portable electronic device 15 is within a predetermined distance.For example, the key 25A may generate a digital “ping” or similar signalthat is received by the portable electronic device 15. Should theportable electronic device 15 receive the signal from the key 25A, theportable electronic device may send a corresponding signal back to thekey indicating that the signal was received by the portable electronicdevice. Should the key 25A not receive a corresponding signal from theportable electronic device 15, a notification signal may be generated.Likewise, the portable electronic device 15 may be configured to send asignal to the key 25A, and the key configured to listen for the signal.Should the portable electronic device 15 not receive a correspondingsignal back from the key 25A, a notification signal may be generated.

It is understood that the communication between the key 25A and theportable electronic device 15 may alternatively be one-directional. Forinstance, the key 25A may be configured to send a signal or digital“ping,” and if the portable electronic device 15 does not receive thesignal or digital “ping,” a notification signal is generated by theportable electronic device. Likewise, the portable electronic device 15may be configured to generate a signal or digital “ping,” and if the key25A does not detect the signal or digital “ping,” a notification signalis generated by the key. Thus, a return signal from the key 25A orportable electronic device 15 is unnecessary in this embodiment. Eitherthe key 25A or the portable electronic device 15 may send such a signalor digital “ping” continuously or in desired time increments.

In further embodiments, the anti-theft device 10 may employ a “timeout”feature should the key 25A and portable electronic device 15 beseparated beyond an allowable distance therebetween. For example, theportable electronic device 15 and/or key 25A may be rendered inoperableif the portable electronic device is not returned within a predetermineddistance from the key in a predetermined amount of time. The portableelectronic device 15 may be configured to prompt the user to input apassword or present a security code or key in order to authenticate thatthe user is an authorized user. In other cases, the portable electronicdevice 15 may be configured to timeout if the device remains motionlessfor more than a predetermined period of time. The portable electronicdevice 15 may then request the user to provide authentication (e.g., apassword) before the portable electronic device may be again operated. Asimilar timeout feature could be used where the user of the portableelectronic device 15 has changed. Thus, should another user take controlof the portable electronic device 15, the user may be prompted toprovide suitable authentication. The key 25A could also timeout after apredetermined period of time such that the key requires furthervalidation before use with a portable electronic device 15. Forinstance, the key 25A may timeout after a set time period (e.g., 6-10hours) to limit the incidence of theft or reuse of the key by anunauthorized user. In order to prevent inadvertent timing out, the key25A and/or portable electronic device 15 may be configured to generate awarning signal (e.g., audible, visible, and/or haptic) that a timeout isgoing to occur in a predetermined period of time. In this instance, theuser can override the timeout if the user presents the key 25A,continues use of the portable electronic device 15, or otherwiseprovides sufficient validation.

In some embodiments, the portable electronic device 15 can be armed,disarmed, and/or silenced with the key 25A, which may utilizemechanical, wireless, and/or electrical communication between theportable electronic device and the security key. For example, the key25A may be configured to wirelessly communicate a security code to theportable electronic device 15, such as by infrared, optical, acoustic,or inductive communication. An alarming device may include a port,window, or the like configured to receive wireless signals from the key25. In one particular embodiment, the key 25A is similar to thatdisclosed in U.S. Pat. No. 7,737,845, entitled Programmable Key for aSecurity System for Protecting Merchandise, the entire disclosure ofwhich is incorporated herein by reference. In additional embodiments,the portable electronic device 15 may include near field communication(NFC) functionality and be configured to communicate with the key 25A oran alarming device having NFC functionality for arming and disarming theportable electronic device. Alternatively, the alarming device mayinclude “screen swipe” functionality and be configured to senseparticular movement or motion of the portable electronic device 15and/or the key 25A to arm or disarm the portable electronic device.Likewise, the portable electronic device 15 and/or key 25A may includebiometric functionality for recognizing a particular user to arm ordisarm the portable electronic device.

In another embodiment, the anti-theft device 10 may utilize motion ofthe portable electronic device 15 and/or key 25A to determine whetherthe portable electronic device is within an authorized perimeter orarea. In this way, the authorized perimeter may be defined about aparticular location where the portable electronic device 15 or key 25Ahas stopped moving. For example, the authorized area may be defined tobe within an estimated reaching distance of the user (e.g., about 2-3feet). Thus, should a user leave the portable electronic device 15 andmove beyond a predetermined distance, a security signal may be generatedby the portable electronic device and/or key 25A, or the portableelectronic device could be timed-out such that a password, security codeor key is required to resume use of the portable electronic device.

Various techniques may be used to determine the location of the portableelectronic device 15, the shroud 20, the key 25A, and/or the sensor 24.In one embodiment, the location of the portable electronic device 15 isdetermined with existing functionality of the device (e.g., a GPSreceiver, gyroscopes, and/or accelerometers), although suchfunctionality could alternatively be integrated with a sensor 24, a key25A, and/or a shroud 20. In some embodiments, the anti-theft device 10incorporates techniques for determining a location of the portableelectronic device 15 similar to those disclosed in U.S. Publication No.2012/0293330, entitled Systems and Methods for Protecting Retail DisplayMerchandise From Theft, filed May 18, 2012, the entire disclosure ofwhich is incorporated herein by reference.

Various techniques in addition to those previously described withreference to the drawing figures may also be used to protect theportable electronic device 15 from theft or unauthorized removal. Forexample, the portable electronic device 15 may include functionality orcooperate with one or more other devices to provide security in avariety of locations, whether fixed or defined by a user. The authorizeduse of the portable electronic device 15 may be limited based on alocation of the portable electronic device relative to the anti-theftdevice 10, another device, a location, or a predefined perimeter. Thus,safeguards may be provided to a user of a portable electronic device 15where the user is required to use the device in a variety of locationsand settings. Should a security event be detected (e.g., removal of theportable electronic device 15 from an authorized perimeter), anotification or security signal (e.g., an audio, a visual, and/or hapticalarm) may be generated by the anti-theft device 10, the portableelectronic device 15, or from any other device or location.

In one embodiment, the anti-theft device 10 utilizes the position of theportable electronic device 15 to determine whether the portableelectronic device has moved to an unauthorized location. In this regard,a predefined distance from an authorized location may be defined, or apredefined perimeter may be defined about an authorized location. Whilethe portable electronic device 15 is within the predefined distance orinside the predefined perimeter, no security signal is generated.However, should the portable electronic device 15 be moved beyond thepredefined distance or perimeter, a notification or security signal maybe generated. The notification signal may also be generated if theportable electronic device 15 is moved beyond the authorized distance orperimeter for a predetermined period of time. Thus, should the portableelectronic device 15 be temporarily moved beyond the authorized distanceor perimeter, a notification signal may not be generated should theportable electronic device 15 be returned within a predetermined periodof time. Various notification signals could be generated. For example, afirst warning signal could be generated when the portable electronicdevice 15 is moved beyond the predefined distance or perimeter. Further,more significant security signals (e.g., greater intensity, duration,etc.), may be generated should the portable electronic device 15 not bereturned to a location within the authorized distance or perimeter.

Various techniques may be employed to define a particular authorizeddistance or perimeter. In one embodiment, the predefined distance orperimeter is determined by the owner of the anti-theft device 10, forexample, a retailer. Thus, the predefined distance or perimeter could becommunicated to the portable electronic device 15 (e.g., as a map). Inanother embodiment, the authorized distance or perimeter may be definedby the user of the portable electronic device 15, or by the portableelectronic device itself, such as by establishing one or morethresholds. For example, the user may move the portable electronicdevice 15 to define a particular perimeter or “virtual map”. The virtualmap could define an authorized distance or perimeter within which theportable electronic device 15 may be safely moved without triggering asecurity signal. Alternatively, the user could draw a particulardistance or perimeter using the portable electronic device 15 or anotherdevice and sync the desired perimeter to the portable electronic device.In another embodiment, the perimeter could be established usingphotographs of the environment and the photographs may then be stitchedtogether to define the perimeter. In another embodiment, various nodescould be used to establish a predefined distance, perimeter or otherthresholds. For example, the user could use the portable electronicdevice 15 or other device to select various nodes within a particulararea (e.g., a retail store) to define the perimeter. The nodes could beany suitable means to establish a location, such as NFC tags, RFID tags,or the like. Thus, the perimeter could be any desired shape defined by auser, wherein the shape could be later modified as needed.

In another embodiment, the anti-theft device 10 is configured togenerate a security signal based on a location of the portableelectronic device 15, such as when the device has been moved beyond anauthorized distance from the anti-theft device 10, or from anotherdevice, or from a predefined location, or outside an authorizedperimeter. In this embodiment, the authorized location may be “mobile”or “dynamic” in that the authorized location may change with respect tothe location of the portable electronic device 15. For example, anauthorized perimeter could be defined based on a layout in a particularretail department, in a particular wing of a hospital, in a particularsection of a restaurant, etc. In one embodiment, the authorized locationmay be defined by a pairing between a key 25A and the portableelectronic device 15, wherein such pairing may be similar to thatdescribed above. Thus, the authorized location may be dynamicallydefined based on the location of the portable electronic device 15 andneed not be limited to a particular fixed location.

In a further embodiment, the anti-theft device 10 includesanti-microbial material. For example, the anti-theft device 10 may becoated with or otherwise integrate anti-microbial material to reduce oreliminate bacteria or microorganisms. Such anti-microbial material couldbe beneficial in the medical or food service environments. In someembodiments, the material forming one or more components or portion ofthe anti-theft device 10 (e.g., alarming device, stand, dock 50, sensor24, shroud 20, handle 26, and/or key 25A or 25B) may includeanti-microbial material. The anti-microbial material may be coated on,attached to, or otherwise coupled to the anti-theft device 10, or theanti-microbial material could be integrated into the material formingthe particular component of the anti-theft device. In other embodiments,the component of the anti-theft device 10 may include a material that isanti-microbial. In one example, the anti-microbial material is a polymermaterial including one or more anti-microbial agents.

The foregoing has described one or more embodiments of an anti-theftdevice 10 for protecting a portable electronic device 10, for example, atablet, from theft or unauthorized removal. Those of ordinary skill inthe art will understand and appreciate that numerous variations andmodifications of the invention may be made without departing from thespirit and scope of the invention. Accordingly, all such variations andmodifications are intended to be encompassed by the appended

That which is claimed is:
 1. An anti-theft system for protecting aportable electronic device from theft or unauthorized removal,comprising: an interface configured to be attached to the portableelectronic device, the interface comprising a sensor configured todetect removal of the interface from the portable electronic device; adock configured to removably support the interface and the portableelectronic device thereon, the dock further configured to releasablyengage the interface such that the portable electronic device is lockedto the dock when engaged with the dock and such that the portableelectronic device cannot be removed from the dock, the dock isconfigured to disengage the interface such that the portable electronicdevice is unlocked from the dock and such that the portable electronicdevice is removable from the dock; an alarm configured to generate asecurity signal in response to removal of the interface from theportable electronic device or the dock without authorization; and awireless device, external to the interface and the dock, configured tocommunicate with the interface or the dock for locking the portableelectronic device to the dock or unlocking the portable electronicdevice from the dock.
 2. The anti-theft system of claim 1, furthercomprising a lock mechanism configured to engage the interface forlocking the portable electronic device on the dock and to disengage theinterface for unlocking the interface from the dock.
 3. The anti-theftsystem of claim 2, wherein the lock mechanism comprises one or moreengagement members configured to move relative to the dock for engagingor disengaging the interface.
 4. The anti-theft system of claim 2,wherein the lock mechanism further comprises a cam mechanism configuredto facilitate extension or retraction of the one or more engagementmembers.
 5. The anti-theft system of claim 4, wherein the cam mechanismis configured to rotate less than 360 degrees for causing the one ormore engagement members to extend or retract.
 6. The anti-theft systemof claim 2, wherein the lock mechanism further comprises a motorconfigured to facilitate extension or retraction of the one or moreengagement members.
 7. The anti-theft system of claim 2, wherein thelock mechanism is an electro-mechanical lock mechanism.
 8. Theanti-theft system of claim 2, wherein the lock mechanism is configuredto hold the portable electronic device to the dock using a magneticforce.
 9. The anti-theft system of claim 1, wherein the wireless deviceis configured to communicate with the interface or the dock for lockingthe portable electronic device to the dock.
 10. The anti-theft system ofclaim 1, wherein the wireless device is configured to communicate withthe interface or the dock using radio frequency or infraredcommunications.
 11. The anti-theft system of claim 1, wherein thewireless device is configured to communicate with the interface or thedock using Wi-Fi, Bluetooth, or cellular communication protocols. 12.The anti-theft system of claim 1, wherein the wireless device isconfigured to communicate with the interface or the dock for arming ordisarming the alarm.
 13. The anti-theft system of claim 1, wherein thewireless device is a key, fob, mobile device, remote device, or basestation.
 14. The anti-theft system of claim 1, wherein the wirelessdevice is a remote device.
 15. The anti-theft system of claim 1, whereinthe alarm resides in the interface.
 16. The anti-theft system of claim1, wherein the alarm resides in the dock.
 17. The anti-theft system ofclaim 1, further comprising a tether connecting the interface to thedock.
 18. The anti-theft system of claim 1, wherein the interface isconfigured to communicate a notification signal to the wireless devicein response to a security event.
 19. The anti-theft system of claim 1,wherein the interface is configured to communicate a security signal tothe wireless device for triggering an alarm.
 20. The anti-theft systemof claim 1, wherein the interface comprises a plurality of bracket armsconfigured to engage opposing sides of the portable electronic device.21. The anti-theft system of claim 1, wherein the dock comprisesmonitoring electronics for detecting removal of dock from a supportsurface or removal of the portable electronic device from the dockwithout authorization.
 22. The anti-theft system of claim 1, wherein thedock is configured to electrically communicate with the interface in aplurality of display orientations.
 23. The anti-theft system of claim 1,wherein each of the interface and the dock comprises a plurality ofelectrical contacts, and wherein the plurality of electrical contacts ofthe dock are configured to electrically connect to the plurality ofelectrical contacts of the interface when the interface is in engagementwith the dock to establish electrical communication therebetween. 24.The anti-theft system of claim 1, wherein the alarm is configured togenerate an audible and/or a visible alarm signal in response to theinterface being separated from the dock without authorization.
 25. Theanti-theft system of claim 1, wherein the interface is configured toextend about opposite ends and opposite sides of the portable electronicdevice.
 26. The anti-theft system of claim 1, wherein the interface atleast partially encloses the portable electronic device.
 27. Theanti-theft system of claim 1, wherein the interface and the portableelectronic device are configured to rotate relative to the dock whenengaged therewith.
 28. The anti-theft system of claim 1, wherein thedock is configured to transfer power to the portable electronic devicewhile the portable electronic device is positioned on the dock.
 29. Theanti-theft system of claim 1, wherein the interface comprises aconnector for engaging a power and/or data input port of the portableelectronic device for establishing an electrical connection between theportable electronic device and the dock.
 30. The anti-theft system ofclaim 1, further comprising a key, independent of the wireless device,configured to disarm the alarm.
 31. The anti-theft system of claim 30,wherein the key is configured to communicate with the interface or thedock for locking the interface to the dock or unlocking the interfacefrom the dock.
 32. A method for protecting a portable electronic devicefrom theft or unauthorized removal, comprising: attaching an interfaceto a portable electronic device, the interface comprising a sensorconfigured to detect removal of the interface from the portableelectronic device; positioning the interface on the dock; releasablyengaging the interface with a dock such that the interface and theportable electronic device are locked to the dock when engaged with thedock and such that the portable electronic device cannot be removed fromthe dock; and disengaging the interface from the dock such that theportable electronic device is unlocked from the dock and such that theportable electronic device is removable from the dock, wherein the stepof releasably engaging the interface or the step of disengaging theinterface comprises wirelessly communicating with a wireless device,external to the interface and the dock, for locking the portableelectronic device to the dock or unlocking the portable electronicdevice from the dock.
 33. An anti-theft system for protecting a portableelectronic device from theft or unauthorized removal, comprising: aninterface configured to be attached to the portable electronic device,the interface comprising a sensor configured to detect removal of theinterface from the portable electronic device; a dock configured toremovably support the interface and the portable electronic devicethereon such that an electrical connection is established between theinterface and the dock, the dock further configured to releasably engagethe interface such that the portable electronic device is locked to thedock when engaged with the dock and such that the portable electronicdevice cannot be removed from the dock, the dock configured to disengagethe interface such that the portable electronic device is unlocked fromthe dock and such that the portable electronic device is removable fromthe dock; a tether connecting the interface to the dock; an alarmconfigured to generate a security signal in response to removal of theinterface from the portable electronic device or the dock withoutauthorization; and a wireless device, external to the interface and thedock, configured to communicate with the interface or the dock forlocking the portable electronic device to the dock or unlocking theportable electronic device from the dock.