Theft deterrent device and method of use

ABSTRACT

A portable theft deterrent device is disclosed. The theft deterrent device comprises a lock detection mechanism. The lock detection mechanism includes a plurality of connectors. The lock detection mechanism includes a first active circuit therein coupled to the plurality of connectors. When the lock detection mechanism is coupled to an electrical path via at least one connector of the plurality of connectors and if the first active circuit detects an interruption in electrical flow in the electrical path, the lock detection mechanism provides an alert. The theft deterrent device includes a monitoring key member. The monitoring key member includes a second active circuit therein that allows for wireless communication with the lock detection mechanism when detached therefrom. The monitoring key member is configured to receive the alert remotely.

CROSS-REFERENCE TO RELATED APPLICATION

Under 35 U.S.C. 120, this application is a Continuation Application andclaims priority to U.S. application Ser. No. 14/555,497, filed Nov. 26,2014, entitled “THEFT DETERRENT DEVICE AND METHOD OF USE,” which claimspriority to U.S. Provisional Patent Application No. 62/032,499 byco-inventors Shahriar Ilislamloo and Andisheh Sarabi, filed on Aug. 1,2014, entitled “Method and Apparatus for Protecting a Portable Device”,all of which are incorporated herein by reference in their entireties.This application is related to U.S. patent application Ser. No. ______(Docket No. 5469P-2), filed on Nov. 26, 2014, entitled “THEFT DETERRENTDEVICE AND METHOD OF USE”, and U.S. patent application Ser. No. ______(Docket No. 5469C-2), filed on Dec. 17, 2015, entitled “THEFT DETERRENTDEVICE AND METHOD OF USE”, all of which are incorporated herein byreference in their entireties.

FIELD OF THE INVENTION

The present invention relates generally to protecting a device againsttampering or theft and more particularly to theft deterrence forprotecting a device against tampering or theft.

BACKGROUND OF THE INVENTION

Theft deterrent devices have become increasingly popular for protectingdevices from intrusion. In large part, this is due to the variety andwide scope of applications offered for use by portable devices inaddition to smaller form factors. Costly portable devices, such aselectronics, are particularly vulnerable because they are transportableyet they often carry store users' private and sensitive information thatif fallen into the wrong hands can have devastating effects, such asidentity theft. On the other hand, the convenient portability of devicesundesirably contributes to the ease of unwarranted intrusion, theft, orintentional and unintentional tampering. Anti-tampering oranti-deterrent techniques are therefore required.

Currently, theft and/or tampering-deterrent devices do not serve theirpurpose well. They tend to be ineffective in that they can be easilybypassed, inflexible in that their use is limited, and unreliable. Theyoften fail to alert users of tampering and/or theft because simplystated, they lack adequate capability. For example, by the time the useris alerted of the loss of its device, the portable device (or object)has long been taken or already damaged.

Security-enhancement devices are generally best suited for a particulartype of device and lack universal applicability in protecting differenttypes of portable devices. Security devices that offer a suitablemeasure of protection tend to be large in size, unreliable, and oftentoo inconvenient to be useful to the average individual.

Therefore, the need arises for a theft and tampering-deterrent device toprotect a user's portable device (or object) from damage, tampering,and/or theft.

SUMMARY OF THE INVENTION

A portable theft deterrent device is disclosed. The theft deterrentdevice comprises a lock detection mechanism. The lock detectionmechanism includes a plurality of connectors. The lock detectionmechanism includes a first active circuit therein coupled to theplurality of connectors. When the lock detection mechanism is coupled toan electrical path via at least one connector of the plurality ofconnectors and if the first active circuit detects an interruption inelectrical flow in the electrical path, the lock detection mechanismprovides an alert. The theft deterrent device includes a monitoring keymember. The monitoring key member includes a second active circuittherein that allows for wireless communication with the lock detectionmechanism when detached therefrom. The monitoring key member isconfigured to receive the alert remotely.

These and other objects and advantages of a system and method inaccordance with the present invention will become apparent to thoseskilled in the art after having read the following detailed descriptionof the various embodiments illustrated in the several figures of thedrawing.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an anti-theft/tampering device 10, in accordance with anembodiment.

FIG. 2 shows further details of the device 10 with the key 14 showndetached from the lock 12.

FIG. 3 shows one of numerous applications of the device 10, inaccordance with a method and embodiment.

FIG. 4 shows, in conceptual form, a high-level block diagram of relevantportions of the internal structures of the lock 12 and key 14, inaccordance with an embodiment.

FIGS. 5 and 6 show a flow chart of some of the relevant steps performedby the lock and key for handshaking.

FIGS. 7, 8 a, 8 b, 9, 11 a, 11 b, 12 a and 12 b show variousapplications of the device 10, in accordance with methods andembodiments.

FIG. 10a shows a cross sectional side view of the inside of the lock 12essentially without a detection feature.

FIG. 10b shows a cross sectional side view of the inside of the lock 12with a tampering detection feature. FIG. 10c shows an isolated view ofthe detection feature.

FIG. 13-15 show flow charts of some of the relevant operational stepsperformed by the lock and key.

FIG. 16 shows exemplary screenshots on a mobile device of variousparameters and status reported by the device 10.

DETAILED DESCRIPTION

The present invention relates generally to protecting a user objectagainst tampering or theft and more particularly to protecting aportable user object against tampering or theft. A portable user objectin one embodiment could comprise an electronic device such as laptop,smart phone, digital camera, hand held television, recorder, tablet,phablet or the like. In another embodiment the portable user objectcould comprise any object with an opening such as luggage, briefcase andthe like. In the following description of the embodiments, reference ismade to the accompanying drawings that form a part hereof, and in whichis shown by way of illustration of the specific embodiments in which theinvention may be practiced. It is to be understood that otherembodiments may be utilized because structural changes may be madewithout departing from the scope of the present invention. It should benoted that the figures discussed herein are not drawn to scale andthicknesses of lines are not indicative of actual sizes.

A deterrent device, shown, discussed and contemplated using the variousillustrative embodiments of the invention, can be classified by thefollowing: the manner in which such a device is anchored; the type ofobject such a device protects; the type of connections between such adevice and the object and the method of alerting a user of such a deviceof undesirable intrusion, such as theft tampering or theft attempts.

Various embodiments are generally made of two distinct physical parts,an activity-deterrent notification lock and a user monitor key that whenphysically and communicatively coupled together, effectively protect ahost of portable devices (or objects) using an anchoring technique.

The deterrent devices of the various embodiments protect a user'sportable device against tampering or theft by use of a deterrentnotification lock and in some embodiments, a user monitoring key. Thedeterrent notification lock can operate work as a standalone unit or inconjunction with the user monitoring key, which notifies the user of thestatus of the device being protected. The deterrent notification lock iseither directly or virtually secured to the device being protected. Thislock is also separately or in conjunction with securing the device,anchored to a relatively unmovable object to anchor the device beingprotected to a relatively unmovable object. The anchoring can beperformed virtually, in some embodiments.

Once the deterrent lock is anchored and the device being protected issecured by the deterrent notification lock, the user is notifiedgenerally of the change-in-location (or lack thereof) or thechange-in-status of the device via the user monitoring key and/orlocally by its own alert system. Further, the user can be alerted in theevent of the strength of the communication signal between lock and keybecoming degraded. The degradation can occur due to distance between thelock and the key or low battery/power or any other interference such asnoise. The unintentional leaving of the device behind will trigger thenotification due to the increase in the distance between the lock andthe key. The user can also be notified of any tampering of the devicebeing protected. In the case where the deterrent lock is anchored andthe device being protected is secured through the deterrent notificationlock without the use of the user monitoring key, the tampering anddeterrence are still reported locally.

A user can further be notified of tampering and attempted theft througha remote connection, such as through the Internet.

In some embodiments, the deterrent notification lock operates as astandalone unit, without the user monitoring key. In such embodiments,the user is alerted of tampering attempts by a sound, such as a beep,horn or the like when in local vicinity of the device but at the priceof lowered security relative to the above scenario. In otherembodiments, any malfunction of the lock, either through failure oroutside tampering, is detected by the user monitoring key while in thecase presented above, the user monitoring key cannot necessarily detectfailure or tampering.

In some embodiments, instead of a dedicated device, such as the usermonitoring key, a general-purpose device may be employed to monitor thedevice being protected, such as a mobile or smart phone. In this case,the phone communicates using standard wireless/wired communicationmeans, such as Bluetooth or a cable connection.

Portable devices that are electrically-powered (active devices), such aswithout limitation, computers and phones, in addition to non-powereddevices (passive devices), such as without limitation, luggage andbriefcases, are effectively, reliably, and flexibly secured using theanchoring technique of the various methods and embodiments.

Alternatively, a number of portable devices that are physically and/orelectrically connected to each other are secured.

Use of the deterrent device, in certain configurations and inconjunction with other devices, expands beyond the scope of security andprotection measures. As an example, electrically-powered devices, suchas but not limited to, smart phones are not only protected but can alsobe charged using the deterrent device, according to various embodimentsand associated methods.

Furthermore, in an illustrated embodiment, shown and discussed below,the user monitoring key securely communicates and remotely interfaceswith the lock. The user monitoring key can remotely interact with theuser through a network. The network could be either a public or privatesuch as the worldwide web. For example, an alarm, an indicator or anyother suitable means of alerting can be used by the key and the lock toinform those in close proximity and alert a remotely-located user of anundesirable activity.

In accordance with methods and apparatus of various embodiments, toprevent tampering, the user is notified of disturbance to the objectbeing protected, i.e. the protected device. The same holds true fordisturbance to the site in which the object is being remotely protected.

In alternate embodiments, rather than protection and security, certainenvironmental parameters may be monitored by the deterrent device,parameters such as temperature, humidity, fire or other types offactors-of-interest that are appropriate for tracking and monitoring.Results of such monitoring can be reported to an externally situateddevice, such as a smart phone, computer, or any other remotely orlocally-situated monitor.

Other exemplary applications of the deterrent device are protection ofperipheral devices such as mouse or keypad of a corresponding laptop orthe laptop itself, whether by (cable) wire or wirelessly. Undesiredchanges to protected devices, such as tampering by un-plugging the mouseor keyboard or typing on the keyboard or attaching a new peripheraldevice or the movement of the mouse, is detected through wire orwireless transmission and can be reported accordingly.

Out-of-range detection is yet another application of embodiments of thedeterrent device. Out-of-range detection is done by loss ofcommunication or reduction of signal strength below a tolerable levelbetween the key and the lock, or malfunctioning of either one.Alternatively, a threshold may be programmably (or statically) set belowwhich communication between the lock and the key is consideredeffectively lost. The inability of the key and the lock to properlycommunicate with each other is typically reported to the user by thekey, and in some embodiments, by the lock. The inability of the key andthe lock to properly communicate with each other can be due to lowsignal strength or battery outage or the distance between the lock andthe key or some noise interference or a combination of the above. Sincethe tampering with anchoring and securing are detected by monitoring theelectrical flow in the corresponding electrical paths, any power outagein these paths will b e treated as a failure. In a securing electricalpath, in the case of the device being protected having low batteryvoltage or out of power, this condition will be treated as tamperingwith the securing electrical path and it will be notified remotely andlocally. In an anchoring electrical path, in the case of the lock havinglow battery voltage or being out of power, this condition will similarlybe treated as tampering with the anchoring electrical path. However, theuser monitor key will be alerted due to reporting of low battery voltageor the interruption of periodical communication signals between the lockand the key due to power outage in the lock.

In some embodiments, the relative distance between the lock and the keyis monitored. As the distance grows, the user is notified.

The deterrent device is an effective technique for non-hostilesituations as well. By way of an example, where the user has securedhis/her laptop and for some reason, leaves the location of the laptopbut forgets to take the laptop, the key can be used to alert the userupon the user going beyond the range tolerated by the communicationcapabilities of the lock and the key. The user is therefore given achance to go back and pick up the laptop before getting too far awayfrom it.

It should be noted that the examples provided herein, such as thoseabove, are merely some of many others and needless to say too numerousto list. To describe the features of systems and methods in accordancewith the present invention in more detail refer now to the followingdescription in conjunction with the accompanying Figures. Referring nowto FIG. 1, deterrent device 10 is shown in accordance with anembodiment. Device 10 is shown to include two parts, a (user) monitoringkey 14 and deterrent notification lock 12. The lock 12 is shown toinclude a tampering-resistant opening 18, a lock-to-device connector 16,an indicator 23, and a communication pad 22. In one embodiment, the key14 is physically attached to the lock 12 through a lock-to-keyconnection 20.

It is understood that while the device 10 is shown in the figures ofthis patent document to have generally a rectangular shape, othersuitable shapes are contemplated. In an embodiment, the device 10 ismade generally of plastic but can be made of any other suitablematerial.

Lock communication pad 22 and indicator 23 are shown situated on a topsurface of the lock 12; however, other suitable areas of the lock 12 maybe used to house the indicator 23 and pad 22. The housing can alsoinclude a LCD or other displays of communication with the user or otherinput devices such as a touchpad. A tampering-resistant opening 18 isshown to extend from a longest side of the lock 12 through the interiorof the lock through to an opposite side thereof. Again, other suitablelocations for the opening 18 are contemplated.

A security-bound connector 16 is shown protruding from a side of thelock 12 for establishing physical connection 20 with cable and/or adevice, such as a phone charger. While shown to appear as a spacebetween the lock 12 and the key 14, the connection 20 is nearlynon-existent, with the side of each of the lock and the key facing eachother are flush against one another. As shown in subsequent figures,each of the lock 12 and key 14 have a connector protruding therefromthat are used to physically connect one to the other and situated at alocation within the connection 20.

During operation of the device 10, when the lock 12 and the key 14 areconnected 20, the lock 12 electrically synchronizes with the key 14.Synchronization may include handshaking between the lock and the key andis further described below relative to flow chart figures.

Upon completion of synchronization, the lock 12 and the key 14 can beginto effectively communicate with one another even when they are notphysically coupled. Upon completion of the lock-key synchronization, thekey 14 may be physically re-located away from the lock 12 up todistances that are within the signal-range of the device 10. Upon thedetection of an intrusion of the protected device by the lock 12, thelock 12 reports the intrusion to the key 14 and the key 14 alerts theuser. Anchoring serves to physically fix the lock 12, within theconfines of an anchoring cable, to a non-readily movable object, variousexamples of which are provided below and shown in subsequent figures.

Alternatively, the lock 12 may be a stand-alone device, not accompaniedby the key 14. In this embodiment, the lock 12 is physically connectedto the portable device being protected, through its connector andconnected, via another connector, to a connector of a laptop, and usedto locally alert a user. That is, upon unauthorized disconnection of thelock 12 from the device being protected, the lock 12 announces thedisconnection, via a sound alarm or other desirable reporting means.

FIG. 2 shows further details of the device 10, in accordance with anembodiment. In FIG. 2, the key 14 and the lock 12 are shown physicallydetached from one another. The lock 12 is shown to include ananchor-bound connector 26, in addition to the lock indicator 23. The key14 is shown to have a key connector 28, a key communication pad 30 and akey indicator 32. When physically coupled, connectors 26 and 28 form theconnection 20 (shown in FIG. 1.)

Through the key communication pad 30, the user communicates with the keyand effectively controls its operation. For example, operations can beinitiated by the user by use of the key communication pad 30. In anembodiment, the lock 12 receives start-of-operation and end-of-operationcommands from the key 14. These commands cause, for example, the startof deterring tampering and later the ending of deterring tampering ofthe electronic device. In another embodiment the key communication padmay have more than one key or implemented by a touchpad or LCD.

The lock communication pad 22 is generally utilized by the user tocommunicate initiation of operations or relaying of various attributes.A contemplated use of the communication pad 22 is for password-protectedoperations. When the user enters a password via the communication pad22, signaling the beginning of a particular operation, the lock istriggered to start a particular operation. As discussed above, the keycommunication pad 30 is utilized in a similar manner by the user. Otherapplications of the communication pad 22 are contemplated according todesign choices by a designer of the device 10.

In accordance with various embodiments, the communication pad 22 may berealized through a push-button, touchpad, a keypad, or other mechanismsthat assist the user in notifying the device 10 of various information,such as parameters and passwords. An illustrative embodiment of thecommunication pad 22, in the form of a keypad, is shown in FIGS. 1 and 2and those to follow.

In an embodiment, key indicator 32 is implemented in the form of a lightand flashes or lights up with one or more distinct colors to indicatethe presence of pre-determined information or in response to an alert oran alarm, as detected by the lock 12.

The opening 18 is essentially a hole or void extending through the twolonger sides of the device 12 although, as earlier noted, in otherembodiments, the opening 18 may extend through the shorter two sides ofthe device 12. Alternatively, the opening 18 may protrude externallyfrom a side of the lock 12. Yet alternatively, the opening may be theshape of a square or rectangle and extend vertically between the top andbottom surfaces of the device 10 and horizontally between the two sidesof the device with a minimum size of the opening 18 being desirablylarge enough to allow a connecting cable to pass through it yet smallenough to prevent the object being protected to pass therethrough.

The connectors 26 and 28 can physically mate through means other thanthose shown or described herein, based on, for example, design choices.Without loss of generality, in an embodiment, the connectors 26 and 28are Universal Serial Bus (USB) connectors. The number of connectors andtheir types can be customized toward a particular application such ashaving a RS232 family or circular phone connectors family or differenttype of USB Adaptors.

In some embodiments, the lock 12 has a connector on either side, asshown in FIG. 1, one of which—connector 16—allows the lock to monitor orprotect a portable device/object. However, the lock 12 is hardly limitedto protecting only one device and can rather, with the use of more thanone connector on one side, reliably protect/monitor more than one deviceor anchored by more than one object.

FIG. 3 shows one of numerous applications of the device 10, inaccordance with a method and embodiment. In this particular example, alaptop 36, mouse 38, and/or keyboard 40 are devices under protection.

The lock 12 is shown anchored, through connectors 26 and 27, to anexample of an anchoring object, i.e. the chair 42, thereby securing thethree portable devices, the mouse 38, the laptop 36, and the keyboard40. More specifically, the keyboard 40 and the mouse 38 are shownconnected to the laptop 36 and the laptop 36 is shown connected to thelock 12 through the connector 16. By virtue of their connection to thelaptop 36, the keyboard 40 and the mouse 38 are monitored/protected bythe lock 12 because the laptop 36 can communicate with the lock 12 andreport thereto, the presence or absence of the three devices to the lock12. It is noted that an effective anchoring object is one that is notreadily removed or picked up. In fact, the more securely an anchoringobject is secured, such as to the floor or ground, the increasedeffectiveness of the device 10 in protecting a portable object.

In FIG. 3, the chair 42 is used as an anchoring object, as it is in afixed or stationary position (affixed to the floor) and cannot be easilymoved. The laptop 36, mouse 38 and/or keyboard 40, on the other hand,are portable therefore requiring protection. The security of thelaptop/mouse/keyboard is monitored by the device 10 and if the device 10detects an undesirable intrusion, the device 10 remotely reports thesame, through use of the lock 12, to the key 14.

The exemplary anchoring object of FIG. 3, i.e. chair 42, need not bepermanently or fully stationary and instead only need be a structurethat is not easily moveable. The anchoring object also has a shapeallowing for the passage of a physical cable through a part of it, suchas the opening 48, in FIG. 3. Obviously, the less portable an anchoringobject, the greater the effectiveness of protecting a device.

In FIG. 3, the lock 12 is shown physically anchored to the chair 42through an anchoring cable 46. The cable 46 is generally flexibleallowing it to loop through the area pointed to by the pointer 48, inFIG. 3. As shown in FIG. 3, the cable 46 connects at one of its ends toone of the connectors (connector 27) of the lock 12, then it is loopedthrough the opening 48 and then connected to another connector(connector 26) of the lock 12 therefore forming a physical loop from andto the lock 12 through the area pointed by pointer 48. Analogously, anelectrical loop also forms as a result of the physical loop.

That is, in the embodiment of FIG. 3, the lock 12 is shown to have twoconnectors, connectors 26 and 27. Connector 26 physically connects toone end of the cable 46 while an opposite end of the cable 46 physicallyconnects to the connector 27 with this physical connection forming anelectrical closed loop from and to the electrical circuitry within thelock 12. Namely, the flow of electrical current is continuous when theforegoing physical loop is formed and when the physical connection, i.e.the loop, is disrupted, the flow of current stops. It is throughmonitoring of this current flow in conjunction with the currentcontinuing to flow through the internal circuitry of the lock 12 and theelectrical path from cable 44 to the laptop 36, that the lock 12 detectstampering/intrusion. In another embodiment, the cable 44 can beeliminated by connecting the lock 12 directly to the laptop 36 viaconnector 16.

It is noteworthy to say that which end of the cable 46 connects withwhich connector of the connectors 26 and connector 27 is irrelevant. Infact, such as shown in the embodiment of FIG. 3, the lock 12 may havemore than two connectors, connectors 26 and 27, used for securing morethan one device, such as the combination of the laptop/mouse/keyboard.In other embodiments, the lock 12 employs connectors 26 and 27 to anchorto more than one anchoring object and not just the chair 42. Forinstance, two chairs can serve as anchoring objects. As a matter ofconvenience, the connectors 26 and 27 are shown to be the same type ofconnectors, in FIG. 3, but they need not be. It should, however, bepossible to physically mate the connectors 26 and 27 to either end ofthe cable 46.

In yet other embodiments, the laptop/mouse/keyboard of FIG. 3 aresecured in a cascaded manner. For example, the mouse 36 and the keyboard40 are secured by the laptop 36; a second laptop (not shown) may also besecured by the laptop 36 and securing its own set of keyboard and mouse(not shown).

Alternatively, the laptop can be monitored for any contact or typing.For example, if the laptop is being monitored and an unauthorizedindividual starts typing, for example, a password to try to gain accessto the laptop, the device 10 can detect the same and report it to theuser through the key. In an embodiment, the laptop 36 and the lock 12communicate through their respective connectors (or “ports”) and acable. Alternatively, the laptop 36 and the lock 12 communicate togetherwirelessly, i.e. Bluetooth, or any other suitable means.

In an alternative embodiment, detection of undesirable activity isperformed by execution of specialized software/firmware that isinstalled onto a laptop. In this instant example, any changes to theconnectors or the keyboard of the laptop 36 are detected by theexecution of the installed software on the laptop. The detectedintrusion information is then communicated to the lock 12, by thesoftware/firmware of the laptop 36 and then passed on to the key 14 bythe lock 12. The user accordingly, becomes aware of the tampering. Thistampering can be communicated to lock 12 via the securing cable 44 orwirelessly via Bluetooth and/or Wi-Fi or other wireless means.

In the manner described above and shown in FIG. 3, the lock 12 isphysically and electrically anchored to the chair 42. Physical anchoringis described above. Electrical anchoring is done by connecting the cable46, at one of its ends, to the connector 26 and pulling the cable 46through the area pointed to by the pointer 48 to connect to theconnector 27. In this manner, assuming the lock 12 is properlyoperating, the relevant part of the detection circuit (not shown in FIG.3) of the lock 12 is ‘closed’ because current flows through the cable46. It is noted that the cable 46 need not necessarily loop through thearea pointed to by the pointer 48 and rather merely requires some kindof structure through which it can physically loop coming out to connectback with the lock 12. One way to describe the loop is as follows. Ananchoring cable employed for forming the loop travels through a locationof the anchoring object that is essentially an opening or a poleextending between top and bottom surfaces such that the cable loop issmaller than the perimeter of the top and bottom surfaces to prevent theanchoring cable to travel passed the top and bottom surfaces. In thecase of the pole, the cable wraps around the pole and in the case of theopening, which is a part of the anchoring object, the cable passesthrough the opening. In both examples of the pole and the opening, thecable connects to the lock at one of its ends while at another one ofits ends, it also connects to the lock but through a connector that isdistinct from the connector used to connect the one end of the cable tothe lock. Alternatively, other configurations of the opening and cablefor forming a loop are discussed and shown below. It is noted that theanchoring strength of the anchoring object is generally based on thepermanency (ability to remain unmovable) of the anchoring object as wellas the sturdiness of the space (or “opening”) of the anchoring object.

Upon tampering or removal of the laptop 36, such as cutting of the cable44, this electrical path ‘opens’. An ‘open’ connection results in thedetection circuit of the lock 12 detecting the absence of current flow.To this end, the lock 12 senses an electrical disconnection of the paththat is formed by the cable 44 and remotely reports this disconnectionto the key 14. An exemplary reporting technique/mechanism may be settingoff of a sound alarm by the lock 12 thereby activating the indicator 23.Another example is the key setting off a sound alarm and activating theindicator 32. The key 14 may report tampering to the user by any othersuitable means, such as, without limitation, vibration.

The laptop 36 is not secured until the device protection via cable 44physically links the laptop 36, through the connector 16, to form anelectrical path between the lock 12 and the laptop 36, much like theanchoring object, in that current flows through the cable 44 and back tothe lock 12 where the lock's detection circuitry detects interruption ofcurrent flow. The cable 44 can be eliminated if connector 16 isconnected directly to laptop 36. The mouse 38 and/or keyboard 40 may besimilarly secured because tampering of the ports of the laptop 36 isdetected by the lock 12.

As earlier mentioned, any other device coupled to the connectors of thelaptop 36 can be protected. Further and as previously mentioned, thelock 12 can alert the key 14 of tampering/theft through wirelesscommunication. An example of wireless communication is in accordancewith protocol defined by the industry-recognized standard, Zigbee.

The key 14 and the lock 12 are each capable of communicating with a userpersonal device wirelessly or otherwise. For instance and withoutlimitation, a user personal device may communicate wirelessly with thekey and/or the lock, through Bluetooth, or through a computer to whichthe key or lock are physically or remotely coupled.

The electrical path is interrupted if any of the following occur in theexample of FIG. 3: 1) the connection of the cable 44 to the connector 16is removed; 2) the connection of the cable 44 to the laptop 34 isremoved; 3) the cable 44 is cut between laptop 34 and the connector 16;4) the connection of the cable 46 to either of the connectors 26 and 27is removed; or 5) the cable 46 is cut between the connectors 26 and 27.

In various embodiments, notification of an electrical path interruption,as well as tampering of the device being protected is stored in anElectrically Erasable Programmable Read-Only Memory (EEPROM), which isphysically located inside of the lock 12. In the event, the lock is outof power, the user has sufficient knowledge of all events that precededthe power outage when power is restored later.

The operation described herein regarding the embodiment of FIG. 2,except communication with the key 14, applies to the embodiment of FIG.3.

FIG. 4 shows in conceptual form, a high-level block diagram of relevantinternal portions of the lock 12 and key 14, in accordance with anembodiment. The lock 12 is shown to include lock communication pad 22,lock indicator 23, lock standard wired communication unit 53, lockkeypad control block 61, lock battery control block 65, key-bound wiredcommunication unit 51, lock processor 50, key-bound wirelesscommunication unit 52, opening tampering detection unit 69, lockalerting control unit 63, lock power control unit 62, lock sensor unit58, lock connector unit 56, lock standard wireless communication unit54, and connectors 16, 26 and 27. The lock processor 50 is shown toinclude a buffer 57 that is used by the processor 50 for storing data,discussed in further detail below.

An example of the unit 53 is a universal receiver/transmitter (UART/i2c)with others anticipated. An example of the unit 54 is Bluetooth or Wi-Fiwith others anticipated. More specifically, the unit 54 is used by thelock 12 to communicate, by using Bluetooth or Wi-Fi, with the devicebeing protected or a gateway to the Internet.

The key 14 is shown to optionally include the pad 30, the indicator 32,a key standard wired communication unit 83, a key standard wirelesscommunication unit 84, a key processor 80, a key keypad control unit 68,a key battery control block 85, a lock-bound wired communication unit81, a lock-bound wireless communication unit 82, key alerting controlunit 87, a key power control unit 89, key connector unit 86, and keyconnector 28. The key processor 80 is shown to include a key buffer 88,which is used by the processor 80 to store data, discussed in furtherdetail below.

The physical location of each of the structure/blocks shown in FIG. 4are not indicative of their actual physical positions. For example,connector 16, while it can be, need not be located on the same side ofthe device 12 as the connectors 26 and 27.

The lock processor 50 is shown coupled to the units 53, 54, 56, 58, 62,63, 69, 52, and 51, and serves as the master-mind for the lock 12. Theprocessor 50 instructs the structures to which it is coupled to takeactions, or not, and communicates information (or data) from onestructure to another and other relevant functions.

The unit 56 is shown coupled to the connectors 16, 26 and 27. Thedetection unit 69 houses the opening 18 as well as the opening-tamperingnotification device 67 that is shown wrapped around the outside of allof the sides of the opening 18. The cable 46 of FIG. 3 is poked throughthe opening 18 in certain applications that provide the user with addedconvenience, such as that shown by the embodiment of FIG. 9. As earlierstated, the opening 18 is optional.

Information from the user is received, through the communication pad 22,by the lock communication pad control unit 61 and ultimatelycommunicated to the processor 50. The lock battery control block 65 andpower control unit 62 provide power to the electrical circuits of thelock 12. Lock alerting control unit 63 determines when to alert theuser. An alert to the user may be in the form of a sound alarm or avisual alarm, such as a LED/LCD. In applications that require it, thecontrol unit 62 determines when to start and when to stop charging anelectronic device. It also provides power to the key 14 throughconnection 20.

The unit 54 enables the lock 12 to wirelessly communicate with anexternal device, such as a laptop. The block 51 processes communicationthat is transmitted or received through a physical connection with key14 as opposed to wirelessly, whereas, the unit 52 does the same throughwireless communication.

The unit 56 receives input from the outside through the connectors 16,26, and 27 and passes on the received input to the processor 50 forprocessing. It also provides communication back to the outside from theprocessor 50.

In FIG. 4, the key 14 is shown to include structures analogous to thoseof the lock. The processor 80, analogous to processor 50, is themaster-mind for the key 14. FIGS. 5 and 6 show flow charts of some ofthe relevant steps performed by the lock and key during handshaking.FIG. 5 shows the flow chart 100 of the relevant steps performed by thelock 12 and key 14 during handshaking, in accordance with an embodiment.

At step 102, handshaking begins and physical authentication between thekey 14 and lock 12 starts at step 104. Physical authentication isverification of the key 14 to be the expected mating device, in additionto the generation of a wireless communication encryption key as well asa password generation, all of which are employed for activation of thecurrent session. The password and wireless communication encryption keyare collectively herein referred to as “credential data”. A new‘session’ begins each time the key and the lock are physically connectedto each other for the purpose of the activation of an event. In anembodiment, each time a new session starts, a new password andencryption key are generated. Alternatively, a new session need nottrigger the generation of a new password and encryption key, rather, thefrequency of such generation can be a design choice. However, it shouldbe appreciated that this frequency may affect the strength of thesecurity associated with the device 10.

It is noted that as part of the security offered by the device 10, thewireless communication encryption key and the password, generated duringhandshaking, are generated on-the-fly using a random number generatorand not predetermined.

Referring still to FIG. 5, in the above-noted manner, the lock 12authenticates the key 14. At 106, a determination is made of whether ornot physical authentication passes and if so, the process moves onto thestep 110, whereas, if it fails (the key or lock are not as expected),the process moves onto the step 108 at which time the user of the device10 is notified of the failure.

At step 110, wireless electronic authentication is initiated between thekey 14 and lock 12. That is, upon the key 14 being physicallydisconnected from the lock 12, it is carried to a place remote from thelock 12 and electronic authentication, using wireless transmission, isconducted by them (at step 110). Electronic authentication is determinedto pass or not at step 112 and if it fails, the user is notified at step108, otherwise, the process continues to step 114 where the key 14 andthe lock 12 are activated in that they can fully perform, eitherindividually or collectively, the functions intended for them toperform. In FIG. 5, the solid lines indicate steps performed solely bythe lock 12 whereas the dashed lines indicate steps performed by boththe key 14 and the lock 12. In both cases, the steps are generallyperformed by a processor with other circuitry located internally to eachof the lock and key, which are shown and discussed relative tosubsequent figures.

The flow chart 120 of FIG. 6 shows further details of the activation andhandshake steps of FIG. 5. In FIG. 6, the dashed lines indicatecorresponding steps/decisions performed by the key 14 and the solidlines indicate corresponding steps/decisions performed by the lock 12.For example, the step 122 and all of the steps/decisions shownthereafter on the left side of the page, i.e. 140, 142, 144, 146, 148,and 150 are performed by the key 14 and the remaining steps/decisionsshown in FIG. 6, are performed by the lock 12.

Starting at 122, physical communication credentials exchange andwireless validation between the key and the lock starts as follows.

The key 14 performs the step 140, which is to provide its credentials tothe lock 12 via its standard wired connection. Credentials may be savedin a credential—buffer, which is a memory location in the key processor80, such as the buffer 88, for saving the credential data. Credentialdata include a signature identifying the key that is physicallyconnected to the lock and used for authentication by the lock. Examplesof other credential data are an encryption key that makes the wirelesscommunication between the key and the lock secure and a termination keythat ensures the correct termination command is being used. This step isperformed when the lock 12 and the key 14 are physically connected 20,such as shown in FIG. 1.

Next, at step 142, the key 14 awaits receipt of an activation commandfrom the lock 12 and at 144, a determination is made by the key 14 as towhether or not the awaited activation command is received and if so, theprocess continues to step 146, otherwise, the process goes back to andcontinues from step 142. Upon receipt of the activation command, at step146, radio-frequency (RF) communication starts between the lock 12 andkey 14 using the wireless communication encryption key of the credentialdata that has been transferred from the lock 12 to the key 14 in step140. As previously noted, the generation of a unique wirelesscommunication encryption key for the activation of a session increasesthe level of security of the wireless communication between the key 14and the lock 12.

Next, at step 148, the key 14 sends a handshake message to the lock 12through RF transmission. Upon sending the handshake message, the key 14awaits an acknowledgment of its handshake message from the lock 12, at150. Once acknowledgment is received by the key, the handshake andactivation process is completed.

At step 124, performed by the lock 12, a pseudo-random number isgenerated as the wireless communication encryption key and anotherrandom number is generated as the password, the credential data,employed for the particular activation session that is currentlyunderway. RF communication is initiated by the lock 12 at step 126 usingthe generated encryption key. The credentials data are then transmittedto the key through wired (physical) connection at step 128.

Next, at 130, the lock 12 determines whether or not the transmission ofstep 128 is successful and if so, the lock 12 executes step 132,otherwise, it executes step 128 until the credential data transfer issuccessful.

At step 132, an activation command is sent to the key 14 to activate thekey and at 134, receipt of the handshake message from the key isawaited. This is the handshake message of step 148. Upon receipt of thehandshake message from the key 14, at step 136, the lock 12 sends anacknowledgment to the key 14. This is the acknowledgment the key awaitsat 150.

In the case where the lock 12 operates as a stand-alone unit, withoutthe key 14, activation is initiated either by setting up a new passwordfor the session via the keypad 22 or using the current password. Theuser can use the keypad 22 to provide the necessary commands to operatethe device including of a command indicating the stand alone mode beingemployed.

In some embodiments, operation of the user monitor key can be performedby the lock 12 communicating wirelessly with portable device, such as asmart device. In an alternative configuration, communication can beconsummated through a cable connection.

FIGS. 7-9 and 11-12 show various exemplary applications of the device 10in accordance with methods and embodiments.

In FIG. 7, the application 160 is securing the luggage 162. In thisexample, the chair 42 is used as the anchor mechanism, as it is hard tomove. At airports, for instance, benches are permanently affixed to thefloor and cannot be readily removed. In this sense, they serve as goodcandidates for anchoring. The key 14 is remotely located relative to thelock 12 and communicates with the lock 12 wirelessly.

The cable 44 is connected at one end to one of the connectors, i.e. theconnector 26, of lock 12 and connected, at an opposite end to anotherconnector, i.e. the connector 16, of the lock 12. From the connector 26to the connector 16, it travels through the space of the headrest of thechair 42 to and through the carrying apparatus of the luggage 162.Alternatively, the cable can be made to go through the handle of theluggage. In this manner, the cable 44 causes a closed electrical loopfrom the connector 26 to the connector 16 thereby allowing current toflow therethrough. Current further flows through the lock 12. Once thiselectrical path is established, it is monitored and if detected by thefirst active circuit in the lock 12 to be interrupted, the lock 12alerts the key 14 of the same.

The electrical loop is interrupted if any of the following occur in theexample of FIG. 7: 1) the connection of the cable 44 to the connector 26is removed; 2) the connection of the cable 44 to the connector 16 isremoved; 3) the cable 44 is cut between the connectors 16 and 26; or 4)the lock 12 is cut in a manner that cuts the opening-tamperingnotification device 67, shown in FIG. 4.

An undesirable removal of the luggage 162 would have to involvedisconnecting the cable 44 from the connector 16 or in any other mannerdisconnecting the cable 44 or breaking the physical loop the cable 44forms through the chair 42 and the lock 12. Accordingly, the mechanismof FIG. 7 acts as a deterrent against malfeasance of the luggage 162 andin this manner protects the luggage. In the event of a malfeasance, theuser is immediately alerted and can act quickly to save the luggage.

Upon detecting tampering, the lock 12 signals the key 14, which alertsthe user. An embodiment of an alert is a flashing light indicator 32. Aspreviously noted, numerous other types of indication are contemplatedand too many to list here.

In the case of a standalone lock 12, without key 14, the same can beperformed but excluding communication with the key 14.

FIG. 8a shows an exemplary application of the device 10 where the lock12 secures the device being protected, i.e. the laptop 36, wirelessly(or “virtually”). In this manner, the cable 44 need not go through anypart of the laptop as it did in the application of FIG. 3 where thelaptop 36 was connected through cable 44 to lock 12. The chair 42 servesas an anchor and the connection of the cable 44 relative to the lock 12is analogous to that of FIG. 7 except that the cable 44 goes through thehead-rest of the chair 42 and not any part of a luggage. In theembodiment of FIG. 8 a, the range of signal matters in that the physicaldistance between the laptop 36 and lock 12 needs to be within thewireless capability of the lock 12 outside of which the lock 12 fails toproperly communicate with the laptop 36. In fact, it is this veryfeature that protects the laptop 36 against tampering or theft. That is,if the laptop is physically taken outside of the range of properwireless communication between the lock 12 and the laptop 36, the lock12 treats this lack of communication with the laptop 36 as anundesirable event and wirelessly alerts the key 14, accordingly. In anembodiment, the lock 12 not only alerts the key of the undesirableevent, it also sets off some kind of an alarm for local notification.

FIG. 8a shows an example of the protection of an active device, i.e.laptop 36, whereas FIG. 7 shows an example of the protection of apassive device, i.e. luggage 162.

Further shown in FIG. 8a are relevant structures within the lock 12 thattake part in the application of lock 12 shown in FIG. 8 a. Thesestructures are emphasized, in FIG. 8 a, by showing the contents of theblocks introduced in FIG. 4, whereas, non-active structures are shown asblank shapes.

In the case of standalone operation of lock 12 without key 14, the sameoperation is valid as above with the exception of the communication withkey 14.

FIG. 8b shows an exemplary application of the device 10 where the lock12 is anchored virtually. In this manner, the sensor unit 58, which maybe one or more of an accelerometer, motion detector sensor or any othersensor suitable for sensing a desirable metric, detects movement of thelock 12 relative to the lock 12's original position. In this manner, thesensor unit 58 serves as a virtual anchor for the lock 12.Alternatively, in the case of employing a motion detector sensor, aglobal positioning system (GPS) may be employed. Still alternatively,instead of sensing motion, the sensor unit 58 may sense an environmentalfactor, such as without limitation, temperature, moisture, and pressure.

Further shown in FIG. 8b are relevant structures within the lock 12 thattake part in the application of lock 12 shown in this figure. Thesestructures are emphasized, in FIG. 8 b, by showing the contents of theblocks introduced in FIG. 4, whereas, non-active structures are shown asblank shapes. In the case where the lock 12 is employed in standalonemode, without use of the key 14, the foregoing discussion applies withthe exception of communicating with the key 14.

In FIG. 9, yet another exemplary application of the device 10 is shownwith some of the relevant structures of the lock 12 and the key 14 thatare active in this example, highlighted in the same fashion as thehighlights of FIGS. 8a and 8b discussed above.

In the example of FIG. 9, the laptop 36 is shown to be physicallyconnected, through cable 44, to the connector 16 of the lock 12 in amanner as follows. The chair 42 is used as an anchor and the cable 44 isconnected at one end to the laptop 36 and at another end, threadedthrough the opening 18. Once the cable 44 is threaded through theopening 18, it travels through a portion of the backrest of the chair42, shown at 48 and thereafter connects with the connector 16 of thelock 12. As shown in FIG. 9, the lock 12 and key 14 communicatewirelessly, as shown and discussed relative to prior figures. As is thecase with most, if not all, of the embodiments shown in the variousfigures of this patent document, the lock 12 can operate as a standaloneunit, in the application of FIG. 9.

Use of the opening 18 frees up the connector 26 in the application ofFIG. 9 because the cable 44 connects to the lock through only one of thelock's connectors, i.e. the connector 16, leaving connector 26 of thelock 12 and any other external connector that may be used, available. Inthis manner, the opening 18 allows for anchoring and securing to be donewith only one cable. Whereas, in the application of the device 10, inFIG. 9, the opening 18 is a part of anchoring, in FIG. 3, it is notutilized at all. Therefore, the application of FIG. 3 requires twoconnectors, such as connectors 26 and 27, whereas the application ofFIG. 9 only requires one connector, such as connector 16.

Undesirable events, such as those discussed relative to previousfigures, are detected by the lock 12, in large part, due to the presenceof the electrical path that starts from the laptop 36 and goes to theconnector 16. Detection is triggered in first active circuit either bythe tampering with the opening 18 and/or the cable 44. Tampering withthe opening 18 is detected through configuration described in FIG. 10.Tampering with the cable 44 entails disconnection from either connection16 or laptop 36 or cutting the cable 44.

Similar to FIG. 7, cable 44 can be made to go through the handle of theluggage 162 and secure both active device 36 and passive object 162.

In FIG. 9, relevant structures employed for this application are shownin the drawing of the lock 12 as well as that of the key 14. FIG. 10ashows an internal cross section side view of the lock 12 essentiallywithout a tampering detection feature for opening 18. FIG. 10b shows aninternal cross section side view of the lock 12 with a tamperingdetection feature.

In both FIGS. 10a and 10 b, the lock 12 is shown to include a bottomboard 181, a top board 183, board connectors 190-193, wire 187, and wire185, all of which are shown located on a top surface of the top board183. The lock 12 is further shown to include wire 187, which is shownlocated on top surface of the bottom board 181. Wire 185 extends betweenthe connectors 190 and 191 thereby causing electrical coupling of theseconnectors. Similarly, wire 187 extends between the connectors 192 and193.

In FIG. 10 b, wire 186 causes electrical coupling of the connector 191with the connector 193. Similarly, wire 184 causes electrical couplingof the connector 190 with the connector 192. The combination of wires184, 185, 186, 187 connected to one another through the connectors 190,191, 192, 193 creates the electrical loop 67 around the opening 18. Anycut of the opening, either on the top and bottom or the other two sides,causes an interruption of the current flow in loop 67 and is detected bythe processor 50 which is connected to the loop 67.

FIG. 10c shows an exploded view of the loop 67. As shown in FIG. 10 c,the loop 67 is made of a combination of the connectors 190, 191, 192,193 and wires 184, 185, 186, 187.

FIG. 11a shows yet another exemplary application of the device 10 fordeterring/protecting/monitoring of a user device. In this application,the lock 12 is anchored to the wall through its connection via the cable214 to the charger 204 and the charger 204 being plugged 208 to the walloutlet 202. In case, the wall outlet had a common connection interfacesuch as USB built in, the lock 12 could directly anchor to this outletvia cable 214.

In the configuration of FIG. 11 a, a phone 210 is secured through itsconnection to the lock 12 via cable 44. If needed, the phone 210 canalso get charged by the battery charger 204 through the lock 12. In thisconfiguration, the phone 210 can be secured while being charged. Thelock 12 wirelessly reports any malfeasance related thereto to the key 14As in the case of FIGS. 8 a, 8 b and 9, some of the relevant portions ofthe inside of the lock 12 are highlighted in FIG. 11 a. In anotherembodiment, there can exist an internal charging system such as acharger or an adapter in the lock deterrent device. For example, theinternal charging system can also have a 110V connector to be able toconnect to the power outlet 202 directly or a 12V connector to beconnected to a laptop charger. The lock deterrent device can charge thedevice being protected in two ways: either by its own battery power orthrough an internal or external battery charger when it is anchored to apower source 202 or external charger 204.

In FIG. 11 a, the device being protected, the mobile device or cellphone 210 is secured through cable 44. It could also be any other activedevice, such as a laptop. In the case where the lock 12 operates as astand-alone unit, without the key 14, the only difference is that thecommunication with key 14 does not take place.

The embodiment of FIG. 11 b, while shows the same anchoring as in FIG.11 a, it shows how to secure a passive object 162.

The embodiment of FIG. 12a is analogous to the embodiment of FIG. 3 withthe exception of the particular internal blocks of the lock 12 a thatare actively in use being shown in the configuration of FIG. 12 a.

The embodiment of FIG. 12b is analogous to the embodiment of FIG. 12aand shows any secure path 44 or the anchored loop 46 can also securepassive objects 162 and 163.

FIGS. 13-15 show flow charts of some of the relevant operational stepsperformed by the lock 12 and key 14. At step 300, wireless terminationof the lock 12 via the key 14 begins.

In accordance with a method, termination may be done through the key in“wireless” mode. In yet another method, a password is used through thecommunication pad of the lock 12 to terminate and yet another method,termination is done through physically mating of the key and the lock.

After step 300, at 302, a determination is made as to whether or not theuser 304 has entered a valid/recognized message, such as a number,through the key's communication pad and if not, the process waits untilthis occurs, and if so, the process continues to 316. From 316, thesteps thereafter are performed by the key 14 and the steps from andincluding 306 (shown on the right side of FIG. 13) are done by the lock12. At 316, if the key is active, the process sets a timeout counter tozero at step 318 and determines whether or not the timeout counter is ata predetermined threshold at 320 and if so, the process moves onto thestep 322, otherwise, the process goes to step 338. At step 338, an erroris noted. At step 322, an end-command is sent to the lock wirelessly andthe process moves onto 324, where the key waits for acknowledgment fromthe lock.

After step 322, the key waits for an acknowledgment from the lock andupon receiving acknowledgment, the key ends this (termination) procedureand performs clean up or log, at step 330. As used herein, “clean up”and “log” refer to initializing parameters at the end of the procedureto prepare for starting for a new activation.

After step 330, at step 314, a wait period takes place for the lock andthe key to reconnect.

At 306, a determination is made as to whether or not the lock is activeand if the lock is determined to be active, the process continues tostep 308 waiting for receipt of a RF-End command from the key,otherwise, the lock ignores the RF_End command from the key. After 308,at step 310, an acknowledgment is sent to the key. Next, at step 312,the termination process for the lock 12 ends, much like step 330 andstep 314 is performed.

FIG. 14 shows some of the steps, in flow chart form, for physicaltermination of the operation between the lock and key. At step 400, theprocess begins. The user 304, at some point, needs to physically connectthe key to the lock, such as shown by the connection 20 in FIG. 1. Next,at 402, a determination is made as to whether or not the lock and keyare physically connected and if so, the process moves onto either 422 or404 depending on the steps the key or the lock perform. If the physicalconnection has not yet been established, the process waits until theyare physically connected. The steps and decisions shown on the rightside of FIG. 14, i.e. 404-416 and 420, are generally performed by thelock 12 and the steps shown on the left side of FIG. 14, i.e. 422-430,are generally performed by the key 14. At 404, the lock determineswhether or not it is active. Prior to being “active”, the lock is notproperly operational, i.e. perform the functions it is intended toperform such as monitoring, securing, and detecting, and the like. Ifinactive, the process goes from 404 to the step 418 and prepares for anew session. At step 418, the lock and the key know to start theactivation process described and shown relative to FIG. 6.

Upon determining that it is active, the step 406 is performed but onlyif the key has given permission to the lock to access its credentialbuffer. Access to the lock is typically provided through physical wireconnection for increased security. Assuming access has been extended tothe lock, at step 406, the lock reads the identification password fromthe buffer 88 of the key to determine the authenticity of the key. Thisis done, in accordance with an exemplary embodiment, by using theidentification password stored in the key buffer 88 and that which issaved in its own buffer 57.

Next, the lock determines whether there is match between theidentification password from the key and the password that is in itsbuffer 57 and when there is a match, the process moves on to the step410, otherwise in the event of no match, i.e. the key is notauthenticated, the process moves to step 420. At step 420, the lockreports in intrusion (to the user 304), which is typically donewirelessly.

At step 410, a password that is used to verify termination, is read fromthe buffer 57 and at 412, it is verified, or not. In the case ofverification, the process performs step 414, otherwise, the processmoves onto step 420.

At step 414, the lock reports to the key to end activation. Next, atstep 416, the lock carries out a termination process to end activation.

As to the key, at 422, similarly to the lock, the key determines if itis active and if so, the process continues to step 424 otherwise, theprocess goes to step 418. At step 424, the key gives the lock access toits buffer 88 (shown in FIG. 4), via the connection 20 (shown in FIG.1). This is the step necessary for the lock to perform the steps fromstep 406 on. Next, at step 426 and at 428, the key 14 awaits receipt ofthe end of activation (step 414) from the lock 12 and upon receiptthereof, the key 14 performs step 430. At step 430, the key endsactivation by carrying out a termination process, analogous to the step416, performed by the lock. The foregoing ends the physical wiredtermination process between the lock 12 and the key 14, therefore endingthis session, in accordance with an embodiment and method.

Alternatively, physical wired termination may be performed even when thekey 14 is without battery power, as follows. When the lock 12 and key 14physically mate as shown in FIG. 1, the key then utilizes the powersupplied by the lock to charge the key's battery when battery powerbecomes low. When the key 14 is completely out of battery power, whilecharging the key's back, the lock 12 can act as a power source for thekey processor 80, through the connection 20, to ensure uninterruptedoperation of the key.

In an embodiment, the key processor 80 (shown in FIG. 4) includesmemory, such Electrically Erasable Programmable Read-Only Memory((EEPROM). In accordance with a method, handshaking credential data isstored in the EEPROM of the key processor 80, at the start of thesession. When power is restored, the credential data is made availableto the lock 12. The foregoing process successfully effectuatestermination of the lock 12. The key also goes to the ending process andcleans up its log and prepares for next activation session. Furthermore,all information regarding tampering, intrusion, etc. are also stored inthe EEPROM of the lock processor 50. Upon loss of power by the lock,still the information will be available upon power restoration.

FIG. 15 shows some of the steps, in flow chart form, performed by thelock and key, for termination of activation via the pad 22 of the lock,at step 500. At 502, the lock awaits the user's entry of a userpassword, which the lock uses to authenticate the user 304. Upon failureof authentication, the lock awaits entry of the correct (expected)password from the user. Upon authenticating the user 304, the lockdetermines whether or not it is active at 504 and if so, step 506 isperformed. At step 506, the lock initializes a timeout counter. Timeoutis during a period of time the lock awaits the expected password fromthe user after which the lock no longer awaits entry from the user. From508 to step 514, the lock waits for receiving an acknowledgment from thekey in response to its transmission of end-of-command, through RFtransmission. The lock then moves onto step 516.

So as to avoid waiting indefinitely, the lock uses a threshold value towait a predetermined amount of time for the process of acknowledgmentfrom the key to end, as described above. The steps for doing so includesteps 518 and 520 where at step 520, the lock reports failure to receiveof the key's acknowledgment, back to the key and at step 518 the lockrecords this problem.

Steps 524 to 530 are performed by the key, i.e. the terminatingactivation or termination procedure. Upon determining it is activated at524, the key, at 526, waits for the end-of-command, sent by the lock atstep 510, and upon receipt thereof, it sends an acknowledgment at step528, to the lock and ends its termination process at step 530.

FIG. 16 shows exemplary screenshots of a mobile device of variousparameters and status reported by the device 10. For example, thescreenshot 600 shows adjustments that can be made by the user to thevolume (of alert/alarm sound), password and battery status. Screenshot602 shows various detections by the device 10, for example, an intrusiondetection at 10:17:10 AM on Jun. 6, 2014.

It is understood that the various embodiments and methods shown anddiscussed herein, various configurations of protecting a user object,including but not limited to, stand-alone, without use of the key 14,may be employed. Further, in place of the key 14, a general purpose usermonitor key such as a smart device may be employed. In addition, thededicated communication between the lock 12 and the user monitor key canbe either wired or wireless. The dedicated user monitor key 14 can beused for activation start, monitoring and end operations among otherfunctions. Furthermore, the lock 12 can use its keypad for certainoperations and use the user monitor key 14 for other operations. In acase where the lock 12 operates without the user monitor key 14, all theoperations of the lock 12 can be performed solely by itself andinformation may be input to the lock 12, through, for example, a keypad.

Although the invention has been described in terms of specificembodiments, it is anticipated that alterations and modificationsthereof will no doubt become apparent to those skilled in the art. It istherefore intended that the following claims be interpreted as coveringall such alterations and modification as fall within the true spirit andscope of the invention.

What is claimed is:
 1. A portable theft deterrent device comprising: alock detection mechanism; wherein the lock detection mechanism includesa plurality of connectors; wherein the lock detection mechanism includesa first active circuit therein coupled to the plurality of connectors;wherein when the lock detection mechanism is coupled to an electricalpath via at least one connector of the plurality of connectors and thefirst active circuit detects an interruption in the electrical flow inthe electrical path, the lock detection mechanism provides an alert; anda monitoring key member, the monitoring key member includes a secondactive circuit therein that allows for wireless communication with thelock detection mechanism when detached therefrom; wherein the monitoringkey member is configured to receive the alert remotely.
 2. The portabletheft deterrent device of claim 1, wherein the alert can be any of alight, beep, remote notification, horn, vibration and alarm.
 3. Theportable theft deterrent device of claim 1, wherein the electrical pathcomprises an anchor for the lock detection mechanism.
 4. The portabletheft deterrent device of claim 3, wherein the electrical path loopsthrough an opening in a not easy to move object.
 5. The portable theftdeterrent device of claim 1, wherein a portable device is secured byproviding an electrical path between the portable device and the lockdetection mechanism.
 6. The portable theft deterrent device of claim 3,wherein the anchor comprises any of a virtual or physical anchor.
 7. Theportable theft deterrent device of claim 5, wherein the portable deviceis secured either through wireless or wired connection or both.
 8. Theportable theft deterrent device of claim 5, wherein the electrical pathanchors the lock detection mechanism to a hard to move object andsecures the portable device through the same electrical path.
 9. Theportable theft deterrent device of claim 1, wherein the lock detectionmechanism includes a keypad, wherein the keypad enables and disables thelock detection mechanism when a correct key code is entered.
 10. Theportable theft deterrent device of claim 3, wherein the anchor comprisesan electrical cable that is looped around a hard to move object andcoupled between a first connector and a second connector in the lockdetection mechanism.
 11. The portable theft deterrent device of claim 1,wherein the lock detection mechanism includes an opening therethrough.12. The portable theft deterrent device of claim 11, wherein the anchorcomprises an electrical cable that is looped through the opening, iscoupled to a first connector, looped around a hard to move object andcoupled to a portable device.
 13. The portable theft deterrent device ofclaim 3, wherein the anchor comprises an electrical cable that isconnected between one of the plurality of connectors on the lockmechanism and an immovable power source.
 14. The portable theftdeterrent device of claim 3, wherein the anchor comprises a sensor whichdetects a change in position of the lock detection mechanism.
 15. Theportable theft deterrent device of claim 11, wherein the first activecircuit includes a protection mechanism to detect tampering with theopening.
 16. The portable theft deterrent device of claim 5, wherein theportable device includes any of a laptop, smartphone, tablet, phablet,digital camera, television, or recorders.
 17. The portable theftdeterrent device of claim 16, wherein the portable device includes oneor more peripheral devices coupled thereto.
 18. The portable theftdeterrent device of claim 17, wherein the lock detection mechanismdetects peripheral devices being attached or detached from the portabledevice.
 19. The portable theft deterrent device of claim 1, wherein themonitoring key member includes a connector which can be utilized for anyof data communication or power.
 20. The portable theft deterrent deviceof claim 19, wherein the connector provides a charging path to aninternal power source in the monitoring key member.