Shroud to prevent manipulation of a release mechanism of a plug

ABSTRACT

Apparatuses, devices, systems, and methods are provided for prevention of tampering with cables and associated systems. In one aspect, an anti-tamper adapter is provided that can inhibit or prohibit cable tampering for existing cables. The provided embodiments can economically and flexibly facilitate cable tamper prevention in a wide array of cable technologies.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Patent ApplicationSer. No. 61/327,493, filed on Apr. 23, 2010, and entitled CABLE TAMPERPREVENTION, the entirety of which is hereby incorporated by reference.

FIELD OF THE INVENTION

The subject disclosure is directed to cable tamper prevention and, morespecifically, to apparatuses, systems, and methods pertaining topreventing tampering with communications cables and associated systems.

BACKGROUND OF THE INVENTION

Racks, frames, cabinets and the like (referred to herein as “racks” or“equipment racks”) support equipment components such as computer andother electronic equipment units, e.g., servers, communicationsswitches, patch panels, enclosures and the like. The equipmentcomponents can include patch panels, equipment units, equipment facepanels, and the like extending between the vertical members along thefront side of the rack. These panels can have slots and other openingsfor mounting of patch blocks of outlets, adapters, or other devices orto allow access to control portions of the equipment components. Forexample, a patch panel typically comprises a connecting hardware system(e.g., arrays of outlets, ports, or adapters, etc.) that facilitatescable termination, connection, and cabling administration via the useand administration of standard-conforming adapters or plugs.

These connections are made by cables, cords, or other categories ofwires (referred to hereinafter as “cables”). Interconnect cables areprimarily used as intra-equipment jumpers or patch cords and aregenerally available in standard lengths and colors. For example, sometypical applications include patching active electronics to nearby patchpanels, cable cross-connection on distribution frames, and connectingwork area outlets to terminal equipment. Patch cords typically comprisea length of cable with a plug or outlet on one, or both ends.

In addition, these racks can support a vast array of equipmentcomponents including patch panels and other equipment having many portsconnected to various types of cables. For instance, the equipmentcomponents can be used for telephony, networking, and othercommunication related applications using, for example, fiber and coppercables. As a result, the associated computer networks and services canprovide a wide array of efficient computing capabilities throughout alarge work area, while providing mission critical services essential tothe function of an organization alongside less essential services.

Due to the sensitive nature of the equipment components housed in theseracks, ideally, the racks can be located in access-restricted areas toprevent undesired access by unauthorized personnel. At the same time,racks located in restricted access areas can be arranged in such a wayto provide easy access to the patch panels, equipment units, equipmentface panels, and the like to expose arrays of outlet ports tomaintenance personnel. However, even in such restricted access areas theequipment components and associated connections can be subject toinadvertent tampering (e.g., removal of the wrong cable, etc.).

In other situations, economic or other considerations can dictate thatsuch access to the outlet ports are not as strictly controlled (e.g., atemporary development setup, a startup company lacking financialresources to implement rigorous access controls, equipment racks locatednear office or common areas, etc.). As a result, access to suchconnections can be poorly controlled and subject to casual tamperingwith equipment component connections by unauthorized personnel as wellas inadvertent tampering.

In yet other situations, special administrative controls can beimplemented that require heightened awareness of potentially affectedequipment when performing maintenance in restricted access areas. Forexample, when mission critical equipment components are collocated withnon-essential equipment components, system administrators can desireimplementing special administrative or logistical controls forperforming maintenance in such areas. Accordingly, to preventinadvertent interruption of essential services associated with theconnection of mission critical equipment components when performingmaintenance on non-essential equipment components, system administratorscan require, e.g., physical separation of different classes of equipmentcomponents, two-party verification of equipment components and/orconnections prior to commencing work, special color coding, etc.However, such administrative measures can be costly and can still besubject to human error.

Thus, in either situation, ensuring physical security to preventunauthorized tampering with the equipment components and associatedconnections can be a challenge either due to cost considerations,manpower considerations, space considerations, etc. For example, whilesome methods to prevent cable and connection tampering have beendescribed, still other methods focus on the use of electronic orsoftware based connection-specific alarms. However, such methods aremerely reactive rather than proactive. That is, while suchconnection-specific alarms can alert personnel to unexpected connectioninterruption due to tampering or other causes, the methods do noteffectively prevent tampering. In other examples, where a mechanismnotifies system administrators for a network and records events when anenclosure, cover, or door is opened or removed, such mechanisms can failto address inadvertent tampering or unintended disconnection ofessential equipment components by authorized personnel.

In still other outlet-based tamper prevention devices, conventionaldevices can require proprietary outlets or plugs, re-termination of anexisting patch cable, excessive manpower required for installation orassembly, and/or excessive manpower for removal re-termination if suchdevices are no longer desired or warranted. In addition, in still otheroutlet-based tamper prevention devices, if such devices are notreusable, then the use thereof can be a significant cost factor inattempting to thwart tampering with equipment components and associatedconnections.

Although the above-identified methods or devices can work for theirintended purposes, such methods or devices do not effectively addressthe considerations as described (e.g., cost, proprietary outlets orplugs, ease and flexibility of use, manpower requirements, raisingawareness of mission critical connections, proactive prevention oftampering, inefficient use of costly equipment rack space, etc.). It isthus desired to provide enhanced cable anti-tamper devices, systems, andmethodologies for cable tamper prevention that improve upon these andother deficiencies of conventional tamper prevention systems.

SUMMARY OF THE INVENTION

The following presents a simplified summary of the specification toprovide a basic understanding of some aspects of the specification. Thissummary is not an extensive overview of the specification. It isintended to neither identify key or critical elements of thespecification nor delineate any scope particular to any embodiments ofthe specification, or any scope of the claims. Its sole purpose is topresent some concepts of the specification in a simplified form as aprelude to the more detailed description that is presented later.

In various embodiments, the disclosed subject matter providesapparatuses, devices, systems, and methodologies for prevention oftampering with cables and associated systems. In one aspect, ananti-tamper adapter is provided that can inhibit or prohibit cabletampering for existing cables. In further aspects, the providedembodiments can economically and flexibly facilitate cable tamperprevention in a wide array of cable technologies.

Thus, in various embodiments, cable tamper prevention systems areprovided that can be adapted to accept an existing or standardcommunications plug in a reversible manner. The provided systems caninhibit actuation of the release mechanism when the standardcommunications plug is attached to an associated outlet.

Further embodiments of the disclosed subject matter provide cableanti-tamper adapters having a resilient catch in a channel of an adapterbody that reversibly engages a recess in a plug. In an aspect, theresilient catch can limit plug travel in the adapter body in areversible manner to allow removal of the plug for reuse of anassociated cable without the cable anti-tamper adapter.

In yet other embodiments, methodologies for cable tamper prevention caninclude locking a plug into an anti-tamper adapter (e.g., reversibly orotherwise) to align a portion of the anti-tamper adapter that inhibitsactuation of a release mechanism associated with the plug.

These and other additional features of the disclosed subject matter aredescribed in more detail below.

BRIEF DESCRIPTION OF THE DRAWINGS

The devices, components, assemblies, structures, and methodologies ofthe disclosed subject matter are further described with reference to theaccompanying drawings in which:

FIG. 1 depicts a front perspective view of an exemplary prior art patchpanel, outlets, and patch cables in an equipment rack suitable for usewith exemplary embodiments of the disclosed subject matter;

FIG. 2 illustrates an exemplary prior art fiber optic adapter panel,adapters, and patch cables suitable for use with further embodiments ofthe disclosed subject matter;

FIG. 3 illustrates an exemplary prior art Registered Jack (RJ) typeequipment panel, outlets, and patch cables suitable for use withembodiments as described herein;

FIGS. 4-6 depict perspective and plan views of an RJ-45 plug andassociated connector illustrating an exemplary application of disclosedembodiments;

FIG. 7 depicts views of an exemplary embodiment of an anti-tamperadapter suitable for use with RJ-type plugs as described herein;

FIGS. 8-9 depict perspective views of a non-limiting implementation ofan anti-tamper adapter suitable for use with RJ-type plugs;

FIG. 10 depicts a cross-section of a perspective view for exemplaryembodiments of an anti-tamper adapter suitable for use with RJ-typeplugs as described herein;

FIG. 11 depicts views of an exemplary non-limiting removal tool or keyfor disconnecting a connected RJ-type plug using exemplary embodimentsof an anti-tamper adapter as described herein;

FIGS. 12-13 depict perspective views illustrating further aspects of anexemplary removal tool or key for disconnecting a connected RJ-type plugusing embodiments of an anti-tamper adapter as described herein;

FIG. 14 depicts a cross-sectional perspective view of a removal tool orkey for disconnecting a connected RJ-type plug using an exemplaryanti-tamper adapter of the disclosed subject matter;

FIG. 15 illustrates an exploded view of an RJ-type plug and exemplaryembodiments of an anti-tamper adapter and removal tool or key fordisconnecting a connected RJ-type plug as described herein;

FIG. 16 illustrates a cross-sectional perspective view of an RJ-typeplug depicting various aspects of an installed anti-tamper adapter;

FIG. 17 depicts a cross-sectional perspective view of a disclosedanti-tamper adapter illustrating various aspects of a non-limitingremoval tool or key for disconnecting a connected RJ-type plug employingthe disclosed anti-tamper adapter;

FIG. 18 depicts a cross-sectional perspective view of a non-limitingremoval tool or key for disconnecting a connected RJ-type plug employingan exemplary anti-tamper adapter as described herein, where theanti-tamper adapter is omitted for clarity;

FIG. 19 illustrates a cross-sectional perspective view of an RJ-typeplug depicting various aspects of an exemplary anti-tamper adapter andremoval tool or key for disconnecting a connected RJ-type plug employingthe anti-tamper adapter;

FIGS. 20-21 illustrate further aspects of an RJ-type plug and anexemplary anti-tamper adapter as described herein;

FIG. 22 depicts still further aspects of an RJ-type plug, an exemplaryanti-tamper adapter, and removal tool or key for disconnecting aconnected RJ-type plug employing the anti-tamper adapter;

FIG. 23 illustrates further aspects of an exemplary removal tool or keyfor disconnecting a connected RJ-type plug employing furthernon-limiting embodiments of the disclosed anti-tamper adapter;

FIG. 24 illustrates additional aspects of an exemplary removal tool orkey for disconnecting a connected RJ-type plug and further non-limitingembodiments of an anti-tamper adapter as described herein;

FIG. 25 depicts a perspective view of further non-limiting embodimentsof an anti-tamper adapter suitable for use with RJ-type plugs asdescribed herein;

FIG. 26 depicts an exemplary anti-tamper adapter and a furthernon-limiting embodiment of a removal tool or key for connecting anddisconnecting a connected RJ-type plug using exemplary embodiments of ananti-tamper adapter;

FIG. 27 depicts a perspective view further illustrating aspects of anexemplary removal tool or key for connecting and disconnecting aconnected RJ-type plug using embodiments of an anti-tamper adapter;

FIG. 28 illustrates an exploded view of an RJ-type plug and exemplaryembodiments of an anti-tamper adapter and removal tool or key forconnecting and disconnecting a connected RJ-type plug, where the removaltool or key for connecting and disconnecting a connected RJ-type plug isdepicted with an insertion end of the removal tool or key adapted to beinserted into an exemplary anti-tamper adapter;

FIG. 29 depicts cross-sectional views for exemplary embodiments of ananti-tamper adapter suitable for use with RJ-type plugs, where theinsertion end of the removal tool or key is illustrated at variouspositions with respect to aspects of an exemplary anti-tamper adapter;

FIG. 30 depicts cross-sectional views for exemplary embodiments of ananti-tamper adapter, where an assembly comprising a removal tool or keyand an exemplary anti-tamper adapter are depicted at various positionswith respect to an exemplary outlet;

FIG. 31 illustrates an exploded view of an RJ-type plug and exemplaryembodiments of an anti-tamper adapter and removal tool or key forconnecting and disconnecting a connected RJ-type plug, where the removaltool or key for connecting and disconnecting a connected RJ-type plug isdepicted with an extraction end of the removal tool or key adapted to beinserted into an exemplary anti-tamper adapter;

FIG. 32 depicts cross-sectional views for exemplary embodiments of ananti-tamper adapter suitable for use with RJ-type plugs, where theextraction end of the removal tool or key is illustrated at variouspositions with respect to aspects of an exemplary anti-tamper adapterfitted to an RJ-type plug and connected to an exemplary outlet;

FIG. 33 depicts cross-sectional views for exemplary embodiments of ananti-tamper adapter, where aspects of a removal tool or key are depictedat various extents of insertion with respect to an exemplary anti-tamperadapter connected to an exemplary outlet;

FIG. 34 depicts perspective views of further non-limiting embodiments ofa removal tool or key suitable for use with an exemplary anti-tamperadapter connected as described;

FIG. 35 depicts a cross-sectional view of exemplary embodiments of ananti-tamper adapter, where aspects of a removal tool or key are depictedwith respect to an exemplary anti-tamper fitted to an RJ-type plug;

FIG. 36 illustrates further aspects of exemplary embodiments of ananti-tamper adapter, where an anti-tamper adapter is depicted in thecontext of a plug connected to an exemplary outlet; and

FIG. 37 depicts a block diagram demonstrating methodologies for cabletamper prevention in accordance with aspects of the disclosed subjectmatter.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS Overview

As used herein, the term “equipment component” is intended to refer toequipment components (e.g., enclosures, equipment units, patch panels,multimedia units, servers, communications switches, recording andplayback devices, home computer and networking devices), whetherrack-mountable or standalone (e.g., not rack-mountable) that can benefitfrom one or more embodiments of the disclosed subject matter.Additionally, as used herein, the terms “integrated” and “integrating”are intended to refer to the act of incorporating, forming, or unitingotherwise separate component parts into a whole.

While a brief overview is provided, copper cables, and associatedoutlets, plugs, patch panels etc., as well as fiber optic cables, andassociated outlets, adapters, patch panels etc., are described hereinfor the purposes of illustration and not limitation. In addition tocopper cables etc., and fiber optic cables etc., the non-limiting terms“cable” and “plug” are intended to encompass any of a family oftechnologies designed to connect and transfer signals or electricalcurrent between and/or among equipment components (e.g., power cables,patch cables, cords, patch cords, etc.). Additionally, while RegisteredJack (RJ) type outlets and plugs (e.g., RJ-45, RJ-11, etc.) aredescribed herein for the purpose of illustrating various non-limitingimplementations, it should be appreciated that the disclosed subjectmatter is not so limited. For example, one skilled in the art canappreciate that the illustrative embodiments can have application withrespect to other cable, plug, and outlet technologies.

As described in the background, conventional cable tamper preventiondevices and methods suffer from drawbacks associated with excessivecost, use of proprietary outlets or plugs, difficulty and inflexibilityof use, excessive manpower, reactive efforts to address tampering,inefficient use of costly equipment rack space, etc. These and otherdrawbacks can be appreciated upon review of FIGS. 1-6, which provideadditional context surrounding the embodiments of the disclosed subjectmatter.

For example, FIG. 1 depicts a front perspective view 100 of an exemplaryone rack unit (1RU) patch panel 102, outlets 104, and patch cables 106in an equipment rack 108 suitable for use with exemplary embodiments ofthe disclosed subject matter. Typically, racks located in restrictedaccess areas can be arranged in such a way to provide easy access to thepatch panel 102, equipment units, equipment face panels, and the like toexpose arrays of outlets 104 or ports to maintenance personnel. As canbe seen in FIG. 1, the close proximity of adjacent outlets 104 canprovide an opportunity for inadvertent tampering that can cause unwantedservice interruption. In less restricted areas, patch panel 102 canprovide similar access, but can be further subject to unauthorizedtampering due to less strictly controlled physical access to areascontaining rack 108. As a result, various embodiments of the disclosedsubject matter, can provide an additional measure of cable tamperingprevention for outlets 104 and attached patch cables 106, for example,whether the tampering is inadvertent (e.g., wrong outlet 104 ismistakenly selected for disconnection) or otherwise (e.g., intentionalunauthorized access of outlets 104 and attached patch cables 106).

FIG. 2 illustrates an exemplary fiber optic adapter panel, adapters, andpatch cables suitable for use with further embodiments of the disclosedsubject matter. For instance, FIG. 2 depicts an exemplary LucentConnector (LC) fiber optic adapter plate assembly 200 in which detailsof the attachment of adapter 202 to adapter panel 204 and fiber opticcable 206 to fiber optic adapter 202 are shown to further illustrate theclose proximity with which different connections can be made. As can beseen in FIG. 2, fiber optic cable 206, terminated with plug 208comprising resilient latch 210, can be plugged into and retained infiber optic adapter 202 by virtue of latch protrusions 212 that mate toand engage with corresponding recesses (not shown) in fiber opticadapter 202 as plug 208 is inserted into fiber optic adapter 202.Typically, until such time as resilient latch 210 is depressed orotherwise manipulated to disengage latch protrusions 212 from thecorresponding recesses in fiber optic adapter 202, fiber optic cable 206will remain connected to fiber optic adapter 202. However, due to theclose proximity of adjacent fiber optic adapters 202 (or outlets 104 ofFIG. 1), such connections are subject to inadvertent tampering (e.g.,wrong fiber optic adapter 202 is mistakenly selected for disconnection).

FIG. 3 illustrates 300 an exemplary RJ type equipment panel, outlets,and patch cables suitable for use with embodiments as described herein,in which details of the attachment of outlet 302 to equipment panel 304and patch cable 306 to outlet 302 are depicted. FIG. 3 depicts an RJ-45plug 308 with shroud 310 adjacent to an RJ-11 plug 308. As can be seenin FIG. 3, patch cable 306, terminated with plug 308 comprisingresilient latch 312, can be plugged into and retained to outlet 302 byvirtue of latch protrusions (e.g., a shoulder) (not shown) that mate toand engage with corresponding recesses 314 in outlet 302 as plug 308 isinserted into outlet 302. As described above, until such time asresilient latch 312 is depressed or otherwise manipulated to disengagelatch protrusions from the corresponding recesses 314 in outlet 302,patch cable 306 will remain connected to outlet 302. As furtherdescribed above, due to the close proximity of adjacent outlets 302 (oroutlets 104 of FIG. 1), such connections are subject to inadvertenttampering (e.g., wrong outlet 302 is mistakenly selected fordisconnection).

FIG. 4 depicts a perspective view of an RJ-45 plug 308 and associatedoutlet 302 illustrating an exemplary application of disclosedembodiments, in which details of patch cable 306 and outlet 302 areshown as described above regarding FIG. 3. As can be seen in FIG. 4,which depicts a conventional RJ-45 plug 308, the plug 308 can comprise aplug body 402 having standardized external dimensions, as well as arecess 404 molded into plug body 402 and/or formed during patch cable306 termination, and shoulder 406. According to convention, thedirection of insertion (e.g., direction of normal insertion) orconnection of plug 308 into outlet 302 is in the direction indicated at408. In addition, plug 308 can be described as having a front portion(e.g., facing outlet 302) facing the direction of insertion 408 and arear portion (opposite the front portion), where FIG. 4 depicts plug 308as being viewed from the rear of the plug 308 as indicated. According tothe orientation given in FIG. 4, FIG. 5 depicts plan views of an RJ-45plug 308, and FIG. 6 depicts perspective views of an RJ-45 plug 308further illustrating applications of disclosed embodiments.

For instance, FIG. 5 depicts a left side view 502, a top view 504, abottom view 506, a front end view 508, and a rear end view 510. Asdescribed, plug 308 can comprise a plug body 402 having standardizedexternal dimensions, as well as a recess 404 molded into plug body 402and/or formed during patch cable 306 termination, and a shoulder 406. Inaddition, plug 308 can comprise a length of cable 512 to form patchcable 306, for example. In addition, a resilient latch 312 that, whenplug 308 is plugged into outlet 302, latch protrusions 514 (e.g., ashoulder) can mate to and engage with corresponding recesses 314 inoutlet 302 as plug 308 is inserted into outlet 302. FIG. 5 also depictsan array 516 of conductors that engage a corresponding array ofconductors in outlet 302 to provide communication signal paths.

Thus, an RJ-45 outlet 302 can receive an RJ-45 plug 308 connectingconductors of cable 512 through the array 516 of conductors to thecorresponding array of conductors in outlet 302 to provide communicationsignal paths to an equipment component utilizing outlet 302. Asdescribed above, until such time as resilient latch 312 is depressed orotherwise manipulated to disengage latch protrusions 514 (e.g., ashoulder) from the corresponding recesses 314 in outlet 302, patch cable306 will remain connected to outlet 302. As further described above, dueto the close proximity of adjacent outlets 302 (or outlets 104 of FIG.1, adjacent fiber optic adapters 202 of FIG. 2, etc.), such connectionsare subject to inadvertent tampering (e.g., wrong outlet 302 ismistakenly selected for disconnection, etc.). FIG. 6 depicts perspectiveviews of an RJ-45 plug 308 as viewed from the top right front 602 andthe bottom right front 604 according to the orientations given.

Having provided an overview of cable tamper prevention problems andsolutions, in various embodiments, the disclosed subject matter providescable tamper prevention apparatuses, systems, and methodologies forcable tamper prevention. In one non-limiting aspect, the disclosedsubject matter improves upon conventional cable tamper preventionmethodologies by proactively inhibiting cable tampering while avoidingthe drawbacks associated proprietary plugs and outlets.

As described above, copper cabling, outlets, patch panels, plugs, RJtype plugs, fiber optic cabling, connectors, patch panels, adapters,etc., are described, or depicted herein for the purposes of illustrationand not limitation. Thus, variations of the disclosed embodiments assuggested by the disclosed apparatuses, systems and methodologies areintended to be encompassed within the scope of the subject matterdisclosed herein. For example, the various embodiments of theapparatuses, systems, and methodologies of the disclosed subject mattercan include additional existing or as yet developed types of cabling,plugs, and outlets or adapters.

As a further example, while RJ-45 plugs 308 have been depicted forillustration and not limitation, various equipment component connectionsand patch cables (e.g., such as fiber optic, audio, video, power, etc.)that include retention mechanisms between the plug and outlet areintended to be encompassed within the scope of the subject matterdisclosed herein. In addition, variations encompassed within the scopeof the disclosed subject matter can include separation of componentparts into subassemblies or further integration of some components orparts into assemblies, variation in the location, number, and/orarrangement of components or parts, etc.

Exemplary Cable Tamper Prevention

In view of the above described deficiencies, various embodiments of thedisclosed subject matter can facilitate cable tamper prevention withoutrequiring re-termination of existing cables. For example, FIG. 7 depictsviews of an exemplary embodiment of an anti-tamper adapter or apparatus700 suitable for use with RJ-type plugs 308 as described herein. Forinstance, FIG. 7 depicts a left side view 702, a top view 704, a bottomview 706, a front end view 708, and a rear end view 710 of anti-tamperadapter 700 according to the orientation as described with regard toFIGS. 4-6. FIGS. 8-9 depict perspective views 802 (front right bottom),804 (front right top), 902 (rear left bottom), and 904 (rear right top)of a non-limiting implementation of an anti-tamper adapter 700 suitablefor use with RJ-type plugs 308. In addition, FIG. 10 depicts across-section 1000 of a perspective view for exemplary embodiments of ananti-tamper adapter 700 suitable for use with RJ-type plugs 308 asdescribed herein.

According to various embodiments, the disclosed subject matter providesan anti-tamper adapter 700 comprising a body 712 having a channel atleast partially defined by a rear opening 714 in the body 712 (e.g., atthe rear portion of the channel). The body 712 can accept a plug 308(e.g., a standardized communications plug, an existing plug, forexample, that has been terminated, an RJ type plug, a fiber optics plug,or other plug, etc.). Note that the rear portion can be sized to allowthe plug 308 to pass into the body 712 in a direction coincident with adirection of normal insertion of the plug 308 into an associated outlet302. For example, plug 308 is normally inserted from the front of plug308 toward the outlet 302. In a similar direction (e.g., in a directioncoincident with a direction of normal insertion), front of plug 308 canbe inserted into body 712 at the rear portion of the channel.

According to an aspect, body 712 can comprise one or more shoulder(s) orprotrusion(s) 716 that can extend into the channel located proximate thefront portion of the channel (e.g., the portion of the body 712 oppositethe rear portion). The one or more shoulder(s) or protrusions 716 canlimit plug 308 travel in the direction coincident with the direction ofnormal insertion. For instance, shoulders 716 can engage shoulder 406 ofplug 308 as plug 308 is inserted into body 712. Thus, the one or moreshoulder(s) or protrusion(s) 716 in the channel can limit the maximumtravel of plug 308 into body 712 in the direction of normal insertion.

In a further aspect, body 712 can comprise one or more resilient catchesor protrusion(s) 718 in the channel that can reversibly engage one ormore recesses 404 in plug 308. Accordingly, resilient catches orprotrusion(s) 718 can limit plug 308 travel within the body 712 at leastin the direction opposite the direction of normal insertion. Forinstance, as plug 308 is inserted into body 712, resilient catches orprotrusion(s) 718 can extend outward from the channel, allowing one ormore recesses 404 to be positioned under the resilient catches orprotrusion(s) 718. As the one or more recesses 404 pass under the one ormore resilient catches or protrusion(s) 718, the one or more resilientcatches or protrusion(s) 718 can at first spring away from the channel,and then can return to a resting position in the one or more recesses404 of plug 308.

As a result, the one or more resilient catches or protrusion(s) 718, inconjunction with the one or more recesses 404 of plug 308, canreversibly or releasably lock or fix the plug 308 into a predeterminedposition in the anti-tamper adapter 700. Thus, in cooperation with theone or more shoulder(s) or protrusion(s) 716, or standing alone with theone or more recesses 404 of plug 308, the one or more resilient catchesor protrusion(s) 718 can reversibly or releasably lock or fix the plug308 into a predetermined position in the anti-tamper adapter 700.Consequently, various embodiments can advantageously be retrofitted toexisting plugs (e.g., plugs 308, 208, etc.) without requiringre-termination of existing patch cables.

As a further advantage, various embodiments of the exemplary anti-tamperadapter 700 can be removed and reused due, in part, to the reversible orreleasable manner of locking or fixing to the existing plug 308. Forexample, once it is determined that tamper prevention via anti-tamperadapter 700 is no longer desired, the anti-tamper adapter 700 can beunlocked and removed from plug 308 leaving the plug 308 in its originalunaltered condition. As a further example, by manipulating the one ormore resilient catches or protrusion(s) 718 out of the one or morerecesses 404 of plug 308, the plug 308 can be moved from itspredetermined position in the anti-tamper adapter 700, and the plug 308can be removed from the anti-tamper adapter 700 in the oppositedirection from which it was inserted into body 712 (e.g., the directionopposite the direction of normal plug 308 insertion). Preferably,various embodiments of the disclosed subject matter can facilitatedisconnecting the plug 308 from the outlet 302 so as to provide accessto the front of plug 308 and anti-tamper adapter 700 before allowing theabove described manipulation (e.g., without destroying or otherwiserendering useless the anti-tamper adapter 700) of the one or moreresilient catches or protrusion(s) 718.

As can be seen from FIGS. 7-10, for example, the one or more resilientcatches or protrusion(s) 718 are depicted, for purposes of illustrationand not limitation, as catches or protrusion(s) 718, formed on asemi-rigid arm 720 molded into body 712, and extending into the channel.However, other mechanisms for reversibly or releasably locking or fixingthe plug 308 into a predetermined position in the anti-tamper adapter700 are contemplated by the disclosed subject matter. For instance,various embodiments employing similar reversibly or releasably lockingor fixing functions can include screws, spring ball and detent, andother means of reversibly or releasably locking or fixing plug 308 intoa predetermined position in the anti-tamper adapter 700.

In addition, for various permanent, semi-permanent, or disposableembodiments of anti-tamper adapter 700, catches or protrusion(s) 718 canbe formed in a manner giving the catches or protrusion(s) 718 lessresilience (e.g., via rigid structures, adhesives, etc.). In suchexemplary non-limiting embodiments, it can be appreciated that attemptsto remove plug 308 from anti-tamper adapter 700 can result inpotentially irretrievable damage to one or more of the plug 308 or theanti-tamper adapter 700. Thus, the various embodiments as describedherein are intended to encompass a wide range of variations suitable forparticular design considerations.

Referring again to FIG. 7, anti-tamper adapter 700 can further comprisea plug release guard or release shroud 722 located on the body 712(e.g., a molded body, etc.) proximate to the front portion of thechannel. The plug release guard or release shroud 722 can at leastpartially surround a plug release or release mechanism (not shown),e.g., resilient latch 210 or 312, of the plug 308. Thus, plug releaseguard or release shroud 722 can inhibit or prevent access and/or inhibitor prevent actuation of the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206) when the plug 308 is inserted into the associated outlet(e.g., outlet 202 or 302), by for example, the close proximity of theplug release guard or release shroud 722 (or housing 724 as furtherdescribed below) to the surface of a panel (204 or 304) supporting theplug 308 attached outlet (e.g., outlet 202 or 302). This close proximitycan prevent normal access (e.g., without a tool or key as describedherein) to one or more sides of the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206). As a result, various embodiments of the anti-tamperadapter 700 can facilitate cable tamper prevention (e.g., eitherinadvertent or intentional) of a plug 308 (or plug 208 of fiber opticcable 206) fitted with an embodiment of anti-tamper adapter 700 when theplug 308 (or plug 208 of fiber optic cable 206) is connected or insertedinto an associated outlet (e.g., outlet 302 or 202 for fiber optic cable206, etc.).

As mentioned above, anti-tamper adapter 700 can further comprise ahousing 724 on body 712 that at least partially surrounds the plugrelease guard or release shroud 722 or release mechanism (not shown),e.g., resilient latch 210 or 213, of the plug 308. Thus, housing 724 caninhibit or prevent access and/or inhibit or prevent actuation of theplug release or release mechanism (e.g., resilient latch 210 or 312) ofthe plug 308 (or plug 208 of fiber optic cable 206) when the plug 308 isinserted into the associated outlet (e.g., outlet 202 or 302). Forinstance, the housing 724 can be positioned relative to the plug releaseguard or release shroud 722, such that it at least partially surroundsthe plug release guard or release shroud 722.

In addition, the housing can further shroud the plug release or releasemechanism (e.g., resilient latch 210 or 312) to prevent or inhibitactuation (e.g., prevent or inhibit normal actuation) of the releasemechanism when the plug 308 (e.g., a standard communications plug suchas a fiber optic plug, and RJ type plug, or communications cable plug,audio plug, video plug, etc.) is attached to an associated outlet (e.g.,outlet 302 or 202 for fiber optic cable 206, etc.). Moreover, housing724 can be located relative to plug release guard or release shroud 722,so as to comprise an access aperture (e.g., 726 of front and rear endviews 708 and 710, respectively) between the housing 724 and the plugrelease guard or release shroud 722 that can permit a removal tool orkey (described below) to be positioned proximate to the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 (orplug 208 of fiber optic cable 206), when the removal tool (describedbelow) is inserted into the cable anti-tamper adapter 700. It can beunderstood that other arrangements or access apertures suitable forpermitting a removal tool (described below) to be positioned proximateto the plug release or release mechanism (e.g., resilient latch 210 or312) of the plug 308 can be contemplated upon consideration of thedisclosed subject matter, for example, regarding FIGS. 23-24 below.

Accordingly, as described above, the close proximity of housing 724 tothe surface of a panel (204 or 304) supporting the plug 308 attachedoutlet (e.g., outlet 202 or 302) can prevent normal access (e.g.,without a tool or key as described herein) to one or more sides of theplug release or release mechanism (e.g., resilient latch 210 or 312) ofthe plug 308 (or plug 208 of fiber optic cable 206). As a result,various embodiments of the anti-tamper adapter 700 can facilitate cabletamper prevention (e.g., either inadvertent or intentional) of a plug308 (or plug 208 of fiber optic cable 206) fitted with an embodiment ofanti-tamper adapter 700 when the plug 308 (or plug 208 of fiber opticcable 206) is connected or inserted into an associated outlet (e.g.,outlet 302 or 202 for fiber optic cable 206).

Thus, in various aspects, the disclosed subject matter provides cabletamper prevention apparatuses (e.g., anti-tamper adapter 700) that canadvantageously provide cost-effective tamper prevention with or withoutthe use of proprietary outlets or plugs, while offering ease andflexibility of use, and without excessive manpower requirements (e.g.,two party verification of connection during maintenance, rigorous accesscontrols, etc.). As additional advantages, the various embodiments canbe employed to complement reactive efforts to address tampering (e.g.,connection or enclosure based alarms) and can allow more efficient useof costly equipment rack space, for example, where mission criticalservice connection can be located in close proximity to less essentialservice connections.

In a further aspect, various embodiments of anti-tamper adapter 700 canbe comprised of a rigid or semi-rigid material, such as a moldableplastic or polymer, in addition to more rigid materials such, forexample, as metals or ceramics. For instance, a molded plasticanti-tamper adapter 700 can include one or more of a molded body 712, aplug release guard or release shroud 722, and/or a housing 724. In yetanother aspect, plug release guard or release shroud 722, and/or ahousing 724, as well as other components (e.g., 716, 718, etc.), can bemolded integral to molded body 712 or separately and subsequentlyattached or integrated as desired. In a further aspect, the moldableplastic or polymer can be selected based on a color scheme according toan intended use of the anti-tamper adapter 700 (e.g., a standardizedcolor scheme), for example, to signify mission critical serviceconnections, etc.

FIG. 11 depicts views of an exemplary non-limiting removal tool or keyfor disconnecting a connected RJ-type plug using exemplary embodimentsof an anti-tamper adapter as described herein. For instance, FIG. 11depicts a left side view 1102, a top view 1104, a bottom view 1106, afront end view 1108, and a rear end view 1110 of exemplary non-limitingremoval tool or key 1100 according to the orientation as described withregard to FIGS. 4-6. FIGS. 12-13 depict perspective views 1202 (frontright bottom), 1204 (front left top), 1302 (rear right bottom), and 1304(rear left top) illustrating further aspects of an exemplary removaltool or key 1100 for disconnecting a connected RJ-type plug usingembodiments of an anti-tamper adapter 700 as described herein.Additionally, FIG. 14 depicts a cross-sectional perspective view 1400 ofa removal tool or key 1100 for disconnecting a connected RJ-type plug(e.g., plug 308) using an exemplary anti-tamper adapter 700 of thedisclosed subject matter.

According to various embodiments, the disclosed subject matter providesa removal tool or key 1100 comprising a body 1112. According to anaspect, as described above, body 1112 can be comprised of a rigid orsemi-rigid material, such as a moldable plastic or polymer, in additionto more rigid materials such as metals or ceramics. For example, removaltool or key 1100 (e.g., a molded plastic removal tool or key 1100) caninclude one or more of a molded body 1112 and a plug release arm 1114that permits a plug release region 1116 of the removal tool or key 1100to be placed in proximity to a plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206) when the removal tool or key 1100 is inserted into an accessaperture 726 on a anti-tamper adapter 700 as described above.

For instance, the removal tool or key 1100 can permit the plug releaseregion 1116 to enter through the access aperture 726 created by plugrelease guard or release shroud 722 and housing 724, whereas normalmeans (e.g., manual manipulation) to actuate a plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206) would be inhibited or prevented when theplug 308 (or plug 208 of fiber optic cable 206) is connected to outlet302 (or 202) by one or more of the plug release guard or release shroud722 and housing 724. Thus, plug release arm 1114 can permit a plugrelease region 1116 of plug release arm 1114 to selectively manipulatethe plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308 (or plug 208 of fiber optic cable 206), for example,when the plug release arm 1114 is manipulated in a direction orthogonalto the direction of normal insertion of plug 308 as described above.

For instance, plug release arm 1114 can comprise a resilient length of asemi-rigid material as described herein. Thus, application of a force inthe direction indicated by 1118 (e.g., a direction orthogonal to thedirection of normal insertion of plug 308) would cause plug releaseregion 1116 of plug release arm 1114 to move downward toward body 1112.As further described below, this motion, in conjunction with theproximity of plug release region 1116 to a plug release or releasemechanism (e.g., resilient latch 210 or 312), can cause selectivemanipulation of the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206)having an attached anti-tamper adapter 700. Accordingly, this selectivemanipulation of plug release or release mechanism (e.g., resilient latch210 or 312) with removal tool or key 1100 can allow removal ordisconnection of the plug 308 (or plug 208 of fiber optic cable 206)having an attached anti-tamper adapter 700.

Referring again to FIG. 11, in a further aspect, exemplary non-limitingimplementations of removal tool or key 1100 can comprise a channel 1120(e.g., empty region indicated at 1120 on rear end view 1110) formed inbody 1112. Channel 1120 can, in various aspects, accommodate a cable(e.g., fiber optic, copper, coaxial, etc.) to be used as a guide forplacing the removal tool or key 1100 in position prior to using todisconnecting or removing plug 308 (or plug 208 of fiber optic cable206) having an attached anti-tamper adapter 700 from a outlet 302 (or202). Advantageously, the channel 1120 can be left open on the bottom ofbody 1112 of removal tool or key 1100 to allow easy installation onanti-tamper adapter 700 of removal tool or key 1100.

According to a further aspect, various non-limiting implementations ofbody 1112 can comprise a cavity 1122 (e.g., indicated as shaded region1122 on front end view 1108), that accepts exemplary embodiments ofanti-tamper adapter 700. For instance, cavity 1122 can be sizedappropriately (e.g., larger than the relevant outer dimensions ofanti-tamper adapter 700 body 712) to receive body 712 of anti-tamperadapter 700, when embodiments of removal tool or key 1100 are placed inposition for selectively manipulating the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206) having an attached anti-tamper adapter700. In that regard, the cavity 1122, acting in conjunction withrelevant outer dimensions of anti-tamper adapter 700 body 712, can actas a guide for positioning removal tool or key 1100 to be placed inposition for selectively manipulating the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206).

In still other aspects, as described above, various embodiments ofremoval tool or key 1100 can be comprised of a rigid or semi-rigidmaterial, such as a moldable plastic or polymer, in addition to morerigid materials such as metals or ceramics. For example, a moldedplastic removal tool or key 1100 can include one or more of a moldedbody 1112, a plug release arm 1114, and/or a plug release region 1116 ofplug release arm 1114. In yet another aspect, plug release arm 1114and/or plug release region 1116 of plug release arm 1114 can be formedseparately from molded body 1112 and subsequently attached or integratedas desired. In a further aspect, the moldable plastic or polymer can beselected based on a color scheme according to an intended use of theremoval tool or key 1100 (e.g., a standardized color scheme), forexample, to signify mission critical service connections, etc.

In yet other aspects of the disclosed subject matter, due to thecomplementary structures of anti-tamper adapter 700 and removal tool orkey 1100, complementary variations in the shapes of anti-tamper adapter700 body 712, removal tool or key 1100 body 1112, and/or complementaryvariations in the access aperture 726 and plug release arm 1114 (and/orplug release region 1116 of plug release arm 1114), and the like, can beexploited to further effect cable tamper prevention or control schemes.For instance, a first complementary structure (e.g., level 1 or otherdesignation) of anti-tamper adapter 700 and removal tool or key 1100 canbe used for a first level of cable tamper prevention or control. In thisinstance, a level 1 removal tool or key 1100 can be, for example,generally issued to technicians having relatively low expertise,responsibility, and/or situational awareness for work on systemsdesignated as level 1 and employing a level 1 anti-tamper adapter 700having a complementary structure to a level 1 removal tool or key 1100.

As a further example, a second complementary structure (e.g., level 2 orother designation) of anti-tamper adapter 700 and removal tool or key1100 can be used for a second level of cable tamper prevention orcontrol. At this level of control, a level 2 removal tool or key 1100can be issued on a more restricted basis to technicians havingrelatively higher expertise (or supervisors having responsibility overcritical systems, for example), responsibility, and/or situationalawareness for work on systems designated as level 2 (e.g., missioncritical service connections) and employing anti-tamper adapter 700having a complementary structure to a level 2 removal tool or key 1100.

It can be understood that such variations in cable tamper prevention orcontrol schemes are limitless as a result of the flexibility afforded byvarious non-limiting implementations as described herein. For instance,with minor variations in mold dimensions, such variations ofcomplementary structure can be made possible, without undue expense thatwould be required for cable tamper prevention systems employingproprietary outlets and plugs. For example, consider the expense andinventory requirements for the exemplary two-level tamper prevention andcontrol scheme using proprietary outlets and plugs. Moreover, with theability to implement the various non-limiting embodiments as describedherein on existing connections without having to cut and re-terminatecables, as well as the ability to remove and reuse variousimplementations of anti-tamper adapters 700, various implementations ofthe disclosed subject matter can avoid the tradeoff of having todedicate cables using proprietary outlets and plugs or spend extraman-hours and expense to cut and re-terminate cables that change tamperprevention and control designation (e.g., level 1 to level 2, tamperprevention desired to not desired, etc.).

While FIGS. 7-10 and 11-14 describe various non-limiting implementationsof anti-tamper adapters 700 and removal tool or key 1100, respectively,further aspects of the disclosed embodiments and details of operationare described with regard to FIGS. 15-22. For example, FIG. 15illustrates an exploded view of an RJ-type plug (e.g., plug 308) andexemplary embodiments of an anti-tamper adapter 700 and removal tool orkey 1100 for disconnecting the connected RJ-type plug (e.g., plug 308)as described herein. For instance, in an exemplary cable tamperprevention system, FIG. 15 depicts the relative positioning of exemplarycomponents as described herein. Thus, an exemplary anti-tamper adapter700 can be placed over plug 308 by inserting the front of plug 308 intothe rear portion of anti-tamper adapter 700.

As previously described, anti-tamper adapter 700 can facilitate fixing(e.g., releasably, reversibly, or otherwise) the longitudinal positionof the plug 308 within the channel of body 712 of the anti-tamperadapter 700. The fixed longitudinal position allows the front of plug308 to extend from the front portion of anti-tamper adapter 700 to allowplug 308 (e.g., a standard communications plug such as a fiber opticplug, and RJ type plug, or communications cable plug, audio plug, videoplug, etc.) to be attached to an associated outlet (e.g., outlet 302 or202 for fiber optic cable 206, etc.). According to various embodiments,until such time as it is desired to remove plug 308 from outlet 302, theanti-tamper adapter 700 can inhibit or prevent access and/or inhibit orprevent actuation of the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206) when the plug 308 is inserted into the associated outlet(e.g., outlet 202 or 302).

According to further embodiments, when it is desired to remove plug 308from outlet 302, the anti-tamper adapter 700 can permit access toremoval tool or key 1100 to permit selective manipulation or actuationof the plug release or release mechanism (e.g., resilient latch 210 or312) of the plug 308 (or plug 208 of fiber optic cable 206) when theplug 308 is inserted into the associated outlet (e.g., outlet 202 or302). As can be seen in FIG. 15, various non-limiting implementations ofthe removal tool or key 1100 can be positioned on anti-tamper adapter700 from the rear of anti-tamper adapter 700.

Thus, access aperture (e.g., 726 of front and rear end views 708 and710, respectively) between the housing 724 and the plug release guard orrelease shroud 722 of exemplary anti-tamper adapter 700 can permitremoval tool or key 1100 to be positioned proximate to the plug releaseor release mechanism (e.g., resilient latch 210 or 312) of the plug 308(or plug 208 of fiber optic cable 206), when the removal tool (describedbelow) is inserted into the cable anti-tamper adapter 700. Accordingly,in various non-limiting embodiments of removal tool or key 1100, plugrelease arm 1114 can permit a plug release region 1116 of plug releasearm 1114 to selectively manipulate the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206) when the plug release arm 1114 is manipulated in adirection orthogonal to the direction of normal insertion of plug 308 asdescribed above.

FIG. 16 illustrates a cross-sectional perspective view 1600 of anRJ-type plug (e.g., plug 308) depicting various aspects of an installedembodiment of anti-tamper adapter 700. As described above, shoulder(s)or protrusion(s) 716 can extend into the channel located proximate thefront portion of the channel (e.g., the portion of the body 712 oppositethe rear portion). The one or more shoulder(s) or protrusion(s) 716 canlimit plug 308 travel in the direction coincident with the direction ofnormal insertion. For instance, shoulders or protrusion(s) 716 canengage shoulder 406 of plug 308 as plug 308 is inserted into body 712 ofexemplary anti-tamper adapter 700. Thus, the one or more shoulder(s) orprotrusion(s) 716 in the channel can limit the maximum travel of plug308 into body 712 in the direction of normal insertion (e.g., in adirection toward the front of the plug 308).

As further described above, body 712 of exemplary anti-tamper adapter700 can comprise one or more resilient catches or protrusion(s) 718 inthe channel that can reversibly engage one or more recesses 404 in plug308. Accordingly, resilient catches or protrusion(s) 718 can limit plug308 travel within the body 712 at least in the direction opposite thedirection of normal insertion. As a result, the one or more resilientcatches or protrusion(s) 718, in conjunction with the one or morerecesses 404 of plug 308, can reversibly or releasably lock or fix theplug 308 into a predetermined position (e.g., in a predeterminedlongitudinal position) in the exemplary anti-tamper adapter 700.

Thus, in cooperation with the one or more shoulder(s) or protrusion(s)716, or standing alone with the one or more recesses 404 of plug 308,the one or more resilient catches or protrusion(s) 718 can reversibly orreleasably lock or fix the plug 308 into a predetermined position (e.g.,a predetermined longitudinal position) in the exemplary anti-tamperadapter 700. For instance, it can be noted from FIG. 16 that, withoutthe use of the one or more shoulder(s) or protrusion(s) 716, it can bepossible to slide the exemplary anti-tamper adapter 700 in a directiontoward the rear of plug 308 if only relying on the ramped profile of theone or more resilient catches or protrusion(s) 718.

Thus, it can be understood that for embodiments without the one or moreshoulder(s) or protrusion(s) 716, further non-limiting embodiments ofanti-tamper adapter 700 can comprise alternative profiles (e.g.,non-ramped) of the one or more resilient catches or protrusion(s) 718 toreversibly or releasably lock or fix the plug 308 into a predeterminedposition (e.g., a predetermined longitudinal position) in the exemplaryanti-tamper adapter 700. Additionally, or alternatively, as describedabove, implementations of anti-tamper adapter 700 can employ othermechanisms for locking or fixing the plug 308 into a predeterminedposition (e.g., a predetermined longitudinal position) in theanti-tamper adapter 700 (e.g., reversibly, releasably, or otherwise) ascontemplated by the disclosed subject matter.

In further non-limiting implementations, as described above, for variouspermanent, semi-permanent, or disposable embodiments of anti-tamperadapter 700, catches or protrusion(s) 718 can be formed in a mannergiving the catches or protrusion(s) 718 less resilience. In suchexemplary non-limiting embodiments, it can be appreciated that attemptsto remove plug 308 from anti-tamper adapter 700 can result inpotentially irretrievable damage to one or more of the plug 308 or theanti-tamper adapter 700.

In addition, as further described above, the anti-tamper adapter can beremoved and reused due, in part, to the reversible or releasable mannerof locking or fixing to the existing plug 308. For example, once it isdetermined that tamper prevention via anti-tamper adapter 700 is nolonger desired, the exemplary anti-tamper adapter 700 can be unlockedand removed from plug 308 leaving the plug 308 in its original unalteredcondition. As a further example, by manipulating the one or moreresilient catches or protrusion(s) 718 out of the one or more recesses404 of plug 308, the plug 308 can be moved from its predeterminedposition in the anti-tamper adapter 700, and the plug 308 can be removedfrom the anti-tamper adapter 700 in the opposite direction from which itwas inserted into body 712 (e.g., the direction opposite the directionof normal plug 308 insertion).

For instance, it can be noted from FIG. 16, that the crevice formed at1602 between exemplary anti-tamper adapter 700 and plug 308 can accept ascrewdriver, a shim, or other prying or wedging device. By prying orwedging at location 1602, the one or more resilient catches orprotrusion(s) 718 can be lifted out of the one or more recesses 404 ofplug 308, thereby allowing removal of the exemplary anti-tamper adapter700 (e.g., moving exemplary anti-tamper adapter 700 in a directiontoward the front of plug 308). Preferably, various embodiments of thedisclosed subject matter can facilitate disconnecting the plug 308 fromthe outlet 302 so as to provide access to the front of plug 308 andanti-tamper adapter 700 before allowing the above described manipulation(e.g., without destroying or otherwise rendering useless the anti-tamperadapter 700) of the one or more resilient catches or protrusion(s) 718.

FIG. 16 further depicts relative locations of plug release guard orrelease shroud 722, housing 724, and resilient latch 312 for anexemplary anti-tamper adapter 700. For instance, although depicted in across-sectional perspective view, it can be noted from FIG. 16 that theplug release guard or release shroud 722 can at least partially surroundthe plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308. Accordingly, plug release guard or release shroud 722can inhibit or prevent access and/or inhibit or prevent actuation of theplug release or release mechanism (e.g., resilient latch 210 or 312) ofthe plug 308 (or plug 208 of fiber optic cable 206) when the plug 308 isinserted into the associated outlet (e.g., outlet 202 or 302), by, forexample, the close proximity of the plug release guard or release shroud722 (or housing 724 as further described below) to the surface of apanel (204 or 304) supporting the plug 308 attached outlet (e.g., outlet202 or 302). As can be seen, this close proximity can prevent normalaccess (e.g., without a tool or key as described herein) to one or moresides of the plug release or release mechanism (e.g., resilient latch210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206).

In addition, it can be seen in FIG. 16 that housing 724 can inhibit orprevent access and/or inhibit or prevent actuation of the plug releaseor release mechanism (e.g., resilient latch 210 or 312) of the plug 308(or plug 208 of fiber optic cable 206) when the plug 308 is insertedinto the associated outlet (e.g., outlet 202 or 302). For instance, thehousing 724 can be positioned relative to the plug release guard orrelease shroud 722, such that it at least partially surrounds the plugrelease guard or release shroud 722. Moreover, the housing 724 canfurther shroud the plug release or release mechanism (e.g., resilientlatch 210 or 312) to prevent actuation (e.g., prevent normal actuation)of the release mechanism when the plug 308 (e.g., a standardcommunications plug such as a fiber optic plug, and RJ type plug, orcommunications cable plug, audio plug, video plug, etc.) is attached toan associated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.).

In FIG. 16, it is further apparent that housing 724 can be locatedrelative to plug release guard or release shroud 722, so as to comprisean access aperture (e.g., 726 of front and rear end views 708 and 710,respectively) between the housing 724 and the plug release guard orrelease shroud 722. Thus, the access aperture can permit an exemplaryremoval tool or key 1100 to be positioned proximate to the plug releaseor release mechanism (e.g., resilient latch 210 or 312) of the plug 308(or plug 208 of fiber optic cable 206), when exemplary removal tool orkey 1100 is inserted into the cable anti-tamper adapter 700. Asdescribed above, other arrangements or access apertures suitable forpermitting a removal tool or key to be positioned proximate to the plugrelease or release mechanism (e.g., resilient latch 210 or 312) of theplug 308 can be contemplated, for example, regarding FIGS. 23-24 below.

FIG. 17 depicts a cross-sectional perspective view 1700 of a disclosedanti-tamper adapter 700 illustrating various aspects of a non-limitingremoval tool or key 1100 for disconnecting a connected RJ-type plug(e.g., plug 308) employing the disclosed anti-tamper adapter 700. InFIG. 17, it can be seen how various non-limiting implementations ofremoval tool or key 1100 comprising a body 1112 can comprise a cavity1122 that can accept exemplary embodiments of anti-tamper adapter 700.Thus, FIG. 17 depicts cavity 1122 as sized appropriately (e.g., largerthan the relevant outer dimensions of anti-tamper adapter 700 body 712)to receive body 712 of anti-tamper adapter 700, when embodiments ofremoval tool or key 1100 are placed in position for selectivelymanipulating the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206)having an attached anti-tamper adapter 700.

In that regard, the cavity 1122, acting in conjunction with relevantouter dimensions of anti-tamper adapter 700 body 712, can act as a guidefor positioning removal tool or key 1100 when it is to be placed inposition for selectively manipulating the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308. Also notefrom relative positioning depicted in FIG. 17 that plug release arm 1114can permit a plug release region 1116 of plug release arm 1114 toselectively manipulate the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206) when the plug release arm 1114 is manipulated in a directionorthogonal to the direction of normal insertion of plug 308 as describedabove.

For instance, FIG. 18 depicts a cross-sectional perspective view 1800 ofa non-limiting removal tool or key 1100 for disconnecting a connectedRJ-type plug (e.g., plug 308) employing an exemplary anti-tamper adapter700 as described herein, where the anti-tamper adapter is omitted forclarity. Note from FIG. 18 that application of a force in the directionindicated by 1118 (e.g., a direction orthogonal to the direction ofnormal insertion of plug 308) would cause plug release region 1116 ofplug release arm 1114 to move upward toward body 1112, engaging andselectively manipulating the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308.

As a further example, FIG. 19 illustrates a cross-sectional perspectiveview 1900 of an RJ-type plug (e.g., plug 308) depicting various aspectsof an exemplary anti-tamper adapter 700 and removal tool or key 1100 fordisconnecting a connected RJ-type plug (e.g., plug 308) employing theexemplary anti-tamper adapter 700. In addition, FIGS. 20-21 illustratefurther aspects of an RJ-type plug (e.g., plug 308) and an exemplaryanti-tamper adapter 700 as described herein, in which FIG. 21 depictsexemplary removal tool or key 1100 (omitted in FIG. 20) fordisconnecting a connected RJ-type plug (e.g., plug 308) employing theexemplary anti-tamper adapter 700. FIG. 22 depicts still further aspectsof an RJ-type plug (e.g., plug 308), an exemplary anti-tamper adapter700, and an exemplary removal tool or key 1100 for disconnecting aconnected RJ-type plug employing the anti-tamper adapter 700.

FIG. 23 illustrates further aspects of an exemplary key or tool fordisconnecting a connected RJ-type plug (e.g., plug 308) employingfurther non-limiting embodiments of the disclosed anti-tamper adapter2302. For example, anti-tamper adapter 2302 can be comprised ofessentially the same components as described above. For instance,exemplary anti-tamper adapter 2302 can comprise one or more shoulder(s)or protrusion(s) 716, one or more resilient catches or protrusion(s) 718that can reversibly engage one or more recesses 404 (not shown) in plug308, a plug release guard or release shroud 722 that can at leastpartially surround a plug release or release mechanism (not shown),e.g., resilient latch 210 or 312, of the plug 308, and housing 724 thatcan perform similar functions as previously described.

In addition, or alternatively, exemplary anti-tamper adapter 2302 canfurther comprise an access aperture (e.g., keyhole 2304) on a side(e.g., right side) of housing 724 and/or the plug release guard orrelease shroud 722 that can permit a removal tool or key to bepositioned proximate to the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206), when the removal tool or key is inserted into the cableanti-tamper adapter 2302.

For instance, in FIG. 23, exemplary anti-tamper adapter 2302 is depictedcomprising keyhole 2304 on the side of housing 724. In variousembodiments, keyhole 2304 can permit an appropriately shaped removaltool or key (not shown) to be positioned from the side of housing 724and proximate to the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 (or plug 208 of fiber optic cable206), when the removal tool or key is inserted into the cableanti-tamper adapter 2302.

As further example, the removal tool or key, when inserted into keyhole2304 can engage a support structure 2306 (e.g., such as a key landing).According to further aspects, support structure 2306 can provide support(e.g., rotational support, leverage, stability, alignment, etc.) for theend of the removal tool or key. Thus, the removal tool or key can bemanipulated in a direction to cause the removal tool or key to engageand selectively manipulate or actuate the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206) having an attached anti-tamper adapter2302. For example, when an appropriately shaped removal tool or key isinserted into keyhole 2304 and rotated clockwise, the removal tool orkey can engage and selectively manipulate or actuate the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 (orplug 208 of fiber optic cable 206) having an attached anti-tamperadapter 2302.

FIG. 24 illustrates additional aspects of an exemplary key or tool fordisconnecting a connected RJ-type plug (e.g., plug 308) and furthernon-limiting embodiments of an anti-tamper adapter 2400 as describedherein. For instance, anti-tamper adapter 2400 can be comprised of someessentially similar components as described above. For instance,exemplary anti-tamper adapter 2302 can comprise one or more shoulder(s)or protrusion(s) 716, one or more resilient catches or protrusion(s) 718that can reversibly engage one or more recesses 404 in plug 308 (notshown), etc. However, note from FIG. 24 that exemplary anti-tamperadapter 2400 lacks a housing 724 as previously described. Instead, plugrelease guard or release shroud 2402 can be extended toward the frontportion of the channel in body 2404.

Thus, as compared to anti-tamper adapter 700 having a plug release guardor release shroud 722 that can at least partially surround a plugrelease or release mechanism (not shown), e.g., resilient latch 210 or312, of the plug 308, plug release guard or release shroud 2402 ofanti-tamper adapter 2400 surrounds substantially more of the plugrelease or release mechanism (not shown), e.g., resilient latch 210 or312, of the plug 308. Note further from FIG. 24 that exemplaryanti-tamper adapter 2400 can further comprise an access aperture (e.g.,a keyhole 2406) on a side (e.g., right side) of the plug release guardor release shroud 2402 that can permit a removal tool or key to bepositioned proximate to the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 (or plug 208 of fiber opticcable 206), when the removal tool or key is inserted into the cableanti-tamper adapter 2400. In addition, while exemplary anti-tamperadapter 2400 can further comprise a support structure (not shown)similar to support structure 2306, such a support structure can beimplemented in further non-limiting implementations of exemplaryanti-tamper adapter 2400.

FIG. 25 depicts a perspective view 2500 of a further non-limitingembodiment of an anti-tamper adapter 2502 suitable for use with RJ-typeplugs 308 as described herein. FIG. 26 depicts an exemplary anti-tamperadapter 2502 and a further non-limiting embodiment of a removal tool orkey 2602 for connecting and disconnecting a connected RJ-type plug 308using exemplary embodiments of an anti-tamper adapter 2502 as describedherein. For instance, FIG. 25 depicts a right front view of anti-tamperadapter 2502 and FIG. 26 depicts a right rear view of anti-tamperadapter 2502 according to the orientation as described with regard toFIGS. 4-6.

According to various embodiments, the disclosed subject matter providesan anti-tamper adapter 2502 comprising a body 2512 having a channel atleast partially defined by a rear opening 2514 in the body 2512 (e.g.,at the rear portion of the channel). The body 2512 can accept a plug 308(e.g., a standardized communications plug, an existing plug, forexample, that has been terminated, an RJ type plug, a fiber optics plug,or other plug, etc.). Note that the rear portion can be sized to allowthe plug 308 to pass into the body 2512 in a direction coincident with adirection of normal insertion of the plug 308 into an associated outlet302. For example, plug 308 is normally inserted from the front of plug308 toward the outlet 302. In a similar direction (e.g., in a directioncoincident with a direction of normal insertion), front of plug 308 canbe inserted into body 2512 at the rear portion of the channel.

According to an aspect, body 2512 can comprise one or more shoulder(s)or protrusion(s) 2516 that can extend into the channel located proximatethe front portion of the channel (e.g., the portion of the body 2512opposite the rear portion). The one or more shoulder(s) or protrusion(s)2516 can limit plug 308 travel in the direction coincident with thedirection of normal insertion. For instance, shoulders 2516 can engageshoulder 406 of plug 308 as plug 308 is inserted into body 2512. Thus,the one or more shoulder(s) or protrusion(s) 2516 in the channel canlimit the maximum travel of plug 308 into body 2512 in the direction ofnormal insertion.

In a further aspect, body 2512 can comprise one or more resilientcatches or protrusion(s) 2518 in the channel that can reversibly engageone or more recesses 404 in plug 308. Accordingly, resilient catches orprotrusion(s) 2518 can limit plug 308 travel within the body 2512 atleast in the direction opposite the direction of normal insertion. Forinstance, as plug 308 is inserted into body 2512, resilient catches orprotrusion(s) 2518 can extend outward from the channel, allowing one ormore recesses 404 to be positioned under the resilient catches orprotrusion(s) 2518. As the one or more recesses 404 pass under the oneor more resilient catches or protrusion(s) 2518, the one or moreresilient catches or protrusion(s) 2518 can at first spring away fromthe channel, and then can return to a resting position in the one ormore recesses 404 of plug 308.

As a result, the one or more resilient catches or protrusion(s) 2518, inconjunction with the one or more recesses 404 of plug 308, canreversibly or releasably lock or fix the plug 308 into a predeterminedposition in the anti-tamper adapter 2502. Thus, in cooperation with theone or more shoulder(s) or protrusion(s) 2516, or standing alone withthe one or more recesses 404 of plug 308, the one or more resilientcatches or protrusion(s) 2518 can reversibly or releasably lock or fixthe plug 308 into a predetermined position in the anti-tamper adapter2502. Consequently, various embodiments can advantageously beretrofitted to existing plugs (e.g., plugs 308, 208, etc.) withoutrequiring re-termination of existing patch cables.

As described above, various embodiments of the exemplary anti-tamperadapter 2502 can be removed and reused due, in part, to the reversibleor releasable manner of locking or fixing to the existing plug 308. Forinstance, if it is determined that tamper prevention via anti-tamperadapter 2502 is no longer desired, the anti-tamper adapter 2502 can beunlocked and removed from plug 308 leaving the plug 308 in its originalunaltered condition. As another example, by manipulating the one or moreresilient catches or protrusion(s) 2518 out of the one or more recesses404 of plug 308, the plug 308 can be moved from its predeterminedposition in the anti-tamper adapter 2502, and the plug 308 can beremoved from the anti-tamper adapter 2502 in the opposite direction fromwhich it was inserted into body 2512 (e.g., the direction opposite thedirection of normal plug 308 insertion). Preferably, various embodimentsof the disclosed subject matter can facilitate disconnecting the plug308 from the outlet 302 so as to provide access to the front of plug 308and anti-tamper adapter 2502 before allowing the above describedmanipulation (e.g., without destroying or otherwise rendering uselessthe anti-tamper adapter 2502) of the one or more resilient catches orprotrusion(s) 2518.

As can be seen from FIGS. 25, 29 and 32, for example, the one or moreresilient catches or protrusion(s) 2518 are depicted, for purposes ofillustration and not limitation, as catches or protrusion(s) 2518,formed on a semi-rigid arm 2520 molded into body 2512, and extendinginto the channel. However, other mechanisms for reversibly or releasablylocking or fixing the plug 308 into a predetermined position in theanti-tamper adapter 2502 are contemplated by the disclosed subjectmatter. For instance, various embodiments employing similar reversiblyor releasably locking or fixing functions can include screws, springball and detent, and other means of reversibly or releasably locking orfixing plug 308 into a predetermined position in the anti-tamper adapter2502.

In addition, for various permanent, semi-permanent, or disposableembodiments of anti-tamper adapter 2502, catches or protrusion(s) 2518can be formed in a manner giving the catches or protrusion(s) 2518 lessresilience (e.g., via rigid structures, adhesives, etc.). In suchexemplary non-limiting embodiments, it can be appreciated that attemptsto remove plug 308 from anti-tamper adapter 2502 can result inpotentially irretrievable damage to one or more of the plug 308 or theanti-tamper adapter 2502. Thus, the various embodiments as describedherein are intended to encompass a wide range of variations suitable forparticular design considerations.

Referring again to FIG. 25, anti-tamper adapter 2502 can furthercomprise a plug release guard or release shroud 2522 located on the body2512 (e.g., a molded body, etc.) proximate to the front portion of thechannel. The plug release guard or release shroud 2522 can at leastpartially surround a plug release or release mechanism (not shown),e.g., resilient latch 210 or 312, of the plug 308. Thus, plug releaseguard or release shroud 2522 can inhibit or prevent access and/orinhibit or prevent actuation of the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206) when the plug 308 is inserted into the associatedoutlet (e.g., outlet 202 or 302), by for example, the close proximity ofthe plug release guard or release shroud 2522 to the surface of a panel(204 or 304) supporting the plug 308 attached outlet (e.g., outlet 202or 302). This close proximity can prevent normal access (e.g., without atool or key as described herein) to one or more sides of the plugrelease or release mechanism (e.g., resilient latch 210 or 312) of theplug 308 (or plug 208 of fiber optic cable 206).

Note from FIG. 25 that exemplary anti-tamper adapter 2502 lacks ahousing such as housing 724 as previously described. Instead, plugrelease guard or release shroud 2522 can be extended toward the frontportion of the channel in body 2512. Thus, as compared to anti-tamperadapter 700 having a plug release guard or release shroud 722 that canat least partially surround a plug release or release mechanism (notshown), e.g., resilient latch 210 or 312, of the plug 308, plug releaseguard or release shroud 2522 of anti-tamper adapter 2502 surroundssubstantially more of the plug release or release mechanism (not shown),e.g., resilient latch 210 or 312, of the plug 308. Moreover, plugrelease guard or release shroud 2522 can be adapted to comprise anaccess aperture between the body 2512 and the plug release guard orrelease shroud 2522 that can permit a removal tool or key (describedbelow) to be inserted and positioned proximate to the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 (orplug 208 of fiber optic cable 206), when the removal tool (describedbelow) is inserted into the cable anti-tamper adapter 2502. It can beunderstood that other arrangements or access apertures suitable forpermitting a removal tool (described below) to be positioned proximateto the plug release or release mechanism (e.g., resilient latch 210 or312) of the plug 308 can be contemplated upon consideration of thedisclosed subject matter, for example, as described above.

As can be seen in FIG. 25, anti-tamper adapter 2502 can further compriseone or more blocking mechanism(s) 2528 (e.g., blocking arm(s) orblocking tab(s)) adapted to inhibit or prevent normal actuation (e.g.,without a tool or key as described herein) of the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 (orplug 208 of fiber optic cable 206). For instance, anti-tamper adapter2502 can comprise one or more blocking mechanism(s) 2528 (e.g., blockingarm(s) or blocking tab(s)) located on one or more of plug release guardor release shroud 2522 and/or body 2512 (e.g., a molded body, etc.)proximate to the channel in body 2512. The position of the one or moreblocking mechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) inrelation to an inserted plug 308 can be determined such that uponinsertion of plug 308 (or plug 208 of fiber optic cable 206) into anexemplary anti-tamper adapter 2502, the one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) can providean impediment to normal actuation (e.g., without a tool or key asdescribed herein) of the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308.

For instance, by virtue of a close proximity between one or moreblocking mechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)),the plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308, and plug body 402 of plug 308, the one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) ofanti-tamper adapter 2502 can prevent normal actuation of the plugrelease or release mechanism (e.g., resilient latch 210 or 312) of theplug 308 (or plug 208 of fiber optic cable 206). As a further example,upon insertion of plug 308 into exemplary anti-tamper adapter 2502, oneor more blocking mechanism(s) 2528 (e.g., blocking arm(s) or blockingtab(s)) of anti-tamper adapter 2502 can be positioned in the crevice orvertex formed by the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 and plug body 402 of plug 308. Thus,to allow actuation of the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308, and thus allow removal of aplug 308 with an installed anti-tamper adapter 2502 from an outlet 302,the one or more blocking mechanism(s) 2528 (e.g., blocking arm(s) orblocking tab(s)) can first be repositioned out of crevice or vertexformed by the plug release or release mechanism (e.g., resilient latch210 or 312) of the plug 308 and plug body 402 of plug 308. As furtherdescribed below regarding FIGS. 27-33, an exemplary removal tool or key2602 can be adapted to reposition one or more blocking mechanism(s) 2528(e.g., blocking arm(s) or blocking tab(s)) for connecting anddisconnecting a connected RJ-type plug 308 employing embodiments ofanti-tamper adapter 2502.

As a result, various embodiments of the anti-tamper adapter 2502 canfacilitate cable tamper prevention (e.g., either inadvertent orintentional) of a plug 308 (or plug 208 of fiber optic cable 206) fittedwith an embodiment of anti-tamper adapter 2502 when the plug 308 (orplug 208 of fiber optic cable 206) is connected or inserted into anassociated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.). Thus, in various aspects, the disclosed subject matter providescable tamper prevention apparatuses (e.g., anti-tamper adapter 2502)that can advantageously provide cost-effective tamper prevention with orwithout the use of proprietary outlets or plugs, while offering ease andflexibility of use, and without excessive manpower requirements (e.g.,two party verification of connection during maintenance, rigorous accesscontrols, etc.). As additional advantages, the various embodiments canbe employed to complement reactive efforts to address tampering (e.g.,connection or enclosure based alarms) and can allow more efficient useof costly equipment rack space, for example, where mission criticalservice connection can be located in close proximity to less essentialservice connections.

In a further aspect, various embodiments of anti-tamper adapter 2502 canbe comprised of a rigid or semi-rigid material, such as a moldableplastic or polymer, in addition to more rigid materials such, forexample, as metals or ceramics. For instance, a molded plasticanti-tamper adapter 2502 can include one or more of a molded body 2512and/or a plug release guard or release shroud 2522. In yet anotheraspect, plug release guard or release shroud 2522, as well as othercomponents (e.g., 2516, 2518, etc.), can be molded integral to moldedbody 2512 or separately and subsequently attached or integrated asdesired. In a further aspect, the moldable plastic or polymer can beselected based on a color scheme according to an intended use of theanti-tamper adapter 2502 (e.g., a standardized color scheme), forexample, to signify mission critical service connections, etc.

FIG. 27 depicts a perspective view further illustrating aspects of anexemplary removal tool or key 2602 for connecting and disconnecting aconnected RJ-type plug 308 using embodiments of anti-tamper adapter2502. According to various embodiments, the disclosed subject matterprovides a removal tool or key 2602. According to an aspect, asdescribed above, removal tool or key 2602 can be comprised of a rigid orsemi-rigid material, such as a moldable plastic or polymer, in additionto more rigid materials such as metals or ceramics. For example, removaltool or key 2602 (e.g., a molded plastic removal tool or key 2602) caninclude one or more of an insertion end 2604 and an extraction end 2606that facilitates positioning or repositioning one or more of a plugrelease or release mechanism (e.g., resilient latch 210 or 312) of theplug 308 (or plug 208 of fiber optic cable 206), one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)), and so onwhen the removal tool or key 2602 is inserted into an anti-tamperadapter 2502 fitted to plug 308 as described above.

Note that FIG. 27 depicts a bottom view of removal tool or key 2602according to the orientation as depicted. Note further that removal toolor key 2602 is depicted as having an insertion end 2604 and anextraction end 2606. As used herein regarding ends of the removal toolor key 2602, the terms “insertion” and “extraction” refer to theoperation of inserting or connecting a plug 308 (or plug 208 of fiberoptic cable 206) employing an embodiment of anti-tamper adapter 2502into an associated outlet (e.g., outlet 302 or 202 for fiber optic cable206, etc.) and extracting or disconnecting the plug 308 employing anembodiment of anti-tamper adapter 2502, respectively. Recall that theone or more blocking mechanism(s) 2528 (e.g., blocking arm(s) orblocking tab(s)) of anti-tamper adapter 2502 can prevent normalactuation of the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206)when plug 308 is inserted into anti-tamper adapter 2502.

Thus, when plug 308 employing anti-tamper adapter 2502 is to be insertedor connected into an associated outlet (e.g., outlet 302 or 202 forfiber optic cable 206, etc.), the one or more blocking mechanism(s) 2528(e.g., blocking arm(s) or blocking tab(s)) can first be repositioned outof crevice or vertex formed by the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 and plug body 402 ofplug 308 by the insertion of the insertion end 2604 of removal tool orkey 2602 into anti-tamper adapter 2502. Note that the insertion end 2604can comprise one or more surfaces 2608 that can be adapted to engage,manipulate, or otherwise reposition the one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)), therebyallowing the plug release or release mechanism (e.g., resilient latch210 or 312) of the plug 308 to be depressed or repositioned as the plug308 is inserted or connected to an associated outlet (e.g., outlet 302or 202 for fiber optic cable 206, etc.).

Similarly, extraction end 2606 can comprise one or more surfaces 2610that can be adapted to engage, manipulate, or otherwise reposition theone or more blocking mechanism(s) 2528 (e.g., blocking arm(s) orblocking tab(s)) allowing the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 to be depressed orrepositioned as the plug 308 upon disconnection from an associatedoutlet (e.g., outlet 302 or 202 for fiber optic cable 206, etc.).Connection and disconnection (e.g., insertion and extraction,respectively) of a plug 308 are more fully described below regardingFIGS. 28-33.

According to further aspects, exemplary removal tool or key 2602 canfurther comprise a plug release region 2612 of extraction end 2606adapted to selectively manipulate the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206), for example, when the extraction end 2606 is insertedinto an anti-tamper adapter 2502 fitted to plug 308 as described above.Note that the configuration of the plug release region 2612 (e.g.,construction, composition, shape of plug release region 2612, locationof plug release region 2612 relative to one or more surfaces 2610) isadapted to first reposition any of the one or more blocking mechanism(s)2528 prior to selectively manipulating the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 as theextraction end 2606 is inserted into an anti-tamper adapter 2502 fittedto plug 308.

For instance, plug release region 2612 can comprise a ramped or invertedramp profile in a semi-rigid material as described herein, where theprofile can be selected and located relative to the one or more surfaces2610, such that repositioning of the one or more blocking mechanisms2528 (e.g., blocking arm(s) or blocking tab(s)) occurs prior to theprofile engaging and selectively manipulating the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308.Thus, insertion of extraction end 2606 in the direction indicated inFIG. 30 below (e.g., a direction orthogonal to the direction of normalinsertion of plug 308) would cause plug release region 2612 to engagethe plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308. As extraction end 2606 of removal tool or key 2602 isfurther inserted into anti-tamper adapter 2502 fitted to plug 308, theramped profile of plug release region 2612 is further pressed againstthe plug release or release mechanism (e.g., resilient latch 210 or 312)of the plug 308, the plug release mechanism is allowed to slide down theramp and towards plug 308 body 402. Note that the one or more blockingmechanism(s) 2528 would have been repositioned by the one or moresurfaces 2610 prior to selectively manipulating the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308 asthe extraction end 2606 is inserted into an anti-tamper adapter 2502fitted to plug 308.

In still other aspects, as described above, various embodiments ofremoval tool or key 2602 can be comprised of a rigid or semi-rigidmaterial, such as a moldable plastic or polymer, in addition to morerigid materials such as metals or ceramics. In a further aspect, themoldable plastic or polymer can be selected based on a color schemeaccording to an intended use of the removal tool or key 2602 (e.g., astandardized color scheme), for example, to signify mission criticalservice connections, etc. In yet other aspects of the disclosed subjectmatter, due to the complementary structures of anti-tamper adapter 2502and removal tool or key 2602, complementary variations in the shapes ofanti-tamper adapter 2502 body 2512, removal tool or key 2602 insertionend 2604, and/or extraction end 2606, and the like, can be exploited tofurther effect cable tamper prevention or control schemes as furtherdescribed above.

FIG. 28 illustrates an exploded view of an RJ-type plug 308 andexemplary embodiments of an anti-tamper adapter 2502 and removal tool orkey 2602 for connecting and disconnecting a connected RJ-type plug 308,where the removal tool or key 2602 for connecting and disconnecting aconnected RJ-type plug 308 is depicted with an insertion end 2604 of theremoval tool or key 2602 adapted to be inserted into an exemplaryanti-tamper adapter 2502. FIG. 29 depicts cross-sectional views 2900 forexemplary embodiments of an anti-tamper adapter 2502 suitable for usewith RJ-type plugs 308, where the insertion end 2604 of the removal toolor key 2602 is illustrated at various positions with respect to aspectsof an exemplary anti-tamper adapter 2502. For instance, in the top sideview 2902, the one or more surfaces 2608 of insertion end 2604 can beobserved to be adapted to engage the one or more blocking mechanism(s)2528 (e.g., blocking arm(s) or blocking tab(s)) of anti-tamper adapter2502 as described above. As removal tool or key 2602 is inserted intoanti-tamper adapter 2502 fitted to plug 308 in top side view 2904 andright-side section view 2906, the one or more surfaces 2608 of insertionend 2604 can be observed to engage and reposition (e.g., to anon-blocking position) the one or more blocking mechanism(s) 2528 (e.g.,blocking arm(s) or blocking tab(s)) of anti-tamper adapter 2502.

FIG. 30 depicts 3000 further cross-sectional views (3002, 3004) forexemplary embodiments of an anti-tamper adapter 2502, where an assemblycomprising a removal tool or key 2602 and an exemplary anti-tamperadapter 2502 are depicted at various positions with respect to anexemplary outlet 302. For instance, whereas views 2904 and 2906 of FIG.29 depicted anti-tamper adapter 2502 fitted to plug 308 with the one ormore blocking mechanism(s) 2528 (e.g., blocking arm(s) or blockingtab(s)) repositioned in anticipation of connecting plug 308 to outlet302, views 3002 depict the plug 308 employing anti-tamper adapter 2502connected to outlet 302 (view 3002) and with removal tool or key 2602removed (view 3004) thereby allowing the one or more blockingmechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) to bepositioned to inhibit or prevent normal actuation (e.g., without a toolor key as described herein) of the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206).

FIG. 31 illustrates an exploded view of an RJ-type plug 308 andexemplary embodiments of an anti-tamper adapter 2502 and removal tool orkey 2602 for connecting and disconnecting a connected RJ-type plug 308,where the removal tool or key for connecting and disconnecting aconnected RJ-type plug 308 is depicted with an extraction end 2606 ofthe removal tool or key 2602 adapted to be inserted into an exemplaryanti-tamper adapter 2502. FIG. 32 depicts cross-sectional views 3200 forexemplary embodiments of an anti-tamper adapter 2502 suitable for usewith RJ-type plugs 308, where the extraction end 2606 of the removaltool or key 2602 is illustrated at various positions with respect toaspects of an exemplary anti-tamper adapter 2502 fitted to plug 308 andconnected to an exemplary outlet 302. For instance, in the top side view3202, the one or more surfaces 2610 of extraction end 2606 can beobserved to be adapted to engage the one or more blocking mechanism(s)2528 (e.g., blocking arm(s) or blocking tab(s)) of anti-tamper adapter2502 as described above. As removal tool or key 2602 is inserted intoanti-tamper adapter 2502 fitted to plug 308 in top side view 3204, theone or more surfaces 2610 of extraction end 2604 can be observed toengage and reposition (e.g., to a non-blocking position) the one or moreblocking mechanism(s) 2528 (e.g., blocking arm(s) or blocking tab(s)) ofanti-tamper adapter 2502. As can be seen in FIG. 32, plug release region2612 can comprise a ramped or an inverted ramp profile, where theprofile can be selected and located relative to the one or more surfaces2610, such that repositioning of the one or more blocking mechanism(s)2528 (e.g., blocking arm(s) or blocking tab(s)) occurs prior to theprofile engaging and selectively manipulating the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308.

FIG. 33 depicts 3300 cross-sectional views (3302, 3304) for exemplaryembodiments of an anti-tamper adapter 2502, where aspects of a removaltool or key 2602 are depicted at various extents of insertion withrespect to an exemplary anti-tamper adapter 2502 connected to anexemplary outlet 302. For instance, whereas views 3202 and 3204 of FIG.32 depicted anti-tamper adapter 2502 fitted to plug 308 with the one ormore blocking mechanism(s) 2528 (e.g., blocking arm(s) or blockingtab(s)) positioned to inhibit or prevent normal actuation (e.g., withouta tool or key as described herein) of the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 (or plug208 of fiber optic cable 206), views 3302 and 3304 depict plug 308employing anti-tamper adapter 2502 connected to outlet 302 (view 3002)and with removal tool or key 2602 extraction end 2606 inserted therebyallowing the one or more blocking mechanism(s) 2528 (e.g., blockingarm(s) or blocking tab(s)) to be repositioned (e.g., to a non-blockingposition) and allowing normal actuation (e.g., with removal tool or key2602) of the plug release or release mechanism (e.g., resilient latch210 or 312) of the plug 308 (or plug 208 of fiber optic cable 206).

It can be understood various modifications can be made to the disclosedprevention or control schemes as a result of the flexibility afforded byvarious non-limiting implementations as described herein. For instance,for the purpose of illustration and not limitation, FIGS. 34-36demonstrate further non-limiting aspects of exemplary anti-tamperadapter. For example, FIG. 34 depicts perspective views 3400 of furthernon-limiting embodiments of a removal tool or key 3402 for connectingand disconnecting a connected RJ-type plug 308 using embodiments ofanti-tamper adapter (e.g., anti-tamper adapter 2502, anti-tamper adapter3502 as further described below, etc.).

As a non-limiting example, exemplary removal tool or key 3402 cancomprise a hole 3404 adapted to allow connection of the removal tool orkey 3402 to a keychain, lanyard, and so on. As further described aboveregarding FIG. 27, removal tool or key 3402 can be comprised of a rigidor semi-rigid material, such as a moldable plastic or polymer, inaddition to more rigid materials such as metals or ceramics. As afurther example, removal tool or key 3402 (e.g., a molded plasticremoval tool or key 3402) can include extraction end 3406 thatfacilitates positioning or repositioning one or more of a plug releaseor release mechanism (e.g., resilient latch 210 or 312) of the plug 308(or plug 208 of fiber optic cable 206), one or more blockingmechanism(s) (e.g., one or more blocking mechanism(s) 2528, blockingarm(s) or blocking tab(s)), and so on when the removal tool or key 3402is inserted into an anti-tamper adapter 2502 (or anti-tamper adapter3502 as further described below, etc.) fitted to plug 308 as describedabove.

Note that FIG. 27 depicts one or more of an insertion end 2604 and anextraction end 2606 that facilitates positioning or repositioning one ormore of a plug release or release mechanism (e.g., resilient latch 210or 312) of the plug 308 (or plug 208 of fiber optic cable 206), one ormore blocking mechanism(s) 2528 (e.g., blocking arm(s) or blockingtab(s)), and so on when the removal tool or key 2602 is inserted into ananti-tamper adapter 2502 fitted to plug 308 as described above. However,as can be understood from FIG. 34, removal tool or key 3402 extractionend 3406 can be adapted to provide the disparate functions provided bythe insertion end 2604 and extraction end 2606 of removal tool or key2602 in FIG. 27.

As a further illustration, note that removal tool or key 3402 extractionend 3406 can comprise one or more surfaces 3410 that can be adapted toengage, manipulate, or otherwise reposition the one or more blockingmechanism(s) 2528 (e.g., one or more blocking mechanism(s) 2528,blocking arm(s) or blocking tab(s)) allowing the plug release or releasemechanism (e.g., resilient latch 210 or 312) of the plug 308 to bedepressed or repositioned as the plug 308 upon disconnection from anassociated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.). However, note further that the one or more surfaces 3410(likewise for one or more surfaces 2610) can allow connection anddisconnection (e.g., insertion and extraction, respectively) of a plug308 as more fully described above regarding FIGS. 28-33.

According to further aspects, exemplary removal tool or key 3402 canfurther comprise a plug release region 3412 of extraction end 3406adapted to selectively manipulate the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 (or plug 208 of fiberoptic cable 206), for example, when the extraction end 3406 is insertedinto an anti-tamper adapter (e.g., anti-tamper adapter 2502, anti-tamperadapter 3502 as further described below, etc.) fitted to plug 308 asdescribed above. Note that the configuration of the plug release region3412 (e.g., construction, composition, shape of plug release region3412, location of plug release region 3412 relative to one or moresurfaces 3410) is adapted to first reposition any of the one or moreblocking mechanism(s) (e.g., one or more blocking mechanism(s) 2528)prior to selectively manipulating the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308 as the extraction end2606 is inserted into an anti-tamper adapter (e.g., anti-tamper adapter2502, anti-tamper adapter 3502 as further described below, etc.) fittedto plug 308.

For instance, plug release region 3412 can comprise a ramped or invertedramp profile in a semi-rigid material as described herein, where theprofile can be selected and located relative to the one or more surfaces3410, such that repositioning of the one or more blocking mechanisms(e.g., one or more blocking mechanisms 2528, blocking arm(s) or blockingtab(s)) occurs prior to the profile engaging and selectivelymanipulating the plug release or release mechanism (e.g., resilientlatch 210 or 312) of the plug 308. Thus, insertion of extraction end3406 in the direction indicated in FIG. 30 above (e.g., a directionorthogonal to the direction of normal insertion of plug 308) would causeplug release region 3412 to engage the plug release or release mechanism(e.g., resilient latch 210 or 312) of the plug 308.

As further described above regarding FIG. 27, as extraction end 3406 ofremoval tool or key 3402 is further inserted into anti-tamper adapter(e.g., anti-tamper adapter 2502, anti-tamper adapter 3502 as furtherdescribed below, etc.) fitted to plug 308, the ramped profile of plugrelease region 3412 is further pressed against the plug release orrelease mechanism (e.g., resilient latch 210 or 312) of the plug 308,the plug release mechanism is allowed to slide down the ramp and towardsplug 308 body 402. Note that the one or more blocking mechanism(s) 2528would have been repositioned by the one or more surfaces 3410 prior toselectively manipulating the plug release or release mechanism (e.g.,resilient latch 210 or 312) of the plug 308 as the extraction end 3406is inserted into an anti-tamper adapter (e.g., anti-tamper adapter 2502,anti-tamper adapter 3502 as further described below, etc.) fitted toplug 308.

Referring again to FIG. 34, it can be appreciated that various aspectsregarding other exemplary implementations disclosed herein can beincluded in exemplary removal tool or key (e.g., removal tool or key3402, 2602, 1100, etc.) and vice versa. For instance, exemplary removaltool or key (e.g., removal tool or key 3402, 2602, 1100, etc.) canfurther comprise one or more annotations 3414 and 3416 depictinginformation about the exemplary removal tool or key (e.g., removal toolor key 3402, 2602, 1100, etc.), such as for example, manufacturer names,instructions for use, etc.

In a further aspect, exemplary removal tool or key (e.g., removal toolor key 3402, 2602, 1100, etc.) can comprise one or more inletted orrecessed portions 3418, 3420, and so on to enhance compatibility, easeof use, ergonomics, etc. For instance, exemplary removal tool or key(e.g., removal tool or key 3402, 2602, 1100, etc.) can comprise one ormore inletted or recessed portions 3418 that can accept a portion of aspecific type of cable (e.g., twisted pair, coaxial, fiber, etc.)intended for use with the anti-tamper adapter exemplary removal tool orkey (e.g., removal tool or key 3402, 2602, 1100, etc.) to providealignment of exemplary removal tool or key (e.g., removal tool or key3402, 2602, 1100, etc.) with its associated anti-tamper adapter. In yetanother aspect, exemplary removal tool or key (e.g., removal tool or key3402, 2602, 1100, etc.) can comprise one or more inletted or recessedportions 3420 that can facilitate use with a specific (e.g., proprietaryor otherwise) implementation of plug, for example, as furtherdemonstrated below regarding FIG. 35.

FIG. 35 depicts a cross-sectional view 3500 of exemplary embodiments ofan anti-tamper adapter 3502, where aspects of removal tool or key 3402are further depicted with respect to exemplary anti-tamper adapter 3502fitted to an RJ-type plug 308. For the purposes of illustration and notlimitation, exemplary anti-tamper adapter 3502 can comprise features andallow functions similar to exemplary anti-tamper adapter 2502 asdescribed above regarding FIG. 25. Thus, similar reference characters asfor anti-tamper adapter 2502 are used in describing anti-tamper adapter3502. As described above, exemplary removal tool or key (e.g., removaltool or key 3402, 2602, 1100, etc.) can comprise one or more inletted orrecessed portions 3420 as depicted in detail 3504 that can facilitateuse of removal tool or key (e.g., removal tool or key 3402, 2602, 1100,etc.) with a specific (e.g., proprietary or otherwise) implementation ofplug, for example, RJ-type plug 308. For instance, RJ-type plug 308 cancomprise slim-line boots suitable for high-density applications, wherethe one or more inletted or recessed portions 3420 can facilitate use ofand anti-tamper adapter (e.g., anti-tamper adapter 2502, anti-tamperadapter 3502, etc.) fitted to a specific implementation of plug 308.

FIG. 36 illustrates further aspects of exemplary embodiments of ananti-tamper adapter 3502, where anti-tamper adapter 3502 is depicted inthe context of a plug 308 connected to an exemplary outlet 302. Invarious implementations, outlet 302 can comprise one or more statuslights 3602 associated with outlet 302. To that end, exemplarynon-limiting implementations of anti-tamper adapter (e.g., anti-tamperadapter 2502, anti-tamper adapter 3502, etc.) can comprise one or moreinletted or recessed portions (e.g., holes, channels, cutouts, windows,doors, and the like, fixed or otherwise, etc.) in body 2512 adapted toallow observation of one or more status lights 3602 associated withoutlet 302 when a plug 308 employing exemplary anti-tamper adapter(e.g., anti-tamper adapter 2502, anti-tamper adapter 3502, etc.). Asdescribed above, various other modifications can be implemented to oneor more of anti-tamper adapters, removal tool or keys, and so on withoutdeparting from the scope of the disclosed subject matter.

Accordingly, in various embodiments, the disclosed subject matterprovides cable tamper prevention systems, anti-tamper adapters, andcable tamper prevention apparatuses as described above. For instance,exemplary cable tamper prevention systems can comprise a molded body(e.g., body 712, 2404, 2512, etc.) adapted to accept a standardcommunications plug (e.g., a standard communications plug such as afiber optic plug, and RJ type plug, or communications cable plug, audioplug, video plug, etc.), such as plug 308 (or plug 208 of fiber opticcable 206, etc.). For example, molded body (e.g., body 712, 2404, 2512,etc.) can be configured to accept a standard communications plug, suchas plug 308 (or plug 208 of fiber optic cable 206, etc.), at a rearportion of the molded body (e.g., body 712, 2404, 2512, etc.).

In addition, the molded body can comprise one or more protrusion(s)(e.g., one or more catches or protrusion(s) 718 (2518), resilient orotherwise, combinations thereof and so on) that can be adapted to engagea recess (e.g., one or more recesses 404 in plug 308) in the standardcommunications plug to reversibly fix a position of the standardcommunications plug in the molded body (e.g., body 712, 2404, 2512,etc.) as the standard communications plug is inserted into the moldedbody in a longitudinal direction along an axis of the molded body. As afurther example, the molded body (e.g., body 712, 2404, 2512, etc.) canbe configured to reversibly fix the position of the standardcommunications plug as it is positioned toward a front portion of themolded body. In yet other exemplary implementations, the disclosedsystems can comprise one or more protrusion(s) (e.g., one or moreshoulder(s) or protrusion(s) 716 (2516)) on the molded body (e.g., body712, 2404, 2512, etc.) that can be adapted to engage a shoulder (e.g.,shoulder 406 of plug 308, etc.) of the standard communications plug tofurther fix the position of the standard communications plug in themolded body.

Further non-limiting embodiments of exemplary cable tamper preventionsystems can include a release shroud (e.g., plug release guard orrelease shroud 722, 2402, 2522, etc.) on the molded body (e.g., body712, 2404, 2512, etc.). According to an aspect, the release shroud canbe adapted to at least partially shroud a release mechanism (e.g., plugrelease or release mechanism such as resilient latch 210, 312, and soon) of the standard communications plug 308 (or plug 208 of fiber opticcable 206, etc.) to inhibit actuation of the release mechanism when thestandard communications plug is attached to an associated outlet (e.g.,outlet 302 or 202 for fiber optic cable 206, etc.). According to stillfurther aspects, the release shroud can comprise an access aperture(e.g., access aperture 2406, etc.) adapted to permit insertion of aremoval tool into the release shroud allowing the removal tool toactuate the release mechanism (e.g., plug release or release mechanismsuch as resilient latch 210, 312, and so on).

In other non-limiting embodiments of exemplary cable tamper preventionsystems, the systems can further comprise a housing (e.g., housing 724)on the molded body (e.g., body 712, etc.) that can be adapted to atleast partially surround the release shroud (e.g., plug release guard orrelease shroud 722, etc.). In addition, the housing (e.g., housing 724)can further shroud the release mechanism (e.g., plug release or releasemechanism such as resilient latch 210, 312, and so on) to preventactuation of the release mechanism when the standard communications plug(e.g., plug 308 or plug 208 of fiber optic cable 206, etc.) is attachedto an associated outlet (e.g., outlet 302 or 202 for fiber optic cable206, etc.).

In yet other exemplary implementations, the housing (e.g., housing 724)and release shroud (e.g., plug release guard or release shroud 722,etc.) can be arranged to permit insertion (e.g., via an access aperture726 of front and rear end views 708 and 710, respectively, between thehousing 724 and the plug release guard or release shroud 722) of a key(e.g., removal tool or key 1100, 2602, etc.) in proximity to the releasemechanism (e.g., plug release or release mechanism such as resilientlatch 210, 312, and so on) for selective manipulation of the releasemechanism when the key is actuated.

In yet other exemplary implementations, cable tamper prevention systemscan comprise one or more blocking mechanism(s) 2528 (e.g., blockingarm(s) or blocking tab(s)) located proximate the release shroud andadapted to inhibit actuation of the release mechanism (e.g., plugrelease or release mechanism such as resilient latch 210, 312, and soon) when the standard communications plug 308 (or plug 208 of fiberoptic cable 206, etc.) is inserted into the molded body (e.g., body 712,2404, 2512, etc.).

As a further example, the disclosed subject matter, in various aspects,provides exemplary non-limiting cable anti-tamper adapters (e.g.,anti-tamper adapter 700, 2302, 2400, 2502, 3502, etc.). For instance, inan aspect, exemplary cable anti-tamper adapters can comprise a body(e.g., body 712, 2404, 2512, etc.) having a channel that accepts a plug(e.g., a standard communications plug such as a fiber optic plug, and RJtype plug, or communications cable plug, audio plug, video plug, etc.),such as plug 308 (or plug 208 of fiber optic cable 206, etc.). In afurther aspect, the channel can comprise a rear portion and a frontportion, in which the rear portion can be sized to allow the plug (e.g.,plug 308) to pass into the body (e.g., body 712, 2404, 2512, etc.) in adirection coincident with a direction of normal insertion of the pluginto an associated outlet (e.g., outlet 302 or 202 for fiber optic cable206, etc.), as described above regarding FIGS. 7, 16, 25, 34, etc.

In addition, the channel can include one or more shoulder(s) (e.g., oneor more shoulder(s) or protrusion(s) 716 (2516)) in the channel locatedproximate the front portion that can limit travel of plug (e.g., plug308) in the direction coincident with the direction of normal insertionas further described above. In further aspects of exemplary anti-tamperadapters (e.g., anti-tamper adapter 700, 2302, 2400, etc.), theanti-tamper adapters can comprise one or more catches (e.g., one or morecatches or protrusion(s) 718 (2518), resilient or otherwise,combinations thereof and so on) in the channel. According to anotheraspect, the one or more catches can reversibly engage one or morerecesses (e.g., one or more recesses 404 in plug 308) in the plug.According to other aspects, the one or more catches can limit plugtravel in the direction opposite the direction of normal insertion asdescribed above, for example, regarding FIGS. 7 16, 25, 34, etc.

In still further non-limiting implementations of anti-tamper adapters(e.g., anti-tamper adapter 700, 2302, 2400, 2502, 3502, etc.), theanti-tamper adapters can comprise a plug release guard (e.g., plugrelease guard or release shroud 722, 2402, 2522, etc.) located on thebody proximate to the front portion of the channel. According to variousembodiments, the plug release guard can at least partially surround theplug release (e.g., plug release or release mechanism such as resilientlatch 210, 312, and so on) of the plug 308 (or plug 208 of fiber opticcable 206, etc.) when the plug is inserted into the associated outlet(e.g., outlet 302 or 202 for fiber optic cable 206, etc.). In furtherembodiments, the plug release guard can inhibit actuation of the plugrelease when the plug is inserted into the associated outlet.

In yet other exemplary embodiments, plug release guard (e.g., plugrelease guard or release shroud 722, 2402, 2522, etc.) can extendproximate to a plane defined by a panel (e.g., panel 204, 304, etc.)containing the associated outlet (e.g., outlet 302 or 202 for fiberoptic cable 206, etc.) when the plug is inserted into the associatedoutlet. By extending to such a proximity, the plug release guard canprohibit actuation of the plug release (e.g., plug release or releasemechanism such as resilient latch 210, 312, and so on). Moreover, in afurther aspect of anti-tamper adapters (e.g., anti-tamper adapter 2302,2400, 2502, 3502, etc.) the plug release guard (e.g., plug release guardor release shroud 722, 2402, 2522, etc.) can include an access aperture(e.g., access aperture 726, 2406, etc.) that can permit insertion of akey (e.g., removal tool or key) in proximity to the plug release (e.g.,plug release or release mechanism such as resilient latch 210, 312, andso on) for selective manipulation of the plug release when the key isactuated as described above, for example, regarding FIG. 24.

Thus, in an aspect of exemplary anti-tamper adapters (e.g., anti-tamperadapter 700, 2302, 2406, etc.), a key can comprise an arm that permits aplug release region of the key (e.g., a plug release arm 1114 and a plugrelease region 1116 of the removal tool or key 1100) to be placed inproximity to the plug release (e.g., plug release or release mechanismsuch as resilient latch 210, 312, and so on) when the key is insertedinto the access aperture. According to various embodiments, the arm canpermit the plug release region to selectively manipulate the plugrelease when the arm is manipulated in a direction orthogonal to thedirection of normal insertion as further described above, for example,regarding FIGS. 11, 23, and 24.

In addition, other exemplary embodiments of anti-tamper adapters (e.g.,anti-tamper adapter 700, 2302, etc.) can include a housing (e.g.,housing 724) on the body (e.g., body 712, etc.). The housing, accordingto an aspect, can at least partially surround the plug release guard(e.g., plug release guard or release shroud 722, etc.). According to afurther aspect, the housing can be positioned relative to the plugrelease guard to permit a removal tool (e.g., removal tool or key 1100)to be positioned proximate to the plug release (e.g., plug release orrelease mechanism such as resilient latch 210, 312, and so on) when theremoval tool is inserted into the cable anti-tamper adapter. Forexample, the removal tool or key 1100, according to an aspect cancomprise a tool body (e.g., body 1112) and a plug release extension(e.g., collectively a plug release arm 1114 and a plug release region1116 of the removal tool or key 1100). In a further aspect, the plugrelease extension can actuate the plug release when the plug releaseextension is manipulated in a direction orthogonal to the direction ofnormal insertion as further described above, for example, regardingFIGS. 7 and 16, etc.

In still other non-limiting implementations, cable anti-tamper adapterscan comprise one or more blocking tab(s) 2528 (e.g., blocking arms ormechanisms) located proximate the release guard 2522 and adapted toinhibit actuation of the plug release (e.g., plug release or releasemechanism such as resilient latch 210, 312, and so on) when the standardcommunications plug 308 (or plug 208 of fiber optic cable 206, etc.) isinserted into the body (e.g., body 712, 2404, 2502, 3502, etc.). Inaddition, according to a further aspect, a key 2602 for selectivemanipulation of the plug release can comprise at least one surface(e.g., one of surfaces 2608, one of surfaces 2610, etc.) adapted toreposition the at least one blocking tab to allow selective manipulationof the plug release by a second surface (e.g., surface or profile 2612,etc.) adapted to engage and selectively manipulate the plug release. Inyet other implementations, a key 3402 for selective manipulation of theplug release can comprise at least one surface (e.g., one of surfaces3410, etc.) adapted to reposition the at least one blocking tab to allowselective manipulation of the plug release by a second surface (e.g.,surface or profile 3412, etc.) adapted to engage and selectivelymanipulate the plug release.

As yet another example, an exemplary non-limiting cable tamperprevention apparatus, according to aspects of the disclosed subjectmatter, can comprise an anti-tamper means (e.g., anti-tamper adapter700, 2302, 2400, 2502, 3502, etc.) installable on an existing plug(e.g., an existing standard communications plug such as a fiber opticplug, and RJ type plug, or communications cable plug, audio plug, videoplug, etc.), such as plug 308 (or plug 208), of an associated cable(e.g., cable 306, fiber optic cable 206, etc.). In a further aspect, theanti-tamper means can be installable on an existing plug withoutrequiring re-termination (e.g., cutting off the old plug andreinstalling a new plug on the cable) of the associated cable.

According to another aspect, the anti-tamper means can be configured toallow passage of a removal tool (e.g., removal tool or key 1100, 2602,3402, etc.) for manipulation of the release mechanism (e.g., resilientlatch 210 or 312) on the existing plug, such as plug 308 (or plug 208 offiber optic cable 206, etc.). For instance, the removal tool forremoving the existing plug can be further configured to manipulate therelease mechanism on the existing plug by applying an external force(e.g., manual manipulation by a user, technician, etc.) to the removaltool in a direction orthogonal to the direction of normal insertion ofthe existing plug as further described above regarding, for example,FIGS. 7, 16, 24, etc. In yet another aspect, the anti-tamper means canbe further configured to allow passage of a removal tool (e.g., removaltool or key 2602, 3402, etc.) for manipulation of the release mechanismon the existing plug and for repositioning one or more blocking tab(s)2528 (e.g., blocking arm(s), blocking mechanisms(s), etc.) adapted toinhibit actuation of the release mechanism.

In further aspects, an exemplary cable tamper prevention apparatus cancomprise a locking means for fixing a longitudinal position of theexisting plug within the anti-tamper means. For example, as describedabove regarding FIGS. 7, 16, 23, 24, etc., one or more catches orprotrusion(s) 718, resilient or otherwise, combinations thereof, and soon) can engage a recess (e.g., one or more recesses 404 in plug 308) inthe existing plug to fix (e.g., reversibly or otherwise) a position ofthe standard communications plug in the molded body (e.g., body 712,2404, etc.). In addition, as further described above, one or moreprotrusion(s) (e.g., one or more shoulder(s) or protrusion(s) 716) onthe molded body (e.g., body 712, 2404, etc.) can engage a shoulder(e.g., shoulder 406 of plug 308, etc.) of the existing plug to furtherfix the position of the standard existing plug in the molded body.

Thus, in cooperation with the one or more shoulder(s) or protrusion(s)716, or standing alone with the one or more recesses 404 of the existingplug, the one or more catches or protrusion(s) 718 can lock or fix(e.g., reversibly, releasably, or otherwise) the existing plug into apredetermined position (e.g., in a predetermined longitudinal positions)within the anti-tamper means (e.g., anti-tamper adapter 700, 2302, 2400,etc.). In addition, the anti-tamper means can be further configured tobe installed on the existing plug by inserting a connection portion ofthe existing plug, through a rear portion of the anti-tamper means, andin a direction coincident with a direction of normal insertion of theexisting plug as further described above regarding FIGS. 7, 16, 24, etc.

Accordingly, in further non-limiting implementations of a cable tamperprevention apparatus, the apparatus can comprise a means for preventingunaided manipulation of a release mechanism on the existing plug. Asdescribed above, regarding for example, FIGS. 7, 11, 16, 23, 24, etc.,means for preventing unaided manipulation of a release mechanism on theexisting plug can comprise any of a plug release guard or release shroud722 or 2402, a housing 724, portions or combinations thereof, and so on.

In yet other exemplary implementations, cable tamper prevention systemscan comprise a molded body (e.g., body 2512, etc.) adapted to accept astandard communications plug (e.g., a standard communications plug suchas a fiber optic plug, and RJ type plug, or communications cable plug,audio plug, video plug, etc.), such as plug 308 (or plug 208 of fiberoptic cable 206, etc.). For example, molded body (e.g., body 2512, etc.)can be configured to accept a standard communications plug, such as plug308 (or plug 208 of fiber optic cable 206, etc.), at a rear portion ofthe molded body (e.g., body 2512, etc.).

In addition, the molded body can comprise one or more protrusion(s)(e.g., one or more catches or protrusion(s) 2518, resilient orotherwise, combinations thereof and so on) that can be adapted to engagea recess (e.g., one or more recesses 404 in plug 308) in the standardcommunications plug to reversibly fix a position of the standardcommunications plug in the molded body (e.g., body 2512, etc.) as thestandard communications plug is inserted into the molded body in alongitudinal direction along an axis of the molded body. As a furtherexample, the molded body (e.g., body 2512, etc.) can be configured toreversibly fix the position of the standard communications plug as it ispositioned toward a front portion of the molded body. In yet otherexemplary implementations, the disclosed systems can comprise one ormore protrusion(s) (e.g., one or more shoulder(s) or protrusion(s) 2516)on the molded body (e.g., body 2512, etc.) that can be adapted to engagea shoulder (e.g., shoulder 406 of plug 308, etc.) of the standardcommunications plug to further fix the position of the standardcommunications plug in the molded body.

Further non-limiting embodiments of exemplary cable tamper preventionsystems can include a release shroud (e.g., plug release guard orrelease shroud 2522, etc.) on the molded body (e.g., body 2512, etc.).According to an aspect, the release shroud can be adapted to at leastpartially shroud a release mechanism (e.g., plug release or releasemechanism such as resilient latch 210, 312, and so on) of the standardcommunications plug 308 (or plug 208 of fiber optic cable 206, etc.) toinhibit actuation of the release mechanism when the standardcommunications plug is attached to an associated outlet (e.g., outlet302 or 202 for fiber optic cable 206, etc.). According to still furtheraspects, the release shroud can comprise an access aperture (e.g.,access aperture 2406, etc.) adapted to permit insertion of a removaltool into the release shroud allowing the removal tool to actuate therelease mechanism (e.g., plug release or release mechanism such asresilient latch 210, 312, and so on).

In yet other exemplary implementations, release shroud (e.g., plugrelease guard or release shroud 2522, etc.) can be arranged to permitinsertion of a removal tool (e.g., removal tool or key 2602, etc.) inproximity to the release mechanism (e.g., plug release or releasemechanism such as resilient latch 210, 312, and so on) for selectivemanipulation of the release mechanism.

In yet other exemplary implementations, cable tamper prevention systemscan comprise one or more blocking mechanism(s) 2528 (e.g., blockingarm(s) or blocking tab(s)) located proximate the release shroud andadapted to inhibit actuation of the release mechanism (e.g., plugrelease or release mechanism such as resilient latch 210, 312, and soon) when the standard communications plug 308 (or plug 208 of fiberoptic cable 206, etc.) is inserted into the molded body (e.g., body 712,2404, 2502, etc.).

In view of the structures and devices described supra, methodologiesthat can be implemented in accordance with the disclosed subject matterwill be better appreciated with reference to the flowchart of FIG. 37.While, for purposes of simplicity of explanation, the methodologies areshown and described as a series of blocks, it is to be understood andappreciated that such illustrations or corresponding descriptions arenot limited by the order of the blocks, as some blocks may occur indifferent orders and/or concurrently with other blocks from what isdepicted and described herein. Any non-sequential, or branched, flowillustrated via a flowchart should be understood to indicate thatvarious other branches, flow paths, and orders of the blocks, can beimplemented which achieve the same or a similar result. Moreover, notall illustrated blocks may be required to implement the methodologiesdescribed hereinafter.

Exemplary Methodologies for Cable Tamper Prevention

FIG. 37 depicts a block diagram demonstrating methodologies 3700 forcable tamper prevention in accordance with aspects of the disclosedsubject matter. For instance, methodologies 3700 can comprise, at 3702,inserting a plug 308 (e.g., a standard communications plug such as afiber optic plug, and RJ type plug, or communications cable plug, audioplug, video plug, etc.) into an anti-tamper adapter (e.g., anti-tamperadapter 700, 2302, 2400, etc.) in a direction coincident with adirection of normal insertion of the plug until the plug 308 extendsfrom the anti-tamper adapter (e.g., anti-tamper adapter 700, 2300, 2402,etc.). For example, at 3702, a plug 308 can be inserted into a rearportion of an anti-tamper adapter (e.g., anti-tamper adapter 700, 2302,2400, etc.) until the plug 308 extends from a front portion of theanti-tamper adapter (e.g., anti-tamper adapter 700, 2300, 2402, etc.).

In addition, methodologies 3700 can include locking (e.g., reversibly,releasably, or otherwise) the plug 308 into a predetermined position(e.g., as determined by one or more shoulder(s) or protrusion(s) 716,one or more catches or protrusion(s) 718, resilient or otherwise,combinations thereof and so on) in the anti-tamper adapter (e.g.,anti-tamper adapter 700, 2302, 2400, etc.) at 3704. Thus, at 3704,methodologies 3700 can include aligning a portion (e.g., a plug releaseguard or release shroud 722 or 2402, a housing 724, portions orcombinations thereof, and so on) of the anti-tamper adapter thatinhibits actuation of a release mechanism (e.g., resilient latch 210 or312) associated with the plug 308 (or plug 208 of fiber optic cable 206,etc.).

Methodologies 3700 can further include connecting the plug 308 to anassociated outlet (e.g., outlet 302 or 202 for fiber optic cable 206,etc.) at 3706. In further non-limiting embodiments of methodologies3700, at 3708, a removal tool or key (e.g. a connector removal tool orkey 1100, etc.) can be inserted into the anti-tamper adapter (e.g.,anti-tamper adapter 700, 2302, 2400, etc.). For instance, at 3708,methodologies 3700 can further include inserting the removal tool (e.g.,removal tool or key 1100, etc.) proximate to the rear portion of ananti-tamper adapter (e.g. removal tool or key 1100 into anti-tamperadapter 700, etc.). In yet other non-limiting embodiments ofmethodologies 3700, the removal tool (e.g. a removal tool or key) can beinserted on a side of the anti-tamper adapter (e.g., anti-tamper adapter2302, 2400, etc.).

Accordingly, at 3710, a portion of the removal tool (e.g., a plugrelease arm 1114 of the removal tool or key 1100) can be manipulated ina direction orthogonal to the direction of normal insertion of the plug308 to actuate the release mechanism plug release or release mechanism(e.g., resilient latch 210 or 312, etc.) associated with plug 308 (orplug 208 of fiber optic cable 206). In addition, methodologies 3700 canfurther include disconnecting the plug 308 (or plug 208 of fiber opticcable 206, etc.) from the associated outlet (e.g., outlet 302 or 202 forfiber optic cable 206, etc.) at 3712.

In still other exemplary implementations of methodologies 3700,connecting the plug 308 to an associated outlet (e.g., outlet 302 or 202for fiber optic cable 206, etc.) at 3706 can alternately includeinserting a first portion (e.g., one or more surfaces 2608, one or moresurfaces 2610, one or more surfaces 3410, etc.) of the removal tool(e.g., removal tool or key 2602, 3402, etc.) thereby repositioning oneor more blocking mechanism(s) (e.g., blocking arm(s), blocking tab(s),etc.) located proximate to, and inhibiting actuation of, the releasemechanism (e.g., resilient latch 210 or 312, etc.) associated with plug308 (or plug 208 of fiber optic cable 206). In yet other non-limitingembodiments, methodologies 3700 for cable tamper prevention can includeactuating the release mechanism (e.g., resilient latch 210 or 312, etc.)with a second portion (e.g., surface 2612, surface 3412, etc.) of theremoval tool (e.g., removal tool or key 2602, removal tool or key 3402,etc.) associated with the plug (e.g., surface 2612, surface 3412, etc.)and disconnecting the plug 308 (or plug 208 of fiber optic cable 206,etc.) from the associated outlet (e.g., outlet 302 or 202 for fiberoptic cable 206, etc.) at 3712.

In further non-limiting implementations of methodologies 3700, the plug308 (e.g., a standard communications plug such as a fiber optic plug,and RJ type plug, or communications cable plug, audio plug, video plug,etc.) can be unlocked (not shown) from its predetermined position in theanti-tamper adapter (e.g., anti-tamper adapter 700, 2302, 2400, etc.),as described above, for example, regarding FIGS. 7 and 16, etc. Inaddition, as further described above, the plug 308 can be removed (notshown) from the anti-tamper adapter (e.g., anti-tamper adapter 700,2302, 2400, etc.) in a reusable condition (e.g., in its originalcondition, same condition as before installation of the anti-tamperadapter, substantially the same condition, or readily usable toaccomplish substantially the same purpose as before installation of theanti-tamper adapter), for example when it is determined that cabletamper prevention is no longer desired for a particular plug 308 (orplug 208 of fiber optic cable 206, etc.).

While the disclosed subject matter has been described in connection withthe preferred embodiments of the various figures, it is to be understoodthat other similar embodiments may be used with, or modifications andadditions may be made to, the described embodiments for performing thesame function of the disclosed subject matter without deviatingtherefrom. For example, one skilled in the art will recognize thataspects of the disclosed subject matter as described in the variousembodiments of the present application may apply to other types of cabletamper prevention and control applications.

As a further example, variations of process or apparatus parameters(e.g., dimensions, configurations, removal tool or key locations,arrangements, or motions required to selectively manipulate a plugrelease or release mechanism, process step order, etc.) may be made tofurther optimize the provided structures, devices and methodologies, asshown and described herein. In any event, the structures and devices, aswell as the associated methodologies, described herein have manyapplications in cable tamper prevention and control. Therefore, thedisclosed subject matter should not be limited to any single embodimentdescribed herein, but rather should be construed in breadth and scope inaccordance with the appended claims.

In addition, a variety of implementation specific details and/orexemplary alternatives to such details are provided in further supportand description of the various embodiments set forth herein. Where suchdetails or alternatives are not specifically represented in a figure,such figures nonetheless are intended to embrace all of such detailssince such details or alternatives as described can be appreciated byone of ordinary skill in the art in the context of such figures andembodiments as add-on(s) to and/or representative details, alternativesand/or substitutes for various element(s) of the figures.

1. A cable tamper prevention system comprising: a molded body adapted toaccept a standard communications plug, the molded body having at leastone protrusion adapted to engage a recess in the standard communicationsplug to reversibly fix a position of the standard communications plug inthe molded body as the standard communications plug is inserted into themolded body in a longitudinal direction along an axis of the moldedbody; and a release shroud on the molded body adapted to at leastpartially shroud a release mechanism of the standard communications plugto inhibit actuation of the release mechanism when the standardcommunications plug is attached to an associated outlet.
 2. The cabletamper prevention system of claim 1, further comprising: at least asecond protrusion on the molded body adapted to engage a shoulder of thestandard communications plug to further reversibly fix the position ofthe standard communications plug in the molded body.
 3. The cable tamperprevention system of claim 1, the release shroud comprising an accessaperture adapted to permit insertion of a removal tool into the releaseshroud allowing the removal tool to actuate the release mechanism. 4.The cable tamper prevention system of claim 1, the standardcommunications plug and associated outlet comprise at least one set of afiber optic plug and associated outlet or a Registered Jack (RJ) plugand associated outlet.
 5. The cable tamper prevention system of claim 1,the molded body further configured to accept the standard communicationsplug at a rear portion of the molded body and reversibly fix theposition of the standard communications plug as it is positioned towarda front portion of the molded body.
 6. The cable tamper preventionsystem of claim 1, further comprising: a housing on the molded bodyadapted to at least partially surround the release shroud and furtheradapted to shroud the release mechanism to prevent actuation of therelease mechanism when the standard communications plug is attached tothe associated outlet.
 7. The cable tamper prevention system of claim 6,the housing and release shroud are arranged to permit insertion of a keyin proximity to the release mechanism for selective manipulation of therelease mechanism when the key is actuated.
 8. The cable tamperprevention system of claim 1, further comprising: at least one blockingmechanism located proximate the release shroud and adapted to inhibitactuation of the release mechanism when the standard communications plugis inserted into the molded body.
 9. The cable tamper prevention systemof claim 8, the release shroud is adapted to permit insertion of aremoval tool in proximity to the release mechanism for selectivemanipulation of the release mechanism when the removal tool is actuated.10. A cable anti-tamper adapter comprising: a body having a channel thataccepts a plug, the channel having a rear portion and a front portion,the rear portion is sized to allow the plug to pass into the body in adirection coincident with a direction of normal insertion of the pluginto an associated outlet; at least a first shoulder in the channellocated proximate the front portion that limits plug travel in thedirection coincident with the direction of normal insertion; at leastone resilient catch in the channel that reversibly engages at least onerecess in the plug and limits plug travel in the direction opposite thedirection of normal insertion; and a plug release guard located on thebody proximate to the front portion that at least partially surroundsand inhibits actuation of a plug release of the plug when the plug isinserted into the associated outlet.
 11. The cable anti-tamper adapterof claim 10, further comprising: at least a second shoulder in thechannel located proximate the front portion that limits plug travel inthe direction coincident with the direction of normal insertion.
 12. Thecable anti-tamper adapter of claim 10, further comprising: a housing onthe body that at least partially surrounds the plug release guard, thehousing positioned relative to the plug release guard to permit aremoval tool to be positioned proximate to the plug release when theremoval tool is inserted into the cable anti-tamper adapter.
 13. Thecable anti-tamper adapter of claim 10, the removal tool comprising atool body and a plug release extension that actuates the plug releasewhen the plug release extension is manipulated in a direction orthogonalto the direction of normal insertion.
 14. The cable anti-tamper adapterof claim 10, the plug release guard extends proximate to a plane definedby a panel containing the associated outlet to prohibit actuation to theplug release when the plug is inserted into the associated outlet. 15.The cable anti-tamper adapter of claim 10, the plug and associatedoutlet comprise at least one set of a fiber optic plug and associatedoutlet or a Registered Jack (RJ) plug and associated outlet.
 16. Thecable anti-tamper adapter of claim 15, the plug comprises an RJ-45 plughaving a latch as a plug release.
 17. The cable anti-tamper adapter ofclaim 14, the plug release guard further comprising an access aperturethat permits insertion of a key in proximity to the plug release forselective manipulation of the plug release when the key is actuated. 18.The cable anti-tamper adapter of claim 17, the key comprises an arm thatpermits a plug release region of the key to be placed in proximity tothe plug release when the key is inserted into the access aperture, thearm permits the plug release region to selectively manipulate the plugrelease when the arm is manipulated in a direction orthogonal to thedirection of normal insertion.
 19. The cable anti-tamper adapter ofclaim 17, further comprising: at least one blocking tab locatedproximate the plug release guard and adapted to inhibit actuation of theplug release when the plug is inserted into the body.
 20. The cableanti-tamper adapter of claim 19, the key comprises at least one surfaceadapted to reposition the at least one blocking tab to allow selectivemanipulation of the plug release by a second surface adapted to engageand selectively manipulate the plug release.
 21. A cable tamperprevention system comprising: a molded body adapted to accept a standardcommunications plug, the molded body having at least one protrusionadapted to engage a recess in the standard communications plug toreversibly fix a position of the standard communications plug in themolded body as the standard communications plug is inserted into themolded body in a longitudinal direction along an axis of the moldedbody; a release shroud on the molded body adapted to at least partiallyshroud a release mechanism of the standard communications plug toinhibit actuation of the release mechanism when the standardcommunications plug is attached to an associated outlet; and at leastone blocking mechanism located proximate the release shroud and adaptedto inhibit actuation of the release mechanism when the standardcommunications plug is inserted into the molded body.
 22. The cabletamper prevention system of claim 21, further comprising: at least asecond protrusion on the molded body adapted to engage a shoulder of thestandard communications plug to further reversibly fix the position ofthe standard communications plug in the molded body.
 23. The cabletamper prevention system of claim 21, the release shroud comprising anaccess aperture adapted to permit insertion of a removal tool into therelease shroud allowing the removal tool to at least one of actuate therelease mechanism or reposition the at least one blocking mechanism. 24.The cable tamper prevention system of claim 21, the molded body furtherconfigured to accept the standard communications plug at a rear portionof the molded body and reversibly fix the position of the standardcommunications plug as it is positioned toward a front portion of themolded body.