Electronic device protection system

ABSTRACT

One example embodiment includes a system for protecting an electronic device. The system includes a pocket, where the pocket is configured to receive an electronic device capable of receiving or transmitting electronic signals. The system also includes a cover. The cover is configured to cover at least a portion of the pocket and prevent the electronic device from receiving or transmitting electronic signals.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of and priority to U.S. Provisional patent application Ser. No. 61/348,536 filed on May 26, 2010, which application is incorporated herein by reference in its entirety.

BACKGROUND OF THE INVENTION

Cell phones and other mobile electronic devices are becoming increasingly popular. An ever larger segment of the population carries these devices. Further, more people continue to rely on these devices for a variety of communication, including making phone calls, sending and receiving emails and text messages. Additionally, these users often store a large number of documents on these electronic devices. These documents and other information stored on the electronic device can contain sensitive information, that the user is unwilling to share.

Nevertheless, hacking and stealing information from these electronic devices has become a problem in recent years. In particular, these devices can constantly be connecting to unknown wireless and cell networks where the information can be subjected to theft. This can lead to large problems for the owner of the electronic device.

Additionally, the high level of data transmission can lead to health problems for the owner. In particular, cellular phone transmissions have been linked to several types of cancer in recent years. Whether or not these links are proven to exist, a user may wish to be protected in order to ensure his or her safety. However, these electronic devices generally send and receive data automatically unless turned off.

Accordingly, there is a need in the art for a system that can prevent the theft of data stored on mobile electronic devices. Additionally, there is a need in the art for the system to prevent connection to outside networks until desired by the user. Further there is a need for the system to protect the user from the potentially dangerous radiation produced by the electronic device.

BRIEF SUMMARY OF SOME EXAMPLE EMBODIMENTS

This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential characteristics of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.

One example embodiment includes a system for protecting an electronic device. The system includes a pocket, where the pocket is configured to receive an electronic device capable of receiving or transmitting electronic signals. The system also includes a cover. The cover is configured to cover at least a portion of the pocket and prevent the electronic device from receiving or transmitting electronic signals.

Another example embodiment includes a system for protecting an electronic device. The system includes a pocket. The pocket is configured to receive an electronic device capable of receiving or transmitting electronic signals, is substantially waterproof and is substantially buoyant in water. The system also includes a cover. The cover is configured to cover at least a portion of the pocket and prevent the electronic device from receiving or transmitting electronic signals.

Another example embodiment includes a system for protecting an electronic device. The system includes a first pocket. The first pocket is configured to receive an electronic device capable of receiving or transmitting electronic signals, is substantially waterproof, and is substantially buoyant in water. The cover is configured to cover at least a portion of the first pocket and prevent the electronic device from receiving or transmitting electronic signals. The system also includes a second pocket, where the second pocket is configured to receive one or more credit cards.

These and other objects and features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.

BRIEF DESCRIPTION OF THE DRAWINGS

To further clarify various aspects of some example embodiments of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. It is appreciated that these drawings depict only illustrated embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:

FIG. 1 illustrates an example of a system for protecting an electronic device;

FIG. 2 illustrates an example of the system with the waterproof pocket extended;

FIG. 3 illustrates an example of the system with the cover in a second, closed, position; and

FIG. 4 illustrates a rear view of the system.

DETAILED DESCRIPTION OF SOME EXAMPLE EMBODIMENTS

Reference will now be made to the figures wherein like structures will be provided with like reference designations. It is understood that the figures are diagrammatic and schematic representations of some embodiments of the invention, and are not limiting of the present invention, nor are they necessarily drawn to scale.

FIG. 1 illustrates an example of a system 100 for protecting an electronic device. In at least one implementation, the system 100 can protect the electronic device from external influences that could damage the electronic device. In particular, the system 100 can protect the electronic device from damage caused by water, external forces or other potential damage. Additionally or alternatively, the system 100 can protect the electronic device form being hacked or otherwise compromised. In addition, the system 100 can protect the user form electromagnetic (EM) radiation produced by the phone, as described below.

In at least one implementation, the system 100 is capable of protecting any electronic device. For example, the system 100 can be used with cell phones, tablet computers, e-readers, laptops, palm computers, iPods or any other electronic device. In particular, the system 100 can be used with any mobile electronic device. The electronic device can be capable of receiving or transmitting electronic signals.

In at least one implementation, the system 100 can include any material which is capable of retaining the electronic device. For example, the system 100 can include leather, cloth, plastic or any other material. One of skill in the art will appreciate that the system 100 can include a single material or a combination of materials, unless otherwise specified in the specification or claims.

FIG. 1 shows that the system 100 can include a device pocket 105. In at least one implementation, the device pocket 105 is capable of receiving and retaining all or part of the electronic device. For example, the device pocket 105 can retain the portion of the electronic device which the user rarely needs to access, such as the rear or bottom of the electronic device. Additionally or alternatively, the device pocket 105 can retain the entire electronic device, and the user can use the electronic device while in the device pocket 105. The device pocket 105 can include an open portion that allows the user to remove the electronic device as desired.

FIG. 1 shows that the system 100 can include a clear face 110. In at least one implementation, the clear face 110 can allow the user to access at least a portion of the electronic device as desired. For example, the clear face 110 can allow the user to view the display of the electronic device. Additionally or alternatively, the clear face 110 can allow the user to access the keyboard or keypad of the electronic device.

In at least one implementation the clear face 110 can include more than one layer. I.e., the clear face 110 can include multiple layers such that the electronic device or one or more accessories can be placed in between the layers. Placing the electronic device in between the layers can provide a waterproof protection for the electronic device. Additionally or alternatively, multiple layers within the clear face 110 can trap air, which can make the system 100 buoyant in water.

FIG. 1 further shows that the system 100 can include a stealth pocket 115. In at least one implementation, the stealth pocket 115 can allow the user to place the electronic device, or other devices such as accessories to the electronic device, where they are not easily visible.

FIG. 1 also shows that the system 100 can include a cover 120. In at least one implementation, the cover 120 can cover at least a portion of the device pocket 105. In particular, the cover 120 can be moved from a first position where the device pocket 105 is accessible to the user to a second position where the device pocket is not accessible.

In at least one implementation, the cover 120 can be configured to prevent the electronic device from receiving or transmitting electronic signals. This can allow the cover 120 to protect the user from EM radiation emitted by the phone. Additionally or alternatively, the cover 120 can prevent others from hacking or otherwise accessing information stored on the electronic device. The cover 120 can include material which absorbs EM radiation such that EM signals are unable to penetrate the cover. For example, the cover 120 can include metal, such as lead, lead fibers or silver, or other conductors which block the EM radiation. I.e., the cover 120 can include lead fibers woven into the fibers of the cover or nano-size ion silver metal embedded within the cover or coated on the cover. Additionally or alternatively, the cover can include a lead sheet within the cover which absorbs the EM radiation.

One of skill in the art will appreciate that a cover 120 configured to prevent the electronic device from receiving or transmitting electronic signals can be positioned during use to prevent EM radiation form be transmitted at the user. For example, the cover 120 can be moved to the rear of the system 100 while the user sets the electronic device on his/her lap.

FIG. 1 shows that the device pocket 105 and the cover 120 can include a first attachment 125 a and a second attachment 125 b (collectively “attachments 125”), respectively. In at least one implementation, the attachments 125 can include any attachment mechanism capable of releasably holding the waterproof pocket 205 in a closed position. For example, the attachments 125 can include a hook and loop fastener, buttons, snaps, ties, hooks or any other attachment mechanism. One of skill in the art will appreciate that any mechanism capable of allowing the first attachment 125 a to attach to the second attachment 125 b, whether now existing or invented in the future, is contemplated herein.

FIG. 2 illustrates an example of the system 100 with the waterproof pocket 205 extended. In at least one implementation, the waterproof pocket 205 is configured to prevent water from coming in contact with the electronic device 210. In particular, the waterproof pocket 205 can “unroll” to allow access to the interior of the waterproof pocket 205. The waterproof pocket 205 can then be rolled to prevent a direct path to the interior of the waterproof pocket 205. In particular, the lack of a direct path can make the interior of the waterproof pocket 205 either waterproof or water resistant even if the system 100 is dropped into water or otherwise exposed to moisture.

FIG. 2 also shows that the waterproof pocket 205 can include a first attachment 215 a and a second attachment 215 b (collectively “attachments 215”). In at least one implementation, the attachments 215 can be configured to hold the waterproof pocket 205 in the closed position. Additionally or alternatively, the attachments 215 can allow the cover 120 to remain in a closed position when the waterproof cover is either rolled or extended, as desired by the user.

In at least one implementation, the attachments 215 can include any attachment mechanism capable of releasably holding the waterproof pocket 205 in a closed position. For example, the attachments 215 can include a hook and loop fastener, buttons, snaps, ties, hooks or any other attachment mechanism. One of skill in the art will appreciate that any mechanism capable of allowing the first attachment 215 a to attach to the second attachment 215 b, whether now existing or invented in the future, is contemplated herein.

FIG. 3 illustrates an example of the system 100 with the cover 120 in a second, closed, position. In at least one implementation, cover 120 is capable of being moved from a closed position by virtue of its attachment to the system 100. In particular, the attachment between the system 100 can the cover 120 can be hinged, flexible or otherwise allow movement of the cover 120 relative to the system 100.

In at least one implementation, the cover 120 can be held in the second position by the attachments 125 shown in FIG. 1. Additionally or alternatively, the cover can be held in the second position by a combination of the attachments 125 of FIG. 1 and the attachments 215 of FIG. 2. For example, the first attachment 125 a can be connected to the first attachment 215 a, holding the waterproof pocket 205 closed. The second attachment 125 b can then be connected to the second attachment 215 b holding the cover 120 in the second position.

One of skill in the art will appreciate that in the second position, the cover 120 can prevent the reception or transmission of EM signals by the electronic device. In particular, the cover 120 can absorb the EM signals, as described above. In at least one implementation, this can prevent access to the electronic device. For example, the cover 120 in the second position can prevent the electronic device from connecting to a cellular network or other computer network and thus protect the phone from being accessed when the user so desires.

FIG. 4 illustrates a rear view of the system 100. In at least one implementation, the rear of the system 100 can absorb EM signals, similar to the cover 120. In particular, the rear of the system 100 can include material that is similar or substantially similar to the material used in the cover 120. Additionally or alternatively, the rear of the system 100 can include materials which absorb EM signals but which are different than the materials used in the cover 120.

FIG. 4 shows that the system 100 can include a rear pocket 405. In at least on implementation, the rear pocket 405 can be configured to receive accessories for the electronic device and/or additional electronic devices. Additionally or alternatively, the rear pocket 405 can be configured to receive one or more credit cards. In at least one implementation, the rear pocket 405 can protect the one or more credit cards from being remotely read.

In at least one implementation, the rear pocket 405 can be configured to contain credit cards or identification cards that are sized according to the ISO/IEC 7810 standard for 10-1 sized cards. The ISO/IEC 7810 standard is an international standard that defines the physical characteristics for identity or identification cards. The 10-1 format of the ISO/IEC 7810 standard specifies a size of 85.60×53.98 mm (3.370×2.125 in). The 10-1 format can be used for banking cards (ATM cards, credit cards, debit cards, etc.) for driver's licenses, personal identity cards, business cards, the United States passport card and any other type of identification card.

In at least one implementation, the rear pocket 405 can be configured such that an 10-1 format sized card can be retained within the rear pocket 405 without closing or otherwise securing the opening of the rear pocket 405. For example, the rear pocket 405 can be between 2.9 and 4.35 inches wide and 1.8 and 2.7 inches long, In particular, the rear pocket 405 can be approximately 3 5/8 inches (3.625 inches) wide and 2 ¼ inches (2.25 inches) long. A rear pocket 405 that is 3 ⅝ inches by 2 ¼ inches can retain an 10-1 sized card using frictional forces between the pocket 410 and the card. As used in the specification and the claims, the term approximately shall mean that the value is within 10% of the stated value, unless otherwise specified.

The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope. 

1. A system for protecting an electronic device, the system comprising: a pocket, wherein the pocket is configured to receive an electronic device capable of receiving or transmitting electronic signals; and a cover, wherein the cover is configured to: cover at least a portion of the pocket; and prevent the electronic device from receiving or transmitting electronic signals.
 2. The system of claim 1, wherein the cover includes leather.
 3. The system of claim 1, wherein the cover includes cloth.
 4. The system of claim 1, wherein the cover includes metal.
 5. The system of claim 4, wherein the cover includes silver.
 6. The system of claim 5, wherein the cover includes a silver coating on the cover.
 7. The system of claim 1, wherein the cover is configured to move relative to the pocket.
 8. The system of claim 7, wherein the cover is configured to move from a first position where the electronic device is prevented from receiving or transmitting electronic signals to a second position where the electronic device is allowed to receive or transmit electronic signals.
 9. The system of claim 8, wherein the cover in the first position prevents physical access to the electronic device.
 10. The system of claim 8, wherein the cover in the second position prevents electronic signals transmitted by the electronic device from transmitting toward a user.
 11. The system of claim 8 further comprising an attachment, wherein the attachment is configured to hold the cover in the first position.
 12. A system for protecting an electronic device, the system comprising: a pocket, wherein the pocket: is configured to receive an electronic device capable of receiving or transmitting electronic signals; is substantially waterproof; and is substantially buoyant in water; and a cover, wherein the cover: is attached to the pocket; and is configured to: cover at least a portion of the pocket; and prevent the electronic device from receiving or transmitting electronic signals.
 13. The system of claim 12, wherein the electronic device includes a cell phone.
 14. The system of claim 12, wherein the pocket includes a plastic lining.
 15. The system of claim 12, wherein the system includes a second pocket.
 16. The system of claim 15, wherein the cover is configured to cover at least a portion of the second pocket.
 17. A system for protecting an electronic device, the system comprising: a first pocket, wherein the first pocket: includes an opening; is configured to receive an electronic device capable of receiving or transmitting electronic signals; is substantially waterproof; and is substantially buoyant in water; a cover, wherein the cover is attached to the first pocket near the opening; and is configured to: cover at least a portion of the first pocket; and prevent the electronic device from receiving or transmitting electronic signals; and a second pocket, wherein the second pocket is configured to receive one or more credit cards.
 18. The system of claim 17, wherein the second pocket is between 2.9 and 4.35 inches wide and 1.8 and 2.7 inches long.
 19. The system of claim 18, wherein the one or more pockets are approximately 3.625 inches wide and 2.25 inches long.
 20. The system of claim 17, wherein the second pocket is configured to prevent reading of a contact-less credit card. 