Secured storage for electronic devices
First Claim
1. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
- a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device;
a first wall extending vertically above the base;
a second wall extending vertically above the base, the second wall located opposite the first wall;
a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall;
a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked;
a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base informing the base to unlock a device if the user is authorized to access the device;
at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated;
the lock unlocking to release the device from the base after receiving the unlock message;
a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies an available access time at which the device should be released from the base;
the server restricting access to the device to the available access time wherein the server compares an access time at which the user attempts to access the device to the available access time to determine whether the device should be released from the base, the server transmitting the unlock message to the base if the access time is within the available access time wherein the server denies access to the device outside of the available access time.
1 Assignment
0 Petitions
Accused Products
Abstract
The secured storage receives an electronic device including but not limited to a tablet, smart phone, mobile computing device, or other computing device. The secured storage provides a charging system that charges the device. The lock of the secured storage secures the electronic device within the storage. The system maintains a log of the users who access the electronic devices. The system then control access by granting access to users and restricting access to users based upon usage history, behavior, or other criteria. The lock adjusts between locked to secure the device and unlocked to allow access to the device.
12 Citations
15 Claims
-
1. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base informing the base to unlock a device if the user is authorized to access the device; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies an available access time at which the device should be released from the base; the server restricting access to the device to the available access time wherein the server compares an access time at which the user attempts to access the device to the available access time to determine whether the device should be released from the base, the server transmitting the unlock message to the base if the access time is within the available access time wherein the server denies access to the device outside of the available access time.
-
-
2. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base informing the base to unlock a device if the user is authorized to access the device; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies available access limits defining the amount of time a user may access the device; the server confirming that the user has not exceeded the available access limits to determine whether the device should be released from the base, the server transmitting the unlock message to the base if the user is within available access limits, the server denying access if the user has exceeded the available access limits.
-
-
3. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base informing the base to unlock a device if the user is authorized to access the device; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies a minimum charge of the device required to release the device from the base; the server denying access to the device if the charge of the device is less than the minimum charge, the server transmitting the unlock message to the base if the charge of the device is greater than the minimum charge.
-
-
4. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base informing the base to unlock a device if the user is authorized to access the device; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies a damaged status of the device; the server restricting access to the device if the damaged status indicates that the device is damaged, the server transmitting the unlock message to the base if the device is not damaged wherein the server denies access to the device if the device is damaged.
-
-
5. A base apparatus for securing a mobile computing device stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a lock that secures the device within the base when locked and the lock releases the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies an available access time at which the device should be released from the base; the server restricting access to the device to the available access time wherein the server compares an access time at which the user attempts to access the device to the available access time to determine whether the device should be released from the base, the server transmitting the unlock message to the base if the access time is within the available access time wherein the server denies access to the device outside of the available access time.
-
-
6. A base apparatus for securing a mobile computing device stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a lock that secures the device within the base when locked and the lock releases the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies available access limits defining the amount of time a user may access the device; the server confirming that the user has not exceeded the available access limits to determine whether the device should be released from the base, the server transmitting the unlock message to the base if the user is within available access limits, the server denying access if the user has exceeded the available access limits.
-
-
7. A base apparatus for securing a mobile computing device stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a lock that secures the device within the base when locked and the lock releases the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies a minimum charge of the device required to release the device from the base; the server denying access to the device if the charge of the device is less than the minimum charge, the server transmitting the unlock message to the base if the charge of the device is greater than the minimum charge.
-
-
8. A base apparatus for securing a mobile computing device stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a lock that secures the device within the base when locked and the lock releases the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies a damaged status of the device; the server restricting access to the device if the damaged status indicates that the device is damaged, the server transmitting the unlock message to the base if the device is not damaged wherein the server denies access to the device if the device is damaged.
-
-
9. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies an available access time at which the device should be released from the base; the server restricting access to the device to the available access time wherein the server compares an access time at which the user attempts to access the device to the available access time to determine whether the device should be released from the base, the server transmitting the unlock message to the base if the access time is within the available access time wherein the server denies access to the device outside of the available access time.
-
-
10. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies available access limits defining the amount of time a user may access the device; the server confirming that the user has not exceeded the available access limits to determine whether the device should be released from the base, the server transmitting the unlock message to the base if the user is within available access limits, the server denying access if the user has exceeded the available access limits.
-
-
11. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies a minimum charge of the device required to release the device from the base; the server denying access to the device if the charge of the device is less than the minimum charge, the server transmitting the unlock message to the base if the charge of the device is greater than the minimum charge.
-
-
12. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; a rule list identifying at least one rule required to be met to allow access to the device wherein the rule identifies a damaged status of the device; the server restricting access to the device if the damaged status indicates that the device is damaged, the server transmitting the unlock message to the base if the device is not damaged wherein the server denies access to the device if the device is damaged.
-
-
13. A base apparatus for securing a mobile computing device stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a lock that secures the device within the base when locked and the lock releases the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; wherein the status of the user indicates whether the user; a) has abused or otherwise damaged at least one device, b) has available access time for a device, c) has lost or stolen a device, d) has been indicated as having good behavior, or e) is attempting to access the device during an available access time.
-
-
14. A base apparatus for securing a mobile computing device stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a lock that secures the device within the base when locked and the lock releases the device from the base when unlocked; a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base instructing the base to unlock the device from the base; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; wherein the status of the user indicates whether the user; a) has abused or otherwise damaged at least one device, b) has available access time for a device, c) has lost or stolen a device, d) has been indicated as having good behavior, or e) is attempting to access the device during an available access time.
-
-
15. A base apparatus for securing multiple mobile computing devices stored within the base, the apparatus comprising:
-
a base that accepts at least a portion of the mobile computing device wherein the base restricts access to the mobile computing device; a first wall extending vertically above the base; a second wall extending vertically above the base, the second wall located opposite the first wall; a receiving aperture of the base accepting insertion of the mobile computing device within the receiving aperture wherein the receiving aperture defined by an interior portion of the first wall and an interior portion of the second wall; a lock secures the device within the base when locked and the lock releasing the device from the base when unlocked; and a server in communication with the base wherein the server requires authentication from a user prior to unlocking a device for removal from the base, the server transmitting an unlock message to the base informing the base to unlock a device if the user is authorized to access the device; at least one rule concerning a status of the user or a status of the device required to be met before releasing a device to an authenticated user, wherein the server confirms that the rule to release the device is met in addition to authenticating the user, the server transmitting the unlock message to the base if the rule is met and the user is authenticated; the lock unlocking to release the device from the base after receiving the unlock message; wherein the status of the user indicates whether the user; a) has abused or otherwise damaged at least one device, b) has available access time for a device, c) has lost or stolen a device, d) has been indicated as having good behavior, or e) is attempting to access the device during an available access time.
-
Specification