throbber
(12) United States Patent
`Murano
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,509,015 B2
`Mar. 24, 2009
`
`USOO7509015B2
`
`(54) SECURE FIBER OPTIC NETWORK
`CASSETTE ASSEMBLY
`
`(75) Inventor: Adam Murano, West Chesterfield, NH
`(US)
`
`(73) Assignee: Ortronics, Inc., New London, CT (US)
`(*) Notice:
`Subject to any disclaimer, the term of this
`patent 1s st G adjusted under 35
`U.S.C. 154(b) by 0 days.
`(21) Appl. No.: 11/493,774
`
`y x- - -
`
`9
`
`(22) Filed:
`
`Jul. 26, 2006
`
`(65)
`
`Prior Publication Data
`US 2008/OO25683 A1
`Jan. 31, 2008
`• - us
`
`(2006.01)
`
`(51) Int. Cl.
`GO2B 6/00
`38.5/135: 135/134
`(52) U.S. Cl
`s 385/135
`58 Fi id f c - - - - - ificati- - - - - -s - - - - - - - h- - - - -
`sts te search hist
`(58)
`C.
`s
`ee appl1cauon Ille Ior complete searcn n1Story.
`(56)
`References Cited
`U.S. PATENT DOCUMENTS
`
`6,282,360 B1* 8/2001 Milanowski et al. ........ 385/135
`6.356,697 B1 * 3/2002 Braga et al. ................. 385/135
`6,758,600 B2
`7/2004 Del Grosso et al.
`6,869.227 B2
`3/2005 Del Grosso et al.
`6,925,241 B2 * 8/2005 Bohleet al. ................. 385/135
`7.205,481 B2 * 4/2007 Higbie ..........
`... 174f156
`7.333,706 B2 * 2/2008 Parikh et al. ......
`... 38.5/135
`2003/0223723 A1* 12/2003 Massey et al. .............. 385/135
`* cited by examiner
`Primary Examiner Uyen Chau NLe
`Assistant Examiner Kajli Prince
`(74) Attorney, Agent, or Firm McCarter & English, LLP
`
`ABSTRACT
`(57)
`Assemblies and methods for securing a fiber optic network
`9.
`p
`cassette assembly are provided. A typical secure cassette
`assembly includes a cabinet adapted to be locked on both a
`front and rear side of the cabinet. Internally, a plurality of
`cassettes are placed on a cassette tray adapted to slide back
`and forth within the cabinet. Insert pins are placed into holes
`on the cassettes locking into the cassette tray. A limiter is
`placed inside the cabinet that prevents the cassette tray from
`sliding when engaged. If one of the cassettes is forcibly
`removed, the insert pin will shear the fiber internal to the
`cassette and destroy the cassette, thereby disabling the net
`work and typically alerting a network administrator or desig
`nated individual.
`
`4,900,123. A *
`5,915,802 A *
`
`2, 1990 Barlow et al. ................. 385,53
`6/1999 Siler .......................... 312,216
`
`14 Claims, 7 Drawing Sheets
`
`1 OO Y
`
`
`
`

`

`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 1 of 7
`
`US 7,509,015 B2
`
`
`
`1 OO
`
`Tray at Position A
`
`FIG. 1
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 1 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`Tray at Position A
`
`FIG. 1
`
`

`

`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 2 of 7
`
`US 7,509,015 B2
`
`1 OO
`
`
`
`FIG. 2
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 2 of 7
`
`US 7,509,015 B2
`
`100
`
`108)
`
`~
`=, So
`a.
`fe)
`—- U
`o
`By <
`a
`
`FIG. 2
`
`

`

`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 3 of 7
`
`US 7,509,015 B2
`
`
`
`1 OO
`
`FIG. 3
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 3 of 7
`
`US 7,509,015 B2
`
`Oo
`Cc
`2
`=
`179)
`o
`oO

`>

`— E
`
`100
`
`
`
`
`FIG. 3
`
`Page 4
`
`CommScope Ex. 1017
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 3 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`FIG. 3
`
`

`

`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 4 of 7
`
`US 7,509,015 B2
`
`1 OO
`
`
`
`FIG. 4
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 4 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`FIG. 4
`
`Page 5
`
`CommScope Ex. 1017
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 4 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`FIG. 4
`
`

`

`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 5 Of 7
`
`US 7,509,015 B2
`
`1 OO Y
`
`
`
`FIG. 5
`
`U.S. Patent
`
`Mar. 24,2009
`
`Sheet 5 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`
`FIG. 5
`
`Page 6
`
`CommScope Ex. 1017
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 5 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`
`
`
`
`
`
`
`
`FIG. 5
`
`

`

`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 6 of 7
`
`US 7,509,015 B2
`
`1 OO Y
`
`
`
`FIG. 6
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 6 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`FIG. 6
`
`Page 7
`
`CommScope Ex. 1017
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 6 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`FIG. 6
`
`

`

`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 7 Of 7
`
`US 7,509,015 B2
`
`1 OO
`
`
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 7 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`Page 8
`
`CommScope Ex. 1017
`
`U.S. Patent
`
`Mar. 24, 2009
`
`Sheet 7 of 7
`
`US 7,509,015 B2
`
`100
`
`
`
`
`

`

`1.
`SECURE FIBER OPTIC NETWORK
`CASSETTE ASSEMBLY
`
`US 7,509,015 B2
`
`BACKGROUND
`
`10
`
`15
`
`25
`
`30
`
`35
`
`1. Technical Field
`The present disclosure relates to assemblies and methods
`for securing a fiber optic network cassette assembly.
`2. Background Art
`Many transactions take place everyday over the Internet,
`increasing a need for secure Ethernet communications. Typi
`cally, network security is handled in an Ethernet’s layers 2-7.
`providing packet encryption and decryption algorithms up to
`256 bit, which is generally considered virtually unbreakable
`by mathematicians and programmers alike. Although these
`security techniques have generally been Successful in pre
`venting a non-physical security breach, they do not prevent
`physical tampering or access to secure data channels. For
`example, encryption and decryption algorithms do not pre
`vent a person internal to an organization from gaining physi
`cal access to secure data channels from which said person is
`restricted. A person having a low level security clearance can
`sit at another person’s workstation who has a higher level of
`security clearance and thereby access data or information
`restricted from said individual.
`To combat security breach, companies and military bases
`alike promote isolated networks in the premise environment
`starting at the data center or main computer room. The use of
`keying connectors at the user workspace or computer termi
`nal is rapidly becoming the preferred method used to prevent
`personal connectivity or access to a secure network.
`In a keyed connector scenario, an environment, such as a
`secure finance center at an insurance company or the Penta
`gon, is universally equipped with keyed fiber optic adapters at
`each user workStation. It should be known to one having
`ordinary skill in the art that the term “adapter is interchange
`able with the term “coupler and refers to a device that creates
`a connection between two fiber optic ferrules, each contain
`ing a light carrying medium of fiber. An adapter typically
`contains a ceramic or phosphorous bronze alignment sleeve
`40
`and a number of features that provide for latching the con
`nector into the adapter. A MT-RJ adapter, however, does not
`use an alignment sleeve as the fibers are aligned by precision
`pins and holes on the mating connector ferrules.
`In a non-secured environment, a user of a network is typi
`cally provided with a generic patch cable to attacha laptop or
`desktop to a network. Thus, the generic patch cable can gen
`erally interface with any available port in a building. In a
`typical secured environment, a network designer isolates the
`networks by providing a different connector configuration to
`each of the network security levels. For example, a user is
`given a patch cable commensurate with the user's assigned
`security level. If the user attempts to insert the given connec
`tor on the patch cable into any adapter other than one designed
`for it, the connector will not fit and a network connection will
`not be made. A network connection will only be made when
`a matching connector and adapter are mated. These keyed
`connectors are typically color coded indicating different
`security levels.
`To secure a network system, the infrastructure in the data
`center must be connected correctly, tested and then secured
`Such that the network cannot be reconfigured intentionally or
`by accident. A reversal of security level in a data center can be
`more damaging than a breach at the workstation outlet. Thus,
`rather than a single user gaining unauthorized access to a
`secure channel, a number of unsuspecting users will unknow
`ingly breach security by connecting to an incorrect network.
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`Moreover, for example, in a private business or military appli
`cation environment, an analyst being provided “read only
`access can inadvertently be connected to a “read and write'
`network and unknowingly disrupt data and/or sensitive con
`tent.
`Typically, data center security systems utilize a front side
`removal of a cassette to facilitate moves, adds and changes
`(MACS). A common mechanism is to use a plunger grommet
`design to secure a cassette in a drawer face. Other methods,
`such as Nordx's (Belden CDT) technology, use a molded
`quick-release feature on the front side of a cassette for easy
`access. In a typical cassette assembly of a secured Ethernet
`network, a keyed solution on a front side of a cabinet is only
`effective ifa rear connector cannot be switched. For example,
`a switching of a network connection of a fiber ribbon at the
`connection interface (typically via a MPO connection) is
`possible in a number of ways. A first and most simple method
`of Switching may occur by opening the rear side door of the
`cabinet and simply unplugging one connection and plugging
`in a more secure network in the same port. This weakness can
`be somewhat obviated by adding a lock to the rear of the
`cabinet.
`A second method for compromising security includes
`opening the front of the cabinet and sliding the drawer out
`ward to expose the rear of the cassette, thus, allowing for the
`connections to be changed similar to the first method
`described herein. Although fixing the drawer in place will
`prevent certain security breach, without some degree of tray
`movement, accessibility of front connections is limited and
`inconvenient for network administrators and/or designated
`individuals. A third method for breaching security includes
`accessing the cassette itself from the front of the tray, remov
`ing it from plunger grommet features in the drawer face,
`pulling it toward the user, disconnecting the MPO connector
`and Switching connections as in the first method described
`herein.
`Accordingly, a need exists for a cassette system capable of
`preventing physical security breach accomplished by Switch
`ing network cable connections. These and other disadvan
`tages and/or limitations are addressed and/or overcome by the
`assemblies and methods of the present disclosure.
`
`SUMMARY
`
`The present disclosure describes assemblies and methods
`for securing a fiber cassette network assembly. In an exem
`plary embodiment, a secure network cassette assembly is
`described having: (i) a cabinet with a front and rear side, each
`of which are adapted to be locked; (ii) a cassette tray adapted
`to slide back and forth within the cabinet and hold a plurality
`of cassettes or blanks; (iii) at least one cassette defining a hole
`adapted to allow for an insert pin to pass through the cassette
`and engage the cassette tray, wherein the insert pin connects
`to the cassette tray; and (iv) at least one limiter inside the
`cabinet adapted to engage the cassette tray to prevent sliding.
`An exemplary assembly of the present disclosure includes a
`plurality of cassettes. A typical cabinet associated with the
`present disclosure is adapted to hold as many cassettes as
`necessary for a desired network. Blanks are placed in any
`remaining positions of the cabinet not holding a cassette.
`Insertion of a blank closes off open areas in the front face of
`the cabinet that, if left open, would allow physical access to
`internal components of the assembly.
`Similar to the cassettes, blanks define a hole adapted to
`allow for insert pins to pass through the blank and engage the
`cassette tray. In an exemplary embodiment, rear access to the
`cassette from the front side of the cabinet is prevented. The
`
`

`

`3
`hole on each of the cassettes is typically placed in a position
`such that if any of the cassettes were forcibly removed from
`the cabinet, the insert pin associated with the removed cas
`sette will destroy the removed cassette, thereby disabling the
`network. In certain exemplary embodiments, destroying any
`of the cassettes will cause an alarm to alert a designated
`individual. Such as a network administrator, that a breach of
`security has occurred.
`Typically, insert pins are attached to a stanchion integrally
`connected to the cassette tray. However, several locking
`means exist to hold the insert pins in place including, but not
`limited to, screws, swivel locks, slide locks, thumb tab locks,
`Swing latches, and combinations therein. A limiter associated
`with the present disclosure can be a spring pin, a fastener, or
`combinations thereof. In a typical exemplary embodiment, a
`cylinder is placed inside each of the holes on each of the
`cassettes adapted to: (i) allow the insert pin to pass through
`each of the plurality cassettes and (ii) prevent damage to
`internal components of the cassette.
`An exemplary method of the present disclosure is effective
`in securing a network cassette assembly by: (i) inserting a
`plurality of cassettes on a cassette tray in a cabinet having a
`front side door and a rear side door, wherein each of the front
`and rear doors is adapted to be locked, and the cassette tray is
`adapted to slide back and forth within the cabinet; (ii) insert
`ing an insert pin into a hole defined on each of the cassettes,
`wherein each hole is adapted to allow for the insert pinto pass
`through the cassette and engage the cassette tray; (iii) sliding
`the cassette tray into a position that engages at least one
`limiter inside the cabinet adapted to prevent the cassette tray
`from sliding; and (iv) locking the front side and the rear side
`of the cabinet.
`Additional features, functions and benefits of the disclosed
`systems and methods will be apparent from the description
`which follows, particularly when read in conjunction with the
`appended figures.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`To assist those of ordinary skill in the art in making and
`using the disclosed assemblies and methods, reference is
`made to the appended figures, wherein:
`FIG. 1 is a schematic illustrating an exemplary embodi
`ment of a fiber optic network cassette assembly in a position
`A;
`FIG. 2 is a schematic illustrating an exemplary embodi
`ment of a fiber optic network cassette assembly in a position
`B;
`FIG. 3 is a schematic illustrating an exemplary embodi
`ment of a fiber optic network cassette assembly in a position
`C;
`FIG. 4 is a schematic illustrating an exemplary embodi
`ment of a fiber optic network cassette assembly showing
`blanks filling open slots of a cabinet;
`FIG. 5 is a schematic illustrating an exemplary locking
`mechanism for locking an insert pin to a cassette tray:
`FIG. 6 is a schematic illustrating an exemplary embodi
`ment of a fiber optic network cassette assembly having Secu
`rity pins disengaged from a cassette tray and not attached to a
`stanchion;
`FIG. 7 is a schematic illustrating an exemplary embodi
`ment of a fiber optic network cassette assembly having Secu
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,509,015 B2
`
`4
`rity pins inserted into the cassettes, engaging the cassette tray
`and not attached to a stanchion.
`
`DESCRIPTION OF EXEMPLARY
`EMBODIMENT(S)
`
`Systems and methods are disclosed that are effective in
`preventing reversals of keyed solutions from occurring in a
`data center or telecommunication closets having keyed solu
`tions security as described herein.
`FIG. 1 is a schematic illustrating a typical cassette tray
`assembly 100 of the present disclosure. In an exemplary
`embodiment, assembly 100 includes a standard fiber optic
`enclosure cabinet 1, having additional features, as described
`below, on at least one cassette 2 and cassette tray 3. Fiber
`ribbon is typically coiled within each cassette in a Substan
`tially circular shape. Assembly 100 further includes front side
`security door 4 allowing front side cabinet access for patch
`ing. Door 4 is adapted to lock, allowing front side access only
`to selected individuals. In an exemplary embodiment of
`assembly 100, opening door 4 only allows access to the front
`side of assembly 100 and access to a rear side 5 is prevented,
`thus preventing compromise to rear side 5 patch panels. Tray
`3 is adapted to host a plurality of cassettes 2, as typical in a
`network assembly as shown in the exemplary embodiment of
`FIG. 1. An exemplary embodiment associated with the
`present disclosure can further include a rear side of a fiber
`optic breakout cassette, such as the Ortronics, Inc., “Momen
`tum'.
`An exemplary embodiment associated with the present
`disclosure obviates the multiple methods of security compro
`mise described above. In an exemplary embodiment, assem
`bly 100, as shown in FIG. 1, includes at least one locking
`mechanism Supported in the body of cassette 2. A locking
`mechanism is supported on each of the cassettes in an exem
`plary assembly having a plurality of cassettes 2. An exem
`plary locking mechanism of the present disclosure defines a
`through hole 11 adapted to accept an intersecting security pin
`13 (insert pin) that engages with cassette tray 3 via vertical
`stanchion 15. Stanchion 15 is adapted to have a plurality of
`insert pins 13. Typically, stanchion 15 has as many of pins 13
`as are necessary to insert through each hole 11 of each cas
`sette 2. For example, if cassettes are stacked on top of one
`another such that each cassette's hole 11 is substantially
`aligned, only one pin 13 is needed for the described pair to
`pass through both cassettes. Stanchion 15 is integrally con
`nected with tray 3 such that when assembled, cassette(s) 2 are
`locked in place on tray 3.
`FIG. 5 illustrates an exemplary locking mechanism asso
`ciated with the present disclosure of assembly 100 wherein
`pins 13 lock in place by engaging a thumb tab 23 of tray 3.
`Typically, pins 13 define a groove (not shown) adapted to
`engage tab 23 thereby preventing pin 13 from being removed
`unless tab 23 is disengaged.
`In an exemplary embodiment of the present disclosure, a
`long hollow cylinder (not shown) is placed in hole 11 and is
`adapted to protect the fiber within each of cassette(s) 2 during
`pin 13 insertion. In certain embodiments, the long hollow
`cylinder is molded in the structure of cassette 2 during fabri
`cation of cassette 2. Hole 11 is typically located in the center
`of the top side of cassette(s) 2 such that, if the cassette is
`forcibly removed from assembly 100, the pin will shear the
`cassette and the internal fibers, thereby disabling the network
`and the connection. Moreover, assembly 100 can be adapted
`to alert network administrators, for example, if such a breach
`occurs, thus making assembly 100 tamper evident.
`
`

`

`US 7,509,015 B2
`
`10
`
`15
`
`25
`
`35
`
`5
`In an exemplary embodiment, analarmistriggered alerting
`the network administrator by the destruction of a cassette.
`Typically, the triggering is accomplished by the disruption of
`data transmission. For example, when a cassette is destroyed,
`data transfer is stopped thus alerting an administrator. Typi
`cally, alerts are generated from a software application asso
`ciated with the data transmission originating from a tam
`pered/destroyed cassette.
`As illustrated in FIG. 1, assembly 100 further includes: (i)
`a lock 8 on rear side door 5 of cabinet 1, thus allowing rear
`access to system administrators; and (ii) a lock 9 on front side
`door 4, thus allowing front side access to authorized users.
`Rear side door 5 access is typically given to administrator(s)
`who also has access to front side door 4. However, a user
`authorized to access front side door 4, does not have access to
`rear side door 5. Lock 8 on rear side door 5 and lock 9 onfront
`side door 4 are discretely keyed, thus a user having access to
`lock 9 on front side door 4 will not have access to lock 8 on
`rear side door 5.
`In an exemplary embodiment, assembly 100 includes tray
`limiter 17 adapted to lock tray 3 in place, thus preventing a
`front access user from moving tray 3. In order to slide tray 3
`out of position, for example, a user must disengage tray
`limiter 17 which can only be accessed through rear side 5. In
`an exemplary embodiment, assembly 100 is assembled
`according to the steps described below.
`An exemplary method associated with the present disclo
`Sure that is effective in securing network cassette assemblies
`includes a network installer unlocking door 4 and lock 8 on
`the rear of cabinet 1 and sliding tray 3 forward from position
`30
`A, as shown in FIG. 1, to position B, as shown in FIG. 2. A
`network installer is typically the only individual who simul
`taneously has access to both the front and rear of assembly
`100. Position B is an exemplary front patching position pro
`viding easy access to a front patch panel, but not exposing the
`rear cassette area. The installer then disengages limiter 17 as
`shown in FIG. 2, and slides the tray to position C, as shown in
`FIG. 3. Limiter 17 can be any limiting means such as, but not
`limited to, a spring pin or a fastener. The installer can then
`insert one or more cassettes 2 into assembly 100 on tray 3
`40
`through the opening of door 4 on the face of the front of
`assembly 100.
`The installer can insert a plurality of cassettes 2 depending
`upon the requirements of a desired network. To fill open ports
`in a drawerface, an installerinserts special panel blanks 21, as
`shown in FIG. 4. Blanks 21 also define holes 11 adapted to
`accept security pins 13. In an exemplary installation, the
`installer can then insert security pins 13 through the cassette
`and/or blanks and lock the pin into a hole of tray 3, thus fixing
`the cassette(s) and/or blank(s) in place.
`The tray is then placed back into position B, reengaging
`limiter 17, and the interconnect or backbone cabling is
`attached to corresponding cassettes 2 via a MPO connector on
`the rear of each of the cassettes 2. The cabling passes through
`a cable opening 12, adapted to prevent access to the internal
`components of assembly 100. Opening 12 can be, for
`example, a collet design providing strain relief adapted to
`prevent internal component access. Next, the installer verifies
`the network security level vs. the color code of the adapters
`for each of the ports on the front of the cabinet. The tray is then
`placed back into position A. The rear of the cabinet is then
`locked with lock 8, thus preventing access to limiter 17 and
`rear cassette channel ports. Although door 4 can also be
`locked, a front side access only user is prevented from access
`ing the rear of cassettes 2 without damaging a cassette 2 or
`assembly 100. Thus, a security breach can be immediately
`identified and corrected accordingly.
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`Alternative locking mechanism embodiments include, but
`are not limited to, inserting individual screws or pins through
`each cassette 2 and engaging tray 3. Individual screws can be
`threadedly engaged to tray 3 preventing removal of cassette 2.
`In an exemplary embodiment, a pin or a screw can be locked
`into tray 3 with or without a stanchion 15. Locking means
`typically engage pins 13 and/or screws (not shown) to tray 3
`and can be selected from the group consisting of a slide lock,
`a swivel lock, a swing latch (shown in FIG. 6), a thumb tab
`(shown in FIG. 5), or a combination therein. All engaging
`embodiments are adapted to prevent removal of security pins
`and/or screws unless the locking means are disengaged.
`FIG. 6 illustrates an exemplary embodiment of assembly
`100 wherein security pins 13 are released from tray 3 and
`disengaged from Swing latch 60. Pins 13 in this embodiment
`are not attached to stanchion 15. When locking cassettes 2 in
`place, each individual pin 13 is inserted through cassette(s) 2
`and engages latch 60. FIG. 7 illustrates an assembly 100
`associated with the present disclosure wherein pins 13 are
`inserted into cassettes 2 and engage latch 60 thereby prevent
`ing removal of pins 13 without first disengaging latch 60.
`Typically, pins 13 define a shoulder groove (not shown)
`adapted to integrally engage latch 60.
`In an exemplary embodiment, component materials for the
`cassette are made from plastic. It is also within the scope of
`the present disclosure to use metal (in whole or in part). Such
`as steel or aluminum for the component materials. An exem
`plary securing pin is made from metal. Typically, the fiber
`optic cabinet, tray, and stanchions are metal. To prevent forc
`ible extraction of a blank, which in certain embodiments may
`not disrupt data triggering a Software based alarm as
`described above, blanks can typically be entirely metal.
`Although reference is made to exemplary materials for form
`ing components and devices of the present disclosure, the
`disclosed systems and methods are not limited to such refer
`enced exemplary materials.
`The present disclosure offers assemblies and methods that
`advantageously improve network security. A locking mecha
`nism of the present disclosure provides for installing a net
`work cassette assembly into a drawer resulting in a user
`friendly network for a network administrator, while also pro
`viding a substantially tamper evident network. The assem
`blies and methods described herein allow for moves, adds and
`changes (MACS) as networks evolve with changing technol
`ogy. MACS can be facilitated by pin removal steps described
`above.
`Although the present disclosure has been described with
`reference to exemplary embodiments and implementations
`thereof, the disclosed assemblies and methods are not limited
`to Such exemplary embodiments/implementations. Rather, as
`will be readily apparent to persons skilled in the art from the
`description provided herein, the disclosed assemblies and
`methods are susceptible to modifications, alterations and
`enhancements without departing from the spirit or scope of
`the present disclosure. Accordingly, the present disclosure
`expressly encompasses such modification, alterations and
`enhancements within the scope hereof.
`What is claimed is:
`1. A secure network cassette assembly, comprising:
`(i) a cabinet having a front side and a rear side, wherein
`each of said front side and rear side is adapted to be
`locked;
`(ii) a cassette tray adapted to slide back and forth within
`said cabinet and hold a plurality of cassettes inserted into
`two or more open slots of a front patch panel disposed at
`the front side of the cabinet, and at least one panel blank;
`
`

`

`US 7,509,015 B2
`
`5
`
`10
`
`15
`
`7
`(iii) at least one cassette defining a hole adapted to allow for
`an insert pin to pass through said cassette and engage
`said cassette tray:
`(iv) at least one limiter inside said cabinet adapted to
`engage said cassette tray, the at least one limiter further
`adapted to prevent the cassette tray from sliding to a
`position where a user has rear access to the plurality of
`cassettes from the front side of the cabinet when the at
`least one limiter is engaged with the cassette tray;
`wherein the at least one panel blank covers one or more
`open slots in the front patch panel not holding a cassette,
`to prevent the user from having rear or internal access to
`the plurality of cassettes from the front side of the cabi
`net when the at least one limiter is engaged with the
`cassette tray:
`wherein the cabinet is configured and dimensioned to not
`allow the user to have access to the at least one limiter
`from the front side of the cabinet when the at least one
`limiter is engaged with the cassette tray: and
`wherein after the user disengages the at least one limiter
`from the cassette tray, the user may slide the cassettetray
`to a position where the user has rear access to the plu
`rality of cassettes from the front side of the cabinet.
`2. A secure network cassette assembly, comprising:
`(i) a cabinet having a front side and a rear side, wherein
`each of said front side and rear side is adapted to be
`locked;
`(ii) a cassette tray adapted to slide back and forth within
`said cabinet and hold a plurality of cassettes, inserted
`into two or more open slots of a front patch panel dis
`posed at the front side of the cabinet, and at least one
`panel blank;
`(iii) a plurality of cassettes, wherein each of said plurality
`of cassettes defines a hole adapted to allow for an insert
`pinto pass through said cassette and engage said cassette
`tray;
`(iv) at least one limiter inside said cabinet adapted to
`engage said cassette tray, the at least one limiter further
`adapted to prevent the cassette tray from sliding to a
`40
`position where a user has rear access to the plurality of
`cassettes from the front side of the cabinet when the at
`least one limiter is engaged with the cassette tray;
`wherein the at least one panel blank covers one or more
`open slots in the front patch panel not holding a cassette,
`to prevent the user from having rear or internal access to
`the plurality of cassettes from the front side of the cabi
`net when the at least one limiter is engaged with the
`cassette tray:
`wherein the cabinet is configured and dimensioned to not
`allow the user to have access to the at least one limiter
`from the front side of the cabinet when the at least one
`limiter is engaged with the cassette tray: and
`wherein after the user disengages the at least one limiter
`from the cassette tray, the user may slide the cassettetray
`to a position where the user has rear access to the plu
`rality of cassettes from the front side of the cabinet.
`3. An assembly according to claim 2, wherein: (i) said
`cabinet is adapted to hold as many of said plurality of cas
`settes as are necessary for a desired network and panel blanks
`are placed in any remaining open slot positions not holding a
`cassette; and (ii) each of said panel blanks defines a hole
`adapted to allow for an insert pin to pass through said panel
`blank and engage said cassette tray.
`4. An assembly according to claim 2, wherein said hole is
`placed in a position on each of said plurality of cassettes Such
`that if any of said cassettes were forcibly removed from said
`
`30
`
`8
`cabinet, said insert pin associated with said removed cassette
`will destroy said removed cassette.
`5. An assembly according to claim 4, wherein destroying
`any of said plurality of cassettes will cause an alarm to alert
`that a breach of security has occurred.
`6. An assembly according to claim 2, wherein said insert
`pins are attached to a stanchion integrally connected to said
`cassette tray.
`7. An assembly according to claim 2, wherein said limiter
`is selected from the group consisting of a springpin, a fas
`tener, and a combination thereof
`8. An assembly according to claim 2, wherein said insert
`pins define a groove adapted to engage a locking means and
`are locked to said cassette tray by said locking means.
`9. An assembly according to claim 8, wherein said locking
`means is selected from the group consisting of a screw, a
`Swivel lock, a slide lock, a Swing latch, a thumb tablock and
`combinations thereof.
`10. An assembly according to claim 2, wherein a cylinder
`is positioned inside each of said holes on each of said plurality
`of cassettes, said cylinder being adapted to: (i) allow said
`insert pinto pass through each of said plurality cassettes; and
`(ii) prevent damage to internal components of said cassette
`11. A method of securing a network cassette assembly,
`comprising the steps of
`(i) providing a cabinet having a front side and a rear side,
`wherein each of said frontside and rear side is adapted to
`be locked
`ii) providing a cassette tray adapted to slide back and forth
`within said cabinet and hold a plurality of cassettes and
`at least one panel blank:
`(iii) providing a front patch panel comprising a plurality of
`open slots, and disposed at the front side of the cabinet;
`(iv) inserting the plurality of cassettes into two or more
`open slots of the front patch panel;
`(v) placing the at least one panel blank over the remaining
`one or more open slots in the front patch panel; (vi)
`inserting an insert pin into a hole defined on each of said
`plurality of cassettes, wherein each hole is adapted to
`allow for said insert pinto pass through said cassette and
`engage said cassette tray:
`(vii) sliding said cassette tray into a first position that
`engages at least one limiter inside said cabinet, wherein:
`(a) the at least one limiter is adapted to prevent said
`cassette tray from sliding to a second position where a
`user has rear access to the plurality of cassettes from the
`front door of the cabinet when the at least one limiter is
`engaged with the cassette tray, (b) the cabinet is config
`ured and dimensioned to not allow the user to have
`access to the at

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket