US20150040453A1 - Weapon control system - Google Patents

Weapon control system Download PDF

Info

Publication number
US20150040453A1
US20150040453A1 US14/224,029 US201414224029A US2015040453A1 US 20150040453 A1 US20150040453 A1 US 20150040453A1 US 201414224029 A US201414224029 A US 201414224029A US 2015040453 A1 US2015040453 A1 US 2015040453A1
Authority
US
United States
Prior art keywords
firearm
control module
communication
bet
token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/224,029
Inventor
Claudio R. Ballard
Tyler Delucia
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
POTENS IP HOLDINGS LLC
Original Assignee
POTENS IP HOLDINGS LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by POTENS IP HOLDINGS LLC filed Critical POTENS IP HOLDINGS LLC
Priority to US14/224,029 priority Critical patent/US20150040453A1/en
Publication of US20150040453A1 publication Critical patent/US20150040453A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41AFUNCTIONAL FEATURES OR DETAILS COMMON TO BOTH SMALLARMS AND ORDNANCE, e.g. CANNONS; MOUNTINGS FOR SMALLARMS OR ORDNANCE
    • F41A17/00Safety arrangements, e.g. safeties
    • F41A17/06Electric or electromechanical safeties
    • F41A17/066Electric or electromechanical safeties having means for recognizing biometric parameters, e.g. voice control, finger print or palm print control
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41AFUNCTIONAL FEATURES OR DETAILS COMMON TO BOTH SMALLARMS AND ORDNANCE, e.g. CANNONS; MOUNTINGS FOR SMALLARMS OR ORDNANCE
    • F41A17/00Safety arrangements, e.g. safeties
    • F41A17/06Electric or electromechanical safeties
    • F41A17/063Electric or electromechanical safeties comprising a transponder

Definitions

  • the following disclosure relates to weapons/firearms, e.g., rifles and handguns, having a system for biometric user identification and authentication, and for methods of using same. More specifically, it relates to a firearm having an operational interlock utilizing a token-based biometrically enabled system for the continuous physical presence validation of the user.
  • the first category of identity validation/personal identification techniques is known as “What You Know”. This technique involves the act of conveying a piece of information that is personally known to an individual, which can be independently verified against a repository of such known information previously acquired from said individual who wishes to have their identity validated.
  • Pros of the “What You Know” technique include: i) something that is always in your possession and readily and conveniently available; and ii) cannot be easily stolen by an imposter.
  • Cons of the “What You Know” technique include: i) if forgotten, the valid individual is no longer able to validate their identity; ii) so-called “password cracking software” is now readily available on the Internet, often at little or no cost, rendering all but the most robust identity systems easily comprised; and iii) modern password security measures call for robust passwords NOT based upon your birthday, mother's maiden, and the like, which constitutes information that is often easily obtainable by imposters. Typically such robust passwords require a reasonably long string (8 or more characters) consisting of a random set of letters and numbers. The average person, unfortunately, has difficulty remembering “robust passwords” often leading people to write down their “robust passwords” making it readily accessible for easy referral—and unfortunately, often to imposters as well
  • the second category of identity validation/personal identification techniques is known as “What You Have”. This technique requires the person to possess on or in their physical person a tangible physical foreign object, such as a drivers license, an ID badge, or even chips that can be embedded just under the skin—all collectively and commonly known in the field of identity validation as a “token”.
  • a token is intended to provide proof of identity by the mere physical possession of it by the person being validated.
  • Pros of the “What You Have” technique include: i) the token is usually small and portable in nature, easy to keep on your person; ii) depending on the technology being deployed, the token can deliver extremely robust device level validation that cannot be readily comprised; and iii) typically affords instant validation either via visual means or wireless electronic methods
  • Cons of the “What You Have” technique include: i) if the person being validated loses physical possession of the token they are no longer able to be validated—despite being the valid person; ii) if an imposter gains possession of the token, they can be falsely validated; and iii) if the token becomes damaged or otherwise unusable, the valid person is no longer able to validate their identity.
  • the third category of identity validation/personal identification techniques is known as “Who You Are”. This technique relies on one or more human physical and/or behavioral attributes of a given individual that can be measured accurately and with consistent repeatability. These attributes include but are not limited to fingerprints, iris scans, retinal scans, facial scans, vein scans or even such things as the manner in which a person may perform certain actions as in the manner of speaking words, phrases, typing or even physical act of walking—collectively referred to as biometrics.
  • Pros of the “Who You Are” technique include: i) it uses an inherent physical or behavioral attribute of a person's physical being—so it is always with the person and generally cannot be lost or misplaced; and ii) there is nothing to remember or lose or have an imposter guess or steal.
  • Cons of the “Who You Are” technique include: i) currently, most biometric technology ergonomics does not lend themselves well to ease and rapidity of use; and ii) depending on the security needs of a given environment, offset against the practicality of the identity validation frequency and environment specific requisite identification quality in many cases would simply rule out the use of biometrics on a continuous basis throughout the day due to the nature of a given biometric technology and the associated probability of false positives versus false negative tuning issues.
  • Identity Enrollment is the process of providing and/or discovering personal information for a physical person who desires to enroll their identity into a given BIM system. Once the personal information has been gathered and satisfactorily processed and accepted into the BIM according to the BIM specific enrollment rules, said information is associated with the given person's biometric.
  • Identity Verification is the process of retrieving the identity of a person who wishes to identify themselves in order to gain access to a secure service and/or physical perimeter area. Identity verification is further broken down into two specific areas (subprocesses), namely, Personal Identity Determination and Personal Identity Authentication. Each subprocess is further described below.
  • Personal Identity Determination is the process (i.e., subprocess) by which a person supplies their biometric (finger scan, iris scan, etc.) which is then submitted to the BIM for a search—otherwise known as a “one to many” (i.e., “1:M”) lookup.
  • biometric finger scan, iris scan, etc.
  • search alsowise known as a “one to many” (i.e., “1:M”) lookup.
  • the identity of the person is not necessarily known up front, and is therefore determined solely from the supplied biometric.
  • Such a method is usually very slow and can more likely lead to false positives or negatives.
  • Most biometric searches do NOT lend themselves to 1:M lookup, with the exception of iris scanning which intrinsically is designed for 1:M lookup. For example, when certain popular television crime scene shows have the investigator performing a search of a finger print, in reality, such a process can take hours and even days.
  • Personal Identity Authentication is the process (i.e., subprocess) by which a person supplies an identity indicator as well as a biometric to the BIM.
  • the identity indicator of the person may be one or more name, password, access code, PIN or other identifier that is linked to (i.e., associated with) the person's biometric in the BIM.
  • the BIM can quickly determine if the biometric submitted for the person matches the identity indicator submitted, typically using a “one to one” (i.e., “1:1”) lookup or a “one to few” lookup. Such methods are usually much faster that a 1:M lookup and less likely to lead to false positives or negatives.
  • iris scanning ideally could be deployed at these sensitive access points, but as a practical matter, due to the ergonomically inhibiting nature of this type of biometric technology, that by definition requires a pro-active interaction by the person being validated, tends to be impractical and therefore not a viable means of maintaining security in geographically sensitive areas.
  • a firearm control system for either the new manufacture or retrofit of existing firearms to support several features—an electronically controlled interlock system in the weapon that may be used to prevent the trigger from being pulled, and the use of GPS/Mobile/WiFi wireless communications that are used to determine the physical geographic location of the given firearm, such that if it is in a school and the carrier of the weapon is not authorized to be on the campus of the school (such as a student or an extraneous third party coming onto the campus) the Cloud-based service disarms or otherwise disables the weapon so that it may not be used.
  • a firearm control system uses biometrics to control the operation of a firearm, namely if you are not the registered user then it cannot be fired.
  • a biometrically-enabled token (“BET token” or “B.E.T.”) would be used, wherein the carrier of the controlled weapon would wear such a BET token (bracelet, ring, etc.) that would be validated via a biometrics and once so validated, would remain in constant communication with the weapon so the carrier could fire it. If the gun becomes separated by a certain (pre-determined) distance, then the gun becomes disabled and when back in range of the BET token it would become re-enabled.
  • the carrier of the weapon removes the BET token, it is immediately disabled and the weapon would automatically become disabled as well, and then to re-enable the weapon, the carrier would have to go through the re-enablement of the BET token and then the gun would be ready for use.
  • a firearm control system for a firearm authorized for use by a person having a validated identity comprises a firearm having a frame, barrel, firing mechanism and trigger, the trigger being operatively connected to the firing mechanism such that selective operation of the trigger causes the firing mechanism to operate and fire the firearm.
  • An interlock system for enabling and disabling operation of the firearm, the interlock system being disposed on the frame and including a communications/control module, a trigger module operatively connected to the communication/control module to send and receive signals therebetween, and operatively connected to the trigger to sense attempted operation of the trigger by a user and send signals to the communications/control module, and a firing mechanism module operatively connected to the communication/control module to send and receive signals therebetween, and to the firing mechanism to enable or disable operation of the firing mechanism.
  • the interlock system operates to enable and disable operation of the firearm based on signals sent to, and received from, the communications/control module.
  • the communication/control module receives external signals indicative of current validated identity information and, upon receipt of signals from the trigger module, the communication/control module compares the current validated identity information to a predetermined validated identity of the authorized user stored in the interlock system, and sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the validated identities do not match.
  • the communication/control module receives external signals indicative of a current geographic location of the firearm and, upon receipt of signals from the trigger module, the communication/control module compares the current geographic location to a list of prohibited locations stored in the interlock system, and the sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the current geographic location is a prohibited location.
  • the firearm control system further comprises a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user.
  • BET includes a body and a BET communication/control module attached to the body.
  • the BET communication/control module communicates with the communication/control module of the firearm to send signals indicative of current validated identity information.
  • the BET communication/control module communicates with the communication/control module of the firearm to send signals indicative of the distance between the BET token and the firearm.
  • the BET communication/control module communicates with the communication/control module of the firearm to send signals indicative that the BET token was removed from the authorized user.
  • two or more such methods such as a pin number or password
  • two factor or “multi factor” identification/authentication process
  • an identity authentication system calls for at least a two factor identification/authentication process that in the preferred embodiment integrates the “Who You Are” and the “What You Have” methods of identify validation into a seamless identity validation and continuous physical presence validation system that provides a robust physical access entry point identity validation means to confirm one's identity followed by a continuous and equally robust means of confirming identity of the given person once within a controlled security perimeter while preventing ingress and egress by imposters attempting to gain unauthorized access or by authorized personnel once in a secure perimeter from either intentionally or unintentionally moving into restricted areas within the secure perimeter where the given person should not be able access.
  • the system executes an appropriately robust identity validation method that would comprise any of the token (“What you have”) identity validation methods coupled with biometric validation (“Who you are”), at which time, assuming the person seeking access is indeed validated to the extent required by the security rules in place, a token is placed on their person in such a manner that once on the person, it is associated with the person so during subsequent times while in the secure perimeter, a person's legitimate presence can be validated purely by the act of having physical possession of the token.
  • tokens contemplated by the invention designed to offer differing degrees of personal presence validation security of the person in question predicated by the degree of security required in a given secure perimeter environment.
  • a passive token is utilized, wherein the passive token requires the person in question to display it or otherwise actively present it to some sort of reader so that it may be read and validated against a database to validate the person's physical presence.
  • an active token is utilized, wherein the active token is electronically and securely activated and simultaneously associated with the now validated identity of the person seeking access.
  • the token has the capability that in the event once the token is properly activated and associated with the person seeking access, should that person remove the token and/or attempt to transfer the token to an imposter, the mere act of removing the token from the person would deactivate/disable the token in such a manner that the token sensing devices within the physically secure perimeter would immediately sense the event and appropriate notification would be instantly issued so that the appropriate security rules would be invoked in order to address the transgression.
  • a method for ensuring continuous personal physical validation, the method comprising the following steps: obtaining unique personal identification information to validate an identity of a person, wherein validating the identity results in a validated identity; activating a physical token; associating the physical token with the validated identity, wherein the physical token represents the validated identity within a defined environment after the steps of activating and associating are performed; placing the physical token on the person, wherein the physical token is configured to detect removal of the physical token from the person after being placed on the person and is further configured to deactivate the physical token when such removal is detected; monitoring the physical token by at least one token sensing device within the defined environment, wherein deactivation of the physical token produces an event that is sensed by the token sensing device; and issuing a notification when the event occurs.
  • the step of obtaining unique personal identification information includes a two factor identification process.
  • the two factor identification process includes at least one “Who You Are” identification process and at least one “What You Have” identification process.
  • the “Who You Are” identification process involves biometric validation of the person and the “What You Have” identification process involves a token-based validation of the person.
  • the physical token associated with the validated identity was not used in the step of obtaining unique personal identification information.
  • the defined environment an area is within a controlled security perimeter having limited ingress and egress.
  • an embedded device is provided for use in systems and methods in accordance with additional embodiments.
  • a medicinal administration device and companion token are provided for use in systems and methods in accordance with still further embodiments.
  • FIG. 1 shows a system for weapon/firearm control in accordance with one aspect
  • FIG. 2 shows a method for weapon/firearm control in accordance with another aspect.
  • the weapon/firearm control system 100 includes a firearm 102 and a biometrically enabled token 104 (“BET token” or “B.E.T.”).
  • the firearm 102 may be, but is not limited to, a rifle, pistol or shotgun.
  • the firearm 102 may be of new manufacture, or it may be an existing firearm retrofitted to operate with the system 100 .
  • the firearm 102 includes a frame 106 , a barrel 108 , a firing mechanism 109 and a trigger 110 .
  • the trigger 110 is operatively connected to the firing mechanism 109 such that selective operation of the trigger causes the firing mechanism to operate and fire the firearm 102 .
  • a safety mechanism 111 may be interposed between the trigger 110 and the firing mechanism 109 to prevent accidental operation of the firearm 102 .
  • the safety mechanism 111 is a grip safety.
  • the firearm 102 further includes an interlock system 112 for enabling and disabling operation of the firearm.
  • the interlock system 112 includes a communications/control module 114 , a trigger module 116 and a firing mechanism module 118 .
  • the interlock system 112 may be disposed in the frame 106 or other portions of the firearm 102 .
  • the interlock system 112 operates to enable and disable operation of the firearm 112 based on signals sent to, and received from, the communications/control module 114 .
  • the trigger module 116 is operatively connected to the trigger 110 (denoted by arrow 120 ) to sense attempted operation of the trigger by a user.
  • the trigger module 116 Upon such attempted operation of the trigger 110 , the trigger module 116 sends signals (denoted by arrow 122 ) to the communications/control module 114 . Further in the illustrated embodiment, the firing mechanism module 118 is operatively connected to the firing mechanism 109 (denoted by arrow 124 ) to enable or disable operation of the firing mechanism.
  • the trigger module 116 Upon attempted operation of the trigger 110 , the trigger module 116 sends signals 122 to the communications/control module 114 .
  • the communication/control module 114 has information regarding the validated identity of the user and/or information regarding the geographic location of the firearm 102 .
  • the communication/control module 114 Upon receipt of signals 122 from the trigger module 116 , the communication/control module 114 evaluates the circumstances according to predetermined instructions stored in the interlock system 112 , and then sends responsive signals (denoted by arrow 126 ) to the firing mechanism module 118 that either enable or disable operation of the firing mechanism 109 , and thus that either enable or disable operation of the firearm 102 .
  • the functions of the trigger module 116 and firing mechanism module 118 may be combined into a single module (not shown) to selectively block the trigger 110 from operation upon command from the communications/control module 114 , rather than by affecting operation of the firing mechanism 109 itself.
  • the functions of the trigger module 116 and/or firing mechanism module 118 may selectively enable and disable the safety 111 upon command from the communications/control module 114 , and thereby control operation of the firearm 102 .
  • the communications/control module 114 may include GPS-/mobile (i.e., cellular)-/ and/or WiFi-enabled wireless communications (denoted by arrow 128 ) that allow the interlock system 112 to communicate with one or more data communication networks 129 including, but not limited to, the Internet, cellular and/GPS satellite networks.
  • GPS-/mobile i.e., cellular
  • WiFi-enabled wireless communications denoted by arrow 128
  • the communications/control module 114 may include GPS-/mobile (i.e., cellular)-/ and/or WiFi-enabled wireless communications (denoted by arrow 128 ) that allow the interlock system 112 to communicate with one or more data communication networks 129 including, but not limited to, the Internet, cellular and/GPS satellite networks.
  • Such communication functionality allows the interlock system 112 to determine the physical geographical location of the firearm 102 at any given time.
  • This communication functionality may further allow an external administrator 130 to determine the physical geographical location of the firearm 102 by communicating (den
  • the firearm control system 100 uses the Internet, cellular and/GPS satellite network communication 128 to determine if the firearm 102 is geographically within a school, campus or other geographic location that is not authorized for firearm use. If so, the interlock system 112 is instructed to disable the firearm 102 ; otherwise, the interlock system is instructed to enable the firearm for use. In another embodiment, the firearm control system 100 uses both the geographic information obtained from the Internet, cellular and/GPS satellite network communications 128 and the validated identity of the user (provided by the BET token 104 as herein described) to determine if the firearm 102 is geographically within a school, campus or other geographic location where the validated user is not authorized for firearm use.
  • the interlock system 112 is instructed to disable the firearm 102 ; otherwise, the interlock system is instructed to enable the firearm for use.
  • the latter embodiment has the advantage of allowing authorized users with a validated identity (e.g., law enforcement personnel) to have an enabled firearm 102 even in a geographic location (such as a school) that is otherwise prohibited for firearm use.
  • the instructions in the interlock system 112 may be changed by means of communications 128 received from the network 129 . This allows a remote, e.g., “cloud-based”, administrator 130 to monitor and/or change the instruction in the interlock system 112 .
  • the weapon/firearm control system 100 is the use of biometrics to control the operation of the firearm 102 , e.g., if you are not the registered (i.e., authorized and/or validated) user of the firearm, then it is disabled from operation (i.e., firing).
  • the BET (biometrically-enabled token) 104 facilitates the use of such biometrics in the system 100 .
  • the BET token 104 is configured as a bracelet, ring or other accessory that can be worn or carried by the user of the handgun 102 .
  • the BET token 104 is configured as a ring.
  • the BET token 104 may include a body 132 and a BET communication/control module 134 attached to or disposed within the body. In FIG. 1 , the module 134 is shown enlarged for purposes of illustration.
  • the module 134 may communicate with the communication/control module 114 of the firearm 102 directly (denoted by signals 134 ), by means of the network 129 (denoted by signals 138 ) or both. In addition, the module 134 may communicate with a remote administrator 130 via the communication network 129 .
  • the BET token 104 and the interlock system 112 further have the combined functionality to determine the distance (denoted D) between the firearm 102 and the BET token.
  • the method 200 includes the following steps. First (block 202 ), unique personal identification information is obtained to validate an identity of an authorized firearm carrier. In a preferred embodiment, the method 200 executes a two-factor identity validation method that comprises any of the token-based (“What you have”) identity validation methods coupled with a biometric-based (“Who You Are”) identity validation method. Validating the identity results in a validated identity. In other words, the authorized user (i.e., carrier) of the firearm 102 obtains a validated identity using biometrics. Next (block 204 ), a BET token 104 is activated.
  • the physical BET token 104 is associated with the validated identity 208 .
  • the BET token 104 represents the validated identity (of the authorized user) in proximity to the firearm 102 . Once activated via the biometrics, the BET token 104 remains in constant communication with the firearm 102 .
  • the physical BET token 104 is placed on the authorized user.
  • the BET token 104 is configured to detect removal of the BET token from the user after being placed on the user.
  • the BET token 104 is further configured to deactivate the BET token (i.e., itself) when such removal is detected.
  • the BET token 104 may be a passive token
  • the BET token 104 is configured to detect if it is removed from the person of the authorized user. In the event the authorized user/carrier of the firearm 102 removes the BET token 104 (or if it is lost or stolen), the BET token 104 is immediately disabled, thereby also causing the interlock system 112 to disable the firearm 102 . In some such embodiments, the authorized user/carrier may have to repeat the biometric identity validation process (blocks 206 , 208 ) to re-enable the BET token 104 , and thus to re-enable the firearm 102 , such that the firearm is again ready for use (block 212 ).
  • a method for ensuring continuous personal physical validation includes the following steps: First, unique personal identification information is obtained to validate an identity of a person.
  • the system executes a two-factor identity validation method that comprises any of the token-based (“What you have”) identity validation methods coupled with a biometric-based (“Who You Are”) identity validation method. Validating the identity results in a validated identity.
  • a physical token is activated.
  • the physical token is associated with the validated identity.
  • the physical token represents the validated identity within a defined environment after the steps of activating and associating are performed.
  • the physical token is placed on the person.
  • the physical token is configured to detect removal of the physical token from the person after being placed on the person.
  • the physical token is further configured to deactivate the physical token (i.e., itself) when such removal is detected.
  • the token may be a passive token.
  • the person with the physical token is allowed entry into the defined environment.
  • the defined environment will be a secure area having limited ingress and egress.
  • the physical token is monitored by at least one token sensing device within the defined environment. Deactivation of the physical token produces an event that is sensed by the token sensing device.
  • the event may be active, e.g., a radio signal sent from the physical token to the token sensing device, while in other embodiments the event may be passive, e.g., a change to a memory value on the physical token that can be detected when interrogated by the token sensing device.
  • a notification is issued when the event (i.e., deactivation of the token) occurs.
  • the notification may be sent to recipients within the defined environment and/or to recipients outside the defined environment, e.g., via a data communication network, such as the Internet or other network.
  • a further system and method in accordance with another aspect includes an embedded device comprising a GPS-/mobile (cellular)-/WiFi- and/or biometric-enabled token chip that may be affixed to, embedded in or implanted in people's apparel including, but not limited to, shirts, shoes, watches, necklaces, belts.
  • the embedded device may operate substantially as the physical token previously described in connection with FIGS. 1 and 2 .
  • the embedded device may identify where a given (e.g., validated) person physically is, so that when combined with certain pre-determined cloud based parameters, notifications and/or alerts may be triggered that may drive certain actions.
  • a user with “Administration” privileges (“Admin User”) may establish rules and/or geographic area perimeters on a map via the web or mobile device by identifying “known” locations and setting a variety of parameters such geographic special perimeters. For example, a school may be designated as a defined location, wherein the Admin User may drop a virtual pin on the map, and then expand an area into a perimeter around the defined location (i.e., around the school). Next, when a person (“student”) wearing the apparel with embedded device enters an approved perimeter area the Admin User (and/or others previously established by the Admin User) may receive corresponding notification. If and when the given student leaves the approved area, additional notifications are sent as previously described. Thus, the Admin User (and other designated recipients) may track the movement of the student wearing the embedded device via web or mobile interface.
  • the student carries a second token on their person such as bracelet, keychain, etc.
  • the second token may include wireless connectivity. If any apparel with embedded device becomes separated by too much distance D (a user-configurable amount) from the second token, then a notification may be sent to predefined recipients.
  • the embedded device may be implanted directly onto or into a validated person's body, wherein data such as medical history, payment options, etc. can be constantly updated.
  • a detector device e.g., a ceiling-based sensor or floor-based sensor
  • the data in the embedded device may be retrieved and accessed.
  • a doctor's office for information in the validated person's embedded device may be instantly made available to the medical personnel supported by optional password and/or biometric security, so that only personnel authorized by the person having the embedded device would permit the data exchange to take place.
  • This overall system for the embedded device comprises physical devices (products) along with supporting software and cloud based data facilities.

Abstract

A firearm control system for a firearm authorized for use by a person having a validated identity comprises a firearm having a frame, barrel, firing mechanism and trigger. An interlock system is provided for enabling and disabling operation of the firearm, the interlock system being disposed on the frame and including a communications/control module, a trigger module operatively connected to the communication/control module, and operatively connected to the trigger to sense attempted operation of the trigger by a user and send signals to the communications/control module, and a firing mechanism module operatively connected to the communication/control module, and to the firing mechanism to enable or disable operation of the firing mechanism. The interlock system operates to enable and disable operation of the firearm based on signals sent to, and received from, the communications/control module.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims benefit of U.S. Provisional Application No. 61/804,345, filed Mar. 22, 2013, entitled WEAPON CONTROL SYSTEM (Atty. Dkt. No. VMPT-31662), which is herein incorporated by reference in its entirety.
  • TECHNICAL FIELD
  • The following disclosure relates to weapons/firearms, e.g., rifles and handguns, having a system for biometric user identification and authentication, and for methods of using same. More specifically, it relates to a firearm having an operational interlock utilizing a token-based biometrically enabled system for the continuous physical presence validation of the user.
  • BACKGROUND
  • In light of recent crimes involving firearms, namely, handguns and rifles, in schools and on school campuses, there is an ever-growing concern about the use of such weapons in these environments. A need therefore exists, for a firearm that is disabled from use in certain environments.
  • In other circumstances, injury or death may occur when a firearm is used by a child or other person that is not authorized to use the firearm. A need therefore exists, for a firearm that is disabled from use by anyone other than an authorized user.
  • The ability to positively identify an individual grows increasingly important with every passing day, particularly given the widespread proliferation of information system technology that permeates are daily lives. From the use of an ATM machine, to logging onto your favorite website on through Homeland Security initiatives, the ability to quickly, efficiently, and most of all, positively identify someone, while not overly intruding upon or burdening the person's daily life grows increasingly at odds with the very need to fulfill adequate identity validation.
  • Traditional identity validation or personal identification techniques are well understood and fall into three basic categories as further explained below.
  • The first category of identity validation/personal identification techniques is known as “What You Know”. This technique involves the act of conveying a piece of information that is personally known to an individual, which can be independently verified against a repository of such known information previously acquired from said individual who wishes to have their identity validated.
  • Pros of the “What You Know” technique include: i) something that is always in your possession and readily and conveniently available; and ii) cannot be easily stolen by an imposter.
  • Cons of the “What You Know” technique include: i) if forgotten, the valid individual is no longer able to validate their identity; ii) so-called “password cracking software” is now readily available on the Internet, often at little or no cost, rendering all but the most robust identity systems easily comprised; and iii) modern password security measures call for robust passwords NOT based upon your birthday, mother's maiden, and the like, which constitutes information that is often easily obtainable by imposters. Typically such robust passwords require a reasonably long string (8 or more characters) consisting of a random set of letters and numbers. The average person, unfortunately, has difficulty remembering “robust passwords” often leading people to write down their “robust passwords” making it readily accessible for easy referral—and unfortunately, often to imposters as well
  • The second category of identity validation/personal identification techniques is known as “What You Have”. This technique requires the person to possess on or in their physical person a tangible physical foreign object, such as a drivers license, an ID badge, or even chips that can be embedded just under the skin—all collectively and commonly known in the field of identity validation as a “token”. A token is intended to provide proof of identity by the mere physical possession of it by the person being validated.
  • Pros of the “What You Have” technique include: i) the token is usually small and portable in nature, easy to keep on your person; ii) depending on the technology being deployed, the token can deliver extremely robust device level validation that cannot be readily comprised; and iii) typically affords instant validation either via visual means or wireless electronic methods
  • Cons of the “What You Have” technique include: i) if the person being validated loses physical possession of the token they are no longer able to be validated—despite being the valid person; ii) if an imposter gains possession of the token, they can be falsely validated; and iii) if the token becomes damaged or otherwise unusable, the valid person is no longer able to validate their identity.
  • The third category of identity validation/personal identification techniques is known as “Who You Are”. This technique relies on one or more human physical and/or behavioral attributes of a given individual that can be measured accurately and with consistent repeatability. These attributes include but are not limited to fingerprints, iris scans, retinal scans, facial scans, vein scans or even such things as the manner in which a person may perform certain actions as in the manner of speaking words, phrases, typing or even physical act of walking—collectively referred to as biometrics.
  • Pros of the “Who You Are” technique include: i) it uses an inherent physical or behavioral attribute of a person's physical being—so it is always with the person and generally cannot be lost or misplaced; and ii) there is nothing to remember or lose or have an imposter guess or steal.
  • Cons of the “Who You Are” technique include: i) currently, most biometric technology ergonomics does not lend themselves well to ease and rapidity of use; and ii) depending on the security needs of a given environment, offset against the practicality of the identity validation frequency and environment specific requisite identification quality in many cases would simply rule out the use of biometrics on a continuous basis throughout the day due to the nature of a given biometric technology and the associated probability of false positives versus false negative tuning issues.
  • Further with respect to the “Who You Are” category of biometrically-enabled techniques, there are two basic processes that must take place in connection with a modern digital biometric identity management (BIM) system, namely, Identity Enrollment and Identity Verification. Each process is further described below.
  • Identity Enrollment is the process of providing and/or discovering personal information for a physical person who desires to enroll their identity into a given BIM system. Once the personal information has been gathered and satisfactorily processed and accepted into the BIM according to the BIM specific enrollment rules, said information is associated with the given person's biometric.
  • Identity Verification is the process of retrieving the identity of a person who wishes to identify themselves in order to gain access to a secure service and/or physical perimeter area. Identity verification is further broken down into two specific areas (subprocesses), namely, Personal Identity Determination and Personal Identity Authentication. Each subprocess is further described below.
  • Personal Identity Determination is the process (i.e., subprocess) by which a person supplies their biometric (finger scan, iris scan, etc.) which is then submitted to the BIM for a search—otherwise known as a “one to many” (i.e., “1:M”) lookup. In this environment, the identity of the person is not necessarily known up front, and is therefore determined solely from the supplied biometric. Such a method is usually very slow and can more likely lead to false positives or negatives. Most biometric searches do NOT lend themselves to 1:M lookup, with the exception of iris scanning which intrinsically is designed for 1:M lookup. For example, when certain popular television crime scene shows have the investigator performing a search of a finger print, in reality, such a process can take hours and even days.
  • Personal Identity Authentication is the process (i.e., subprocess) by which a person supplies an identity indicator as well as a biometric to the BIM. The identity indicator of the person may be one or more name, password, access code, PIN or other identifier that is linked to (i.e., associated with) the person's biometric in the BIM. In this environment, since the apparent identity of the person is known up front, the BIM can quickly determine if the biometric submitted for the person matches the identity indicator submitted, typically using a “one to one” (i.e., “1:1”) lookup or a “one to few” lookup. Such methods are usually much faster that a 1:M lookup and less likely to lead to false positives or negatives.
  • In highly secure physical perimeter security environments, such as might be found in airports, financial trading floors, pharmaceutical drug company laboratories, nuclear power plants, military facilities, and so on, there is need to reliably verify the identity of personnel as they initially gain access to a secure facility and as they ingress, egress and move about within secure perimeter environments within such facilities. Depending upon the level of security necessary in a given perimeter scenario, will often dictate a degree of compromise between the robustness of identity validation and physical presence detection and convenience and ease of use of same.
  • Since modern biometric systems continue to exhibit systemic ergonomic problems that inhibit widespread deployment, existing biometric technologies alone are not adequate to provide secure high speed identity validation on a continuous basis other than in the very low level security environments. It is well known, for example, that finger scanner based security is not very robust and can result in excessive false negatives or positives depending on the manner in which the finger scanner is configured. Iris scanning today represents the most robust and rapid biometric technology of all known biometric technologies, boasting statistically negligible level of false positives or negatives. However, given the state of modern iris scanning devices, namely a digital camera tuned to infrared frequencies, a person being validated must carefully and precisely position them self in front of the iris scan camera so an image of the iris image can be captured, a process that can be time consuming and frustrating—leading to an unwillingness to use the technology due to “inconvenience and hassle factors.”
  • A real world example of where robust biometrics would be ideal but are not currently practical is in a high security environment such as would be found at an airport where a variety of people work on premises on a daily basis—such as ticket agents, baggage handlers, airplane mechanics, food transport personnel and even TSA personnel who are most directly responsible for security. In all of the aforementioned circumstances, positive identification is mandatory to minimize security risks, not only to confirm someone's identity when they report for work, but to ensure said person does not access unauthorized areas—such as a food court employee wandering out to the tarmac where airplanes are being refueled and baggage is being loaded and unloaded. Equally important to preventing unauthorized space access, is to know when such accesses are attempted and by whom—knowing failed access attempts is equally important as knowing valid access attempts.
  • In virtually all instances other than emergencies, unauthorized physical access very likely can only mean ulterior motives ranging from crimes of theft on up through acts of terrorism that may involve the undetected smuggling of weapons or contraband onto a airplane. With many existing security measures in such environments, an imposter might need to don the appropriate uniform such as a baggage handler might wear, obtain an identity badge (and possibly alter it if it exhibited a photo of the legitimate employee) and possibly even obtain an access code to unlock certain electronically actuated doors or access points in order to gain unauthorized access to sensitive areas. Therefore, in an ideal world, iris scanning ideally could be deployed at these sensitive access points, but as a practical matter, due to the ergonomically inhibiting nature of this type of biometric technology, that by definition requires a pro-active interaction by the person being validated, tends to be impractical and therefore not a viable means of maintaining security in geographically sensitive areas.
  • SUMMARY
  • In one aspect, a firearm control system is provided for either the new manufacture or retrofit of existing firearms to support several features—an electronically controlled interlock system in the weapon that may be used to prevent the trigger from being pulled, and the use of GPS/Mobile/WiFi wireless communications that are used to determine the physical geographic location of the given firearm, such that if it is in a school and the carrier of the weapon is not authorized to be on the campus of the school (such as a student or an extraneous third party coming onto the campus) the Cloud-based service disarms or otherwise disables the weapon so that it may not be used.
  • In another aspect, a firearm control system uses biometrics to control the operation of a firearm, namely if you are not the registered user then it cannot be fired. In a preferred implementation, a biometrically-enabled token (“BET token” or “B.E.T.”) would be used, wherein the carrier of the controlled weapon would wear such a BET token (bracelet, ring, etc.) that would be validated via a biometrics and once so validated, would remain in constant communication with the weapon so the carrier could fire it. If the gun becomes separated by a certain (pre-determined) distance, then the gun becomes disabled and when back in range of the BET token it would become re-enabled. Furthermore, in the event the carrier of the weapon removes the BET token, it is immediately disabled and the weapon would automatically become disabled as well, and then to re-enable the weapon, the carrier would have to go through the re-enablement of the BET token and then the gun would be ready for use.
  • In yet another aspect, a firearm control system for a firearm authorized for use by a person having a validated identity, the system comprises a firearm having a frame, barrel, firing mechanism and trigger, the trigger being operatively connected to the firing mechanism such that selective operation of the trigger causes the firing mechanism to operate and fire the firearm. An interlock system is provided for enabling and disabling operation of the firearm, the interlock system being disposed on the frame and including a communications/control module, a trigger module operatively connected to the communication/control module to send and receive signals therebetween, and operatively connected to the trigger to sense attempted operation of the trigger by a user and send signals to the communications/control module, and a firing mechanism module operatively connected to the communication/control module to send and receive signals therebetween, and to the firing mechanism to enable or disable operation of the firing mechanism. The interlock system operates to enable and disable operation of the firearm based on signals sent to, and received from, the communications/control module.
  • In one embodiment, the communication/control module receives external signals indicative of current validated identity information and, upon receipt of signals from the trigger module, the communication/control module compares the current validated identity information to a predetermined validated identity of the authorized user stored in the interlock system, and sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the validated identities do not match.
  • In another embodiment, the communication/control module receives external signals indicative of a current geographic location of the firearm and, upon receipt of signals from the trigger module, the communication/control module compares the current geographic location to a list of prohibited locations stored in the interlock system, and the sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the current geographic location is a prohibited location.
  • In yet another embodiment, the firearm control system further comprises a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user. The BET includes a body and a BET communication/control module attached to the body. The BET communication/control module communicates with the communication/control module of the firearm to send signals indicative of current validated identity information.
  • In still another embodiment, the BET communication/control module communicates with the communication/control module of the firearm to send signals indicative of the distance between the BET token and the firearm.
  • In a further embodiment, the BET communication/control module communicates with the communication/control module of the firearm to send signals indicative that the BET token was removed from the authorized user.
  • In the security industry, two or more such methods, such as a pin number or password, when combined with a token or a biometric in a single identify validation session, is typically referred to as “two factor” or “multi factor” identification/authentication process.
  • In one aspect, an identity authentication system calls for at least a two factor identification/authentication process that in the preferred embodiment integrates the “Who You Are” and the “What You Have” methods of identify validation into a seamless identity validation and continuous physical presence validation system that provides a robust physical access entry point identity validation means to confirm one's identity followed by a continuous and equally robust means of confirming identity of the given person once within a controlled security perimeter while preventing ingress and egress by imposters attempting to gain unauthorized access or by authorized personnel once in a secure perimeter from either intentionally or unintentionally moving into restricted areas within the secure perimeter where the given person should not be able access.
  • In one embodiment, the system executes an appropriately robust identity validation method that would comprise any of the token (“What you have”) identity validation methods coupled with biometric validation (“Who you are”), at which time, assuming the person seeking access is indeed validated to the extent required by the security rules in place, a token is placed on their person in such a manner that once on the person, it is associated with the person so during subsequent times while in the secure perimeter, a person's legitimate presence can be validated purely by the act of having physical possession of the token.
  • There are also various types of tokens contemplated by the invention designed to offer differing degrees of personal presence validation security of the person in question predicated by the degree of security required in a given secure perimeter environment.
  • In one embodiment, a passive token is utilized, wherein the passive token requires the person in question to display it or otherwise actively present it to some sort of reader so that it may be read and validated against a database to validate the person's physical presence.
  • In another embodiment, an active token is utilized, wherein the active token is electronically and securely activated and simultaneously associated with the now validated identity of the person seeking access.
  • In still another embodiment, the token has the capability that in the event once the token is properly activated and associated with the person seeking access, should that person remove the token and/or attempt to transfer the token to an imposter, the mere act of removing the token from the person would deactivate/disable the token in such a manner that the token sensing devices within the physically secure perimeter would immediately sense the event and appropriate notification would be instantly issued so that the appropriate security rules would be invoked in order to address the transgression.
  • In another aspect, a method is provided for ensuring continuous personal physical validation, the method comprising the following steps: obtaining unique personal identification information to validate an identity of a person, wherein validating the identity results in a validated identity; activating a physical token; associating the physical token with the validated identity, wherein the physical token represents the validated identity within a defined environment after the steps of activating and associating are performed; placing the physical token on the person, wherein the physical token is configured to detect removal of the physical token from the person after being placed on the person and is further configured to deactivate the physical token when such removal is detected; monitoring the physical token by at least one token sensing device within the defined environment, wherein deactivation of the physical token produces an event that is sensed by the token sensing device; and issuing a notification when the event occurs.
  • In one embodiment, the step of obtaining unique personal identification information includes a two factor identification process.
  • In another embodiment, the two factor identification process includes at least one “Who You Are” identification process and at least one “What You Have” identification process.
  • In yet another embodiment, the “Who You Are” identification process involves biometric validation of the person and the “What You Have” identification process involves a token-based validation of the person.
  • In a further embodiment, the physical token associated with the validated identity was not used in the step of obtaining unique personal identification information.
  • In another embodiment, the defined environment an area is within a controlled security perimeter having limited ingress and egress.
  • In another aspect, an embedded device is provided for use in systems and methods in accordance with additional embodiments.
  • In yet another aspect, a medicinal administration device and companion token are provided for use in systems and methods in accordance with still further embodiments.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a more complete understanding, reference is now made to the following description taken in conjunction with the accompanying Drawings in which:
  • FIG. 1 shows a system for weapon/firearm control in accordance with one aspect; and
  • FIG. 2 shows a method for weapon/firearm control in accordance with another aspect.
  • DETAILED DESCRIPTION
  • Referring now to the drawings, wherein like reference numbers are used herein to designate like elements throughout, the various views and embodiments of weapon control system are illustrated and described, and other possible embodiments are described. The figures are not necessarily drawn to scale, and in some instances the drawings have been exaggerated and/or simplified in places for illustrative purposes only. One of ordinary skill in the art will appreciate the many possible applications and variations based on the following examples of possible embodiments.
  • Referring now to FIG. 1, there is illustrated a weapon/firearm control system in accordance with one aspect. The weapon/firearm control system 100 includes a firearm 102 and a biometrically enabled token 104 (“BET token” or “B.E.T.”). The firearm 102 may be, but is not limited to, a rifle, pistol or shotgun. The firearm 102 may be of new manufacture, or it may be an existing firearm retrofitted to operate with the system 100.
  • The firearm 102 includes a frame 106, a barrel 108, a firing mechanism 109 and a trigger 110. The trigger 110 is operatively connected to the firing mechanism 109 such that selective operation of the trigger causes the firing mechanism to operate and fire the firearm 102. Optionally, a safety mechanism 111 may be interposed between the trigger 110 and the firing mechanism 109 to prevent accidental operation of the firearm 102. In the illustrated embodiment, the safety mechanism 111 is a grip safety.
  • The firearm 102 further includes an interlock system 112 for enabling and disabling operation of the firearm. In the illustrated embodiment, the interlock system 112 includes a communications/control module 114, a trigger module 116 and a firing mechanism module 118. The interlock system 112 may be disposed in the frame 106 or other portions of the firearm 102. The interlock system 112 operates to enable and disable operation of the firearm 112 based on signals sent to, and received from, the communications/control module 114. In the illustrated embodiment, the trigger module 116 is operatively connected to the trigger 110 (denoted by arrow 120) to sense attempted operation of the trigger by a user. Upon such attempted operation of the trigger 110, the trigger module 116 sends signals (denoted by arrow 122) to the communications/control module 114. Further in the illustrated embodiment, the firing mechanism module 118 is operatively connected to the firing mechanism 109 (denoted by arrow 124) to enable or disable operation of the firing mechanism.
  • Upon attempted operation of the trigger 110, the trigger module 116 sends signals 122 to the communications/control module 114. As further described below, the communication/control module 114 has information regarding the validated identity of the user and/or information regarding the geographic location of the firearm 102. Upon receipt of signals 122 from the trigger module 116, the communication/control module 114 evaluates the circumstances according to predetermined instructions stored in the interlock system 112, and then sends responsive signals (denoted by arrow 126) to the firing mechanism module 118 that either enable or disable operation of the firing mechanism 109, and thus that either enable or disable operation of the firearm 102. In alternative embodiments, the functions of the trigger module 116 and firing mechanism module 118 may be combined into a single module (not shown) to selectively block the trigger 110 from operation upon command from the communications/control module 114, rather than by affecting operation of the firing mechanism 109 itself. In still further embodiments, the functions of the trigger module 116 and/or firing mechanism module 118 may selectively enable and disable the safety 111 upon command from the communications/control module 114, and thereby control operation of the firearm 102.
  • The communications/control module 114 may include GPS-/mobile (i.e., cellular)-/ and/or WiFi-enabled wireless communications (denoted by arrow 128) that allow the interlock system 112 to communicate with one or more data communication networks 129 including, but not limited to, the Internet, cellular and/GPS satellite networks. Such communication functionality allows the interlock system 112 to determine the physical geographical location of the firearm 102 at any given time. This communication functionality may further allow an external administrator 130 to determine the physical geographical location of the firearm 102 by communicating (denoted by signals 131) with the interlock system 112 over the network 129.
  • In one embodiment, the firearm control system 100 uses the Internet, cellular and/GPS satellite network communication 128 to determine if the firearm 102 is geographically within a school, campus or other geographic location that is not authorized for firearm use. If so, the interlock system 112 is instructed to disable the firearm 102; otherwise, the interlock system is instructed to enable the firearm for use. In another embodiment, the firearm control system 100 uses both the geographic information obtained from the Internet, cellular and/GPS satellite network communications 128 and the validated identity of the user (provided by the BET token 104 as herein described) to determine if the firearm 102 is geographically within a school, campus or other geographic location where the validated user is not authorized for firearm use. If so, the interlock system 112 is instructed to disable the firearm 102; otherwise, the interlock system is instructed to enable the firearm for use. The latter embodiment has the advantage of allowing authorized users with a validated identity (e.g., law enforcement personnel) to have an enabled firearm 102 even in a geographic location (such as a school) that is otherwise prohibited for firearm use. It will be appreciated that the instructions in the interlock system 112 may be changed by means of communications 128 received from the network 129. This allows a remote, e.g., “cloud-based”, administrator 130 to monitor and/or change the instruction in the interlock system 112.
  • Another aspect of the weapon/firearm control system 100 is the use of biometrics to control the operation of the firearm 102, e.g., if you are not the registered (i.e., authorized and/or validated) user of the firearm, then it is disabled from operation (i.e., firing). The BET (biometrically-enabled token) 104 facilitates the use of such biometrics in the system 100. In preferred embodiments, the BET token 104 is configured as a bracelet, ring or other accessory that can be worn or carried by the user of the handgun 102. In the embodiment illustrated in FIG. 1, the BET token 104 is configured as a ring. The BET token 104 may include a body 132 and a BET communication/control module 134 attached to or disposed within the body. In FIG. 1, the module 134 is shown enlarged for purposes of illustration.
  • In various embodiments, the module 134 may communicate with the communication/control module 114 of the firearm 102 directly (denoted by signals 134), by means of the network 129 (denoted by signals 138) or both. In addition, the module 134 may communicate with a remote administrator 130 via the communication network 129. The BET token 104 and the interlock system 112 further have the combined functionality to determine the distance (denoted D) between the firearm 102 and the BET token.
  • Referring now also to FIG. 2, there is illustrated a method for using a weapon/firearm control system in accordance with another aspect. The method 200 includes the following steps. First (block 202), unique personal identification information is obtained to validate an identity of an authorized firearm carrier. In a preferred embodiment, the method 200 executes a two-factor identity validation method that comprises any of the token-based (“What you have”) identity validation methods coupled with a biometric-based (“Who You Are”) identity validation method. Validating the identity results in a validated identity. In other words, the authorized user (i.e., carrier) of the firearm 102 obtains a validated identity using biometrics. Next (block 204), a BET token 104 is activated. Next (block 206), the physical BET token 104 is associated with the validated identity 208. The BET token 104 represents the validated identity (of the authorized user) in proximity to the firearm 102. Once activated via the biometrics, the BET token 104 remains in constant communication with the firearm 102.
  • Next (block 208), the physical BET token 104 is placed on the authorized user. In some embodiments, the BET token 104 is configured to detect removal of the BET token from the user after being placed on the user. In some further embodiments (block 209), the BET token 104 is further configured to deactivate the BET token (i.e., itself) when such removal is detected. In other embodiments (not shown), the BET token 104 may be a passive token
  • Under normal circumstances (block 210), communication between the module 134 of the BET token 104 and the communication/control module 114 of the firearm 102 causes the interlock system 112 to enable the firearm to operate (block 212). If, however, the firearm 102 becomes separated by more than a certain (pre-determined) distance Dmax, then the interlock system 112 disables operation of the firearm (block 211). When the BET token 104 come back within range Dmax of the firearm 102, the interlock system 112 becomes re-enabled.
  • In a preferred embodiment, the BET token 104 is configured to detect if it is removed from the person of the authorized user. In the event the authorized user/carrier of the firearm 102 removes the BET token 104 (or if it is lost or stolen), the BET token 104 is immediately disabled, thereby also causing the interlock system 112 to disable the firearm 102. In some such embodiments, the authorized user/carrier may have to repeat the biometric identity validation process (blocks 206, 208) to re-enable the BET token 104, and thus to re-enable the firearm 102, such that the firearm is again ready for use (block 212).
  • By way of further description of the systems and methods for ensuring continuous personal physical validation in accordance with particular aspects of the current invention, the following is presented. A method for ensuring continuous personal physical validation includes the following steps: First, unique personal identification information is obtained to validate an identity of a person. In one embodiment, the system executes a two-factor identity validation method that comprises any of the token-based (“What you have”) identity validation methods coupled with a biometric-based (“Who You Are”) identity validation method. Validating the identity results in a validated identity.
  • Next, a physical token is activated. Next, the physical token is associated with the validated identity. The physical token represents the validated identity within a defined environment after the steps of activating and associating are performed.
  • Next, the physical token is placed on the person. In some embodiments, the physical token is configured to detect removal of the physical token from the person after being placed on the person. In further embodiments, the physical token is further configured to deactivate the physical token (i.e., itself) when such removal is detected. In other embodiments (not shown), the token may be a passive token.
  • The person with the physical token is allowed entry into the defined environment. Typically, the defined environment will be a secure area having limited ingress and egress. Next, the physical token is monitored by at least one token sensing device within the defined environment. Deactivation of the physical token produces an event that is sensed by the token sensing device. In some embodiments, the event may be active, e.g., a radio signal sent from the physical token to the token sensing device, while in other embodiments the event may be passive, e.g., a change to a memory value on the physical token that can be detected when interrogated by the token sensing device.
  • Finally a notification is issued when the event (i.e., deactivation of the token) occurs. The notification may be sent to recipients within the defined environment and/or to recipients outside the defined environment, e.g., via a data communication network, such as the Internet or other network.
  • A further system and method in accordance with another aspect includes an embedded device comprising a GPS-/mobile (cellular)-/WiFi- and/or biometric-enabled token chip that may be affixed to, embedded in or implanted in people's apparel including, but not limited to, shirts, shoes, watches, necklaces, belts. The embedded device may operate substantially as the physical token previously described in connection with FIGS. 1 and 2. The embedded device may identify where a given (e.g., validated) person physically is, so that when combined with certain pre-determined cloud based parameters, notifications and/or alerts may be triggered that may drive certain actions.
  • In one embodiment, a user with “Administration” privileges (“Admin User”) may establish rules and/or geographic area perimeters on a map via the web or mobile device by identifying “known” locations and setting a variety of parameters such geographic special perimeters. For example, a school may be designated as a defined location, wherein the Admin User may drop a virtual pin on the map, and then expand an area into a perimeter around the defined location (i.e., around the school). Next, when a person (“student”) wearing the apparel with embedded device enters an approved perimeter area the Admin User (and/or others previously established by the Admin User) may receive corresponding notification. If and when the given student leaves the approved area, additional notifications are sent as previously described. Thus, the Admin User (and other designated recipients) may track the movement of the student wearing the embedded device via web or mobile interface.
  • In a further embodiment, the student carries a second token on their person such as bracelet, keychain, etc. The second token may include wireless connectivity. If any apparel with embedded device becomes separated by too much distance D (a user-configurable amount) from the second token, then a notification may be sent to predefined recipients.
  • In still further embodiments, the embedded device may be implanted directly onto or into a validated person's body, wherein data such as medical history, payment options, etc. can be constantly updated. When the validated person with the implanted device passes near a detector device (not shown), e.g., a ceiling-based sensor or floor-based sensor, the data in the embedded device may be retrieved and accessed. For example, at a doctor's office, for information in the validated person's embedded device may be instantly made available to the medical personnel supported by optional password and/or biometric security, so that only personnel authorized by the person having the embedded device would permit the data exchange to take place.
  • This overall system for the embedded device comprises physical devices (products) along with supporting software and cloud based data facilities.
  • It will be appreciated by those skilled in the art having the benefit of this disclosure that this weapon/firearm control system provides numerous advantages for public safety, compared to the prior art. It should be understood that the drawings and detailed description herein are to be regarded in an illustrative rather than a restrictive manner, and are not intended to be limiting to the particular forms and examples disclosed. On the contrary, included are any further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments apparent to those of ordinary skill in the art, without departing from the spirit and scope hereof, as defined by the following claims. Thus, it is intended that the following claims be interpreted to embrace all such further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments.

Claims (6)

What is claimed is:
1. A firearm control system for a firearm authorized for use by a person having a validated identity, the system comprising:
a firearm having a frame, barrel, firing mechanism and trigger, the trigger being operatively connected to the firing mechanism such that selective operation of the trigger causes the firing mechanism to operate and fire the firearm;
an interlock system for enabling and disabling operation of the firearm, the interlock system being disposed on the frame and including
a communications/control module,
a trigger module operatively connected to the communication/control module to send and receive signals therebetween, and operatively connected to the trigger to sense attempted operation of the trigger by a user and send signals to the communications/control module, and
a firing mechanism module operatively connected to the communication/control module to send and receive signals therebetween, and to the firing mechanism to enable or disable operation of the firing mechanism;
wherein the interlock system operates to enable and disable operation of the firearm based on signals sent to, and received from, the communications/control module.
2. A firearm control system in accordance with claim 1, wherein the communication/control module receives external signals indicative of current validated identity information and, upon receipt of signals from the trigger module, the communication/control module compares the current validated identity information to a predetermined validated identity of the authorized user stored in the interlock system, and sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the validated identities do not match.
3. A firearm control system in accordance with claim 1, wherein the communication/control module receives external signals indicative of a current geographic location of the firearm and, upon receipt of signals from the trigger module, the communication/control module compares the current geographic location to a list of prohibited locations stored in the interlock system, and the sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the current geographic location is a prohibited location.
4. A firearm control system in accordance with claim 1, further comprising:
a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user;
the BET including a body and a BET communication/control module attached to the body;
the BET communication/control module communicating with the communication/control module of the firearm to send signals indicative of current validated identity information.
5. A firearm control system in accordance with claim 1, further comprising:
a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user;
the BET including a body and a BET communication/control module attached to the body;
the BET communication/control module communicating with the communication/control module of the firearm to send signals indicative of the distance between the BET token and the firearm.
6. A firearm control system in accordance with claim 1, further comprising:
a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user;
the BET including a body and a BET communication/control module attached to the body;
the BET communication/control module communicating with the communication/control module of the firearm to send signals indicative that the BET token was removed from the authorized user.
US14/224,029 2013-03-22 2014-03-24 Weapon control system Abandoned US20150040453A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/224,029 US20150040453A1 (en) 2013-03-22 2014-03-24 Weapon control system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361804345P 2013-03-22 2013-03-22
US14/224,029 US20150040453A1 (en) 2013-03-22 2014-03-24 Weapon control system

Publications (1)

Publication Number Publication Date
US20150040453A1 true US20150040453A1 (en) 2015-02-12

Family

ID=52447359

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/224,029 Abandoned US20150040453A1 (en) 2013-03-22 2014-03-24 Weapon control system

Country Status (1)

Country Link
US (1) US20150040453A1 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140366419A1 (en) * 2013-06-12 2014-12-18 Robert M. Allan Firearm locking assembly
US20140366422A1 (en) * 2013-06-14 2014-12-18 David Henry Firearm safety system
US20150184963A1 (en) * 2013-02-06 2015-07-02 Karl F. Milde, Jr. Secure smartphone-operated gun lock with means for overriding release of the lock
US20150247692A1 (en) * 2014-06-22 2015-09-03 Thomas Danaher Harvey Apparatus and methods for safe use and storage of firearms and weapons
US9222743B1 (en) * 2015-03-12 2015-12-29 Umm Al-Qura University Firearm safety device
US9250660B2 (en) 2012-11-14 2016-02-02 Laserlock Technologies, Inc. “HOME” button with integrated user biometric sensing and verification system for mobile device
US20160138881A1 (en) * 2013-04-12 2016-05-19 Terry Ladell TRAVIS Method and system for preventing firing of a weapon in a localized area
US20160169603A1 (en) * 2014-12-15 2016-06-16 Yardarm Technologies, Inc. Method and system for identification of the user of a firearm due to unique signature measured by firearm sensor telemetry
US9485236B2 (en) 2012-11-14 2016-11-01 Verifyme, Inc. System and method for verified social network profile
US9658012B2 (en) * 2013-04-01 2017-05-23 Yardarm Technologies, Inc. Methods and systems for enhancing firearm safety through wireless network monitoring
US9658013B2 (en) * 2013-04-01 2017-05-23 Yardarm Technologies, Inc. Methods and systems for enhancing firearm safety through wireless network monitoring
WO2017172379A1 (en) * 2016-03-29 2017-10-05 Coverquick, Inc. System and method for smart weapon implementation and deployment
US9857133B1 (en) * 2016-08-11 2018-01-02 Biofire Technologies Inc. System and method for authenticating an identity for a biometrically-enabled gun
US9958228B2 (en) 2013-04-01 2018-05-01 Yardarm Technologies, Inc. Telematics sensors and camera activation in connection with firearm activity
US20180172401A1 (en) * 2016-12-19 2018-06-21 Crosman Corporation Switchless sensing for electronic devices used with deterrent devices
US10180297B2 (en) * 2015-07-29 2019-01-15 Charles William Post Firearm monitoring and notification apparatus and method of use
US10378848B1 (en) 2017-03-08 2019-08-13 Sturm, Ruger & Company, Inc. Fast action shock invariant magnetic actuator for firearms
US10969186B2 (en) 2017-03-08 2021-04-06 Strum, Ruger & Company, Inc. Fast action shock invariant magnetic actuator for firearms
WO2021194584A2 (en) 2019-12-17 2021-09-30 Authgrip Inc. Firearm authentication and tracking system
US20220058937A1 (en) * 2020-08-20 2022-02-24 PatriotOne Technologies System and method for thrupass system for multi-sensor gateway system
US20220341702A1 (en) * 2021-04-27 2022-10-27 Biofire Technologies Inc. Grip component for an electromechanical gun
US11708161B1 (en) * 2020-01-17 2023-07-25 Flex Force Enterprises Inc. Method and system for validating access keys for unmanned vehicle interdiction device
US11940235B1 (en) * 2023-03-19 2024-03-26 Siddharth Nirgudkar SOTERIA: smart and safe add-on for firearms

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5953844A (en) * 1998-12-01 1999-09-21 Quantum Leap Research Inc. Automatic firearm user identification and safety module
US20020112390A1 (en) * 2000-11-30 2002-08-22 Gord Harling Automatic weapon user identification and safety module
US6481140B1 (en) * 2000-11-28 2002-11-19 William Marshall Firearm safety system with implanted computer chip
US6487804B1 (en) * 2001-08-23 2002-12-03 Imet Corporation Firearm with personal safety interlock mechanism
US20030158638A1 (en) * 1999-07-30 2003-08-21 Oshkosh Truck Corporation Control system and method for electric vehicle
US20040031180A1 (en) * 2002-06-17 2004-02-19 Dentcho Ivanov Sensor array for unauthorized user prevention device
US20050132194A1 (en) * 2003-12-12 2005-06-16 Ward Jean R. Protection of identification documents using open cryptography
US7392122B2 (en) * 2002-06-13 2008-06-24 Oshkosh Truck Corporation Steering control system and method
US7441362B1 (en) * 2004-03-29 2008-10-28 Metadigm Llc Firearm with force sensitive trigger and activation sequence
US7506468B2 (en) * 2006-08-02 2009-03-24 Michael Anthony Farrell Method and apparatus for monitoring handling of a firearm
US7620212B1 (en) * 2002-08-13 2009-11-17 Lumidigm, Inc. Electro-optical sensor
US7886471B2 (en) * 2001-10-02 2011-02-15 Gaston Glock Method for activating a weapon with an identification mechanism
US7921588B2 (en) * 2007-02-23 2011-04-12 Raytheon Company Safeguard system for ensuring device operation in conformance with governing laws
US20140166694A1 (en) * 2011-09-02 2014-06-19 Bevolution Systems, Llc Scalable modular system and method for storing, preserving, managing, and selectively dispensing beverages
US8850733B1 (en) * 2012-05-08 2014-10-07 Dylan Kyle Oster Safety system allowing partial enablement of shooting functionality upon reception of signal

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5953844A (en) * 1998-12-01 1999-09-21 Quantum Leap Research Inc. Automatic firearm user identification and safety module
US20030158638A1 (en) * 1999-07-30 2003-08-21 Oshkosh Truck Corporation Control system and method for electric vehicle
US6481140B1 (en) * 2000-11-28 2002-11-19 William Marshall Firearm safety system with implanted computer chip
US20020112390A1 (en) * 2000-11-30 2002-08-22 Gord Harling Automatic weapon user identification and safety module
US6487804B1 (en) * 2001-08-23 2002-12-03 Imet Corporation Firearm with personal safety interlock mechanism
US7886471B2 (en) * 2001-10-02 2011-02-15 Gaston Glock Method for activating a weapon with an identification mechanism
US7392122B2 (en) * 2002-06-13 2008-06-24 Oshkosh Truck Corporation Steering control system and method
US20040031180A1 (en) * 2002-06-17 2004-02-19 Dentcho Ivanov Sensor array for unauthorized user prevention device
US7620212B1 (en) * 2002-08-13 2009-11-17 Lumidigm, Inc. Electro-optical sensor
US20050132194A1 (en) * 2003-12-12 2005-06-16 Ward Jean R. Protection of identification documents using open cryptography
US7441362B1 (en) * 2004-03-29 2008-10-28 Metadigm Llc Firearm with force sensitive trigger and activation sequence
US7506468B2 (en) * 2006-08-02 2009-03-24 Michael Anthony Farrell Method and apparatus for monitoring handling of a firearm
US7921588B2 (en) * 2007-02-23 2011-04-12 Raytheon Company Safeguard system for ensuring device operation in conformance with governing laws
US20140166694A1 (en) * 2011-09-02 2014-06-19 Bevolution Systems, Llc Scalable modular system and method for storing, preserving, managing, and selectively dispensing beverages
US8850733B1 (en) * 2012-05-08 2014-10-07 Dylan Kyle Oster Safety system allowing partial enablement of shooting functionality upon reception of signal

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9250660B2 (en) 2012-11-14 2016-02-02 Laserlock Technologies, Inc. “HOME” button with integrated user biometric sensing and verification system for mobile device
US9485236B2 (en) 2012-11-14 2016-11-01 Verifyme, Inc. System and method for verified social network profile
US20150184963A1 (en) * 2013-02-06 2015-07-02 Karl F. Milde, Jr. Secure smartphone-operated gun lock with means for overriding release of the lock
US9989325B2 (en) * 2013-02-06 2018-06-05 Karl F. Milde, Jr. Secure smartphone-operated gun lock with means for overriding release of the lock
US9316454B2 (en) * 2013-02-06 2016-04-19 Karl F. Milde, Jr. Secure smartphone-operated gun lock with means for overriding release of the lock
US10359249B2 (en) 2013-04-01 2019-07-23 Yardarm Technologies, Inc. Methods and systems for enhancing firearm safety through wireless network monitoring
US9658013B2 (en) * 2013-04-01 2017-05-23 Yardarm Technologies, Inc. Methods and systems for enhancing firearm safety through wireless network monitoring
US10436534B2 (en) 2013-04-01 2019-10-08 Yardarm Technologies, Inc. Methods and systems for enhancing firearm safety through wireless network monitoring
US10866054B2 (en) 2013-04-01 2020-12-15 Yardarm Technologies, Inc. Associating metadata regarding state of firearm with video stream
US10107583B2 (en) 2013-04-01 2018-10-23 Yardarm Technologies, Inc. Telematics sensors and camera activation in connection with firearm activity
US11131522B2 (en) 2013-04-01 2021-09-28 Yardarm Technologies, Inc. Associating metadata regarding state of firearm with data stream
US9958228B2 (en) 2013-04-01 2018-05-01 Yardarm Technologies, Inc. Telematics sensors and camera activation in connection with firearm activity
US11466955B2 (en) 2013-04-01 2022-10-11 Yardarm Technologies, Inc. Firearm telematics devices for monitoring status and location
US9658012B2 (en) * 2013-04-01 2017-05-23 Yardarm Technologies, Inc. Methods and systems for enhancing firearm safety through wireless network monitoring
US20160138881A1 (en) * 2013-04-12 2016-05-19 Terry Ladell TRAVIS Method and system for preventing firing of a weapon in a localized area
US9341424B2 (en) * 2013-06-12 2016-05-17 Safety First Arms, Llc Firearm locking assembly
US20140366419A1 (en) * 2013-06-12 2014-12-18 Robert M. Allan Firearm locking assembly
US20140366422A1 (en) * 2013-06-14 2014-12-18 David Henry Firearm safety system
US9250030B2 (en) * 2013-06-14 2016-02-02 David Henry Firearm safety system
US9175915B2 (en) * 2014-06-22 2015-11-03 Thomas Danaher Harvey Apparatus and methods for safe use and storage of firearms and weapons
US20150247692A1 (en) * 2014-06-22 2015-09-03 Thomas Danaher Harvey Apparatus and methods for safe use and storage of firearms and weapons
US20160169603A1 (en) * 2014-12-15 2016-06-16 Yardarm Technologies, Inc. Method and system for identification of the user of a firearm due to unique signature measured by firearm sensor telemetry
US9222743B1 (en) * 2015-03-12 2015-12-29 Umm Al-Qura University Firearm safety device
US10180297B2 (en) * 2015-07-29 2019-01-15 Charles William Post Firearm monitoring and notification apparatus and method of use
WO2017172379A1 (en) * 2016-03-29 2017-10-05 Coverquick, Inc. System and method for smart weapon implementation and deployment
US9857133B1 (en) * 2016-08-11 2018-01-02 Biofire Technologies Inc. System and method for authenticating an identity for a biometrically-enabled gun
US10591250B2 (en) * 2016-12-19 2020-03-17 Crosman Corporation Switchless sensing for electronic devices used with deterrent devices
US20180172401A1 (en) * 2016-12-19 2018-06-21 Crosman Corporation Switchless sensing for electronic devices used with deterrent devices
US10378848B1 (en) 2017-03-08 2019-08-13 Sturm, Ruger & Company, Inc. Fast action shock invariant magnetic actuator for firearms
US10663244B1 (en) 2017-03-08 2020-05-26 Sturm, Ruger & Company, Inc. Fast action shock invariant magnetic actuator for firearms
US10969186B2 (en) 2017-03-08 2021-04-06 Strum, Ruger & Company, Inc. Fast action shock invariant magnetic actuator for firearms
US11585621B2 (en) 2017-03-08 2023-02-21 Sturm, Ruger & Company, Inc. Fast action shock invariant magnetic actuator
WO2021194584A2 (en) 2019-12-17 2021-09-30 Authgrip Inc. Firearm authentication and tracking system
EP4078070A4 (en) * 2019-12-17 2023-01-18 Authgrip Inc. Firearm authentication and tracking system
WO2021194584A3 (en) * 2019-12-17 2021-12-23 Authgrip Inc. Firearm authentication and tracking system
US11792283B2 (en) 2019-12-17 2023-10-17 Authgrip Inc. Firearm authentication and tracking system
US11708161B1 (en) * 2020-01-17 2023-07-25 Flex Force Enterprises Inc. Method and system for validating access keys for unmanned vehicle interdiction device
US20220058937A1 (en) * 2020-08-20 2022-02-24 PatriotOne Technologies System and method for thrupass system for multi-sensor gateway system
US20220341702A1 (en) * 2021-04-27 2022-10-27 Biofire Technologies Inc. Grip component for an electromechanical gun
US11940235B1 (en) * 2023-03-19 2024-03-26 Siddharth Nirgudkar SOTERIA: smart and safe add-on for firearms

Similar Documents

Publication Publication Date Title
US20150040453A1 (en) Weapon control system
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
EP3428819B1 (en) Mobile security countermeasures
US11720656B2 (en) Live user authentication device, system and method
US10002244B2 (en) Utilization of biometric data
US9115944B2 (en) System and methods for firearm safety enhancement
US9762581B1 (en) Multifactor authentication through wearable electronic device
KR101880637B1 (en) Method and apparatus for user authentication using biometrics
US8994498B2 (en) Preauthorized wearable biometric device, system and method for use thereof
US20170013464A1 (en) Method and a device to detect and manage non legitimate use or theft of a mobile computerized device
US20140230019A1 (en) Authentication to a first device using a second device
US20120309354A1 (en) Situation aware security system and method for mobile devices
US20190066415A1 (en) Mobile-based access control system
WO2016177671A1 (en) Using a secondary mobile device to identify a trusted environment
US20160050308A1 (en) Movement-based, user identity authenticated unlocking and locking triggers for smartphones and wearable mobile devices
US10373413B2 (en) Wearable security apparatus
US20130326613A1 (en) Dynamic control of device unlocking security level
US9779225B2 (en) Method and system to provide access to secure features of a device
US11367323B1 (en) System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
US9928676B2 (en) Firearm storage receptacle with alert notification for emergency personnel
US10810846B1 (en) Firearm security system for securing a firearm and notifying an owner of unauthorized access of the firearm
US10748366B2 (en) Mobile-based access control system with wireless access controller
US20220036672A1 (en) Access control accessibility
Motwani et al. Multifactor door locking systems: A review
US9564032B2 (en) Enhanced security system

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION