U.S. patent application number 14/224029 was filed with the patent office on 2015-02-12 for weapon control system.
The applicant listed for this patent is POTENS IP HOLDINGS LLC. Invention is credited to CLAUDIO R. BALLARD, TYLER DELUCIA.
Application Number | 20150040453 14/224029 |
Document ID | / |
Family ID | 52447359 |
Filed Date | 2015-02-12 |
United States Patent
Application |
20150040453 |
Kind Code |
A1 |
BALLARD; CLAUDIO R. ; et
al. |
February 12, 2015 |
WEAPON CONTROL SYSTEM
Abstract
A firearm control system for a firearm authorized for use by a
person having a validated identity comprises a firearm having a
frame, barrel, firing mechanism and trigger. An interlock system is
provided for enabling and disabling operation of the firearm, the
interlock system being disposed on the frame and including a
communications/control module, a trigger module operatively
connected to the communication/control module, and operatively
connected to the trigger to sense attempted operation of the
trigger by a user and send signals to the communications/control
module, and a firing mechanism module operatively connected to the
communication/control module, and to the firing mechanism to enable
or disable operation of the firing mechanism. The interlock system
operates to enable and disable operation of the firearm based on
signals sent to, and received from, the communications/control
module.
Inventors: |
BALLARD; CLAUDIO R.; (FORT
LAUDERDALE, FL) ; DELUCIA; TYLER; (DIX HILLS,
NY) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
POTENS IP HOLDINGS LLC |
FORT LAUDERDALE |
FL |
US |
|
|
Family ID: |
52447359 |
Appl. No.: |
14/224029 |
Filed: |
March 24, 2014 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
61804345 |
Mar 22, 2013 |
|
|
|
Current U.S.
Class: |
42/70.11 |
Current CPC
Class: |
F41A 17/066 20130101;
F41A 17/063 20130101 |
Class at
Publication: |
42/70.11 |
International
Class: |
F41A 17/06 20060101
F41A017/06 |
Claims
1. A firearm control system for a firearm authorized for use by a
person having a validated identity, the system comprising: a
firearm having a frame, barrel, firing mechanism and trigger, the
trigger being operatively connected to the firing mechanism such
that selective operation of the trigger causes the firing mechanism
to operate and fire the firearm; an interlock system for enabling
and disabling operation of the firearm, the interlock system being
disposed on the frame and including a communications/control
module, a trigger module operatively connected to the
communication/control module to send and receive signals
therebetween, and operatively connected to the trigger to sense
attempted operation of the trigger by a user and send signals to
the communications/control module, and a firing mechanism module
operatively connected to the communication/control module to send
and receive signals therebetween, and to the firing mechanism to
enable or disable operation of the firing mechanism; wherein the
interlock system operates to enable and disable operation of the
firearm based on signals sent to, and received from, the
communications/control module.
2. A firearm control system in accordance with claim 1, wherein the
communication/control module receives external signals indicative
of current validated identity information and, upon receipt of
signals from the trigger module, the communication/control module
compares the current validated identity information to a
predetermined validated identity of the authorized user stored in
the interlock system, and sends responsive signals to the firing
mechanism module that disables operation of the firing mechanism if
the validated identities do not match.
3. A firearm control system in accordance with claim 1, wherein the
communication/control module receives external signals indicative
of a current geographic location of the firearm and, upon receipt
of signals from the trigger module, the communication/control
module compares the current geographic location to a list of
prohibited locations stored in the interlock system, and the sends
responsive signals to the firing mechanism module that disables
operation of the firing mechanism if the current geographic
location is a prohibited location.
4. A firearm control system in accordance with claim 1, further
comprising: a biometrically-enabled token ("BET") that is
associated with a biometrically validated identity of an authorized
user and is configured to be worn or carried by the authorized
user; the BET including a body and a BET communication/control
module attached to the body; the BET communication/control module
communicating with the communication/control module of the firearm
to send signals indicative of current validated identity
information.
5. A firearm control system in accordance with claim 1, further
comprising: a biometrically-enabled token ("BET") that is
associated with a biometrically validated identity of an authorized
user and is configured to be worn or carried by the authorized
user; the BET including a body and a BET communication/control
module attached to the body; the BET communication/control module
communicating with the communication/control module of the firearm
to send signals indicative of the distance between the BET token
and the firearm.
6. A firearm control system in accordance with claim 1, further
comprising: a biometrically-enabled token ("BET") that is
associated with a biometrically validated identity of an authorized
user and is configured to be worn or carried by the authorized
user; the BET including a body and a BET communication/control
module attached to the body; the BET communication/control module
communicating with the communication/control module of the firearm
to send signals indicative that the BET token was removed from the
authorized user.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims benefit of U.S. Provisional
Application No. 61/804,345, filed Mar. 22, 2013, entitled WEAPON
CONTROL SYSTEM (Atty. Dkt. No. VMPT-31662), which is herein
incorporated by reference in its entirety.
TECHNICAL FIELD
[0002] The following disclosure relates to weapons/firearms, e.g.,
rifles and handguns, having a system for biometric user
identification and authentication, and for methods of using same.
More specifically, it relates to a firearm having an operational
interlock utilizing a token-based biometrically enabled system for
the continuous physical presence validation of the user.
BACKGROUND
[0003] In light of recent crimes involving firearms, namely,
handguns and rifles, in schools and on school campuses, there is an
ever-growing concern about the use of such weapons in these
environments. A need therefore exists, for a firearm that is
disabled from use in certain environments.
[0004] In other circumstances, injury or death may occur when a
firearm is used by a child or other person that is not authorized
to use the firearm. A need therefore exists, for a firearm that is
disabled from use by anyone other than an authorized user.
[0005] The ability to positively identify an individual grows
increasingly important with every passing day, particularly given
the widespread proliferation of information system technology that
permeates are daily lives. From the use of an ATM machine, to
logging onto your favorite website on through Homeland Security
initiatives, the ability to quickly, efficiently, and most of all,
positively identify someone, while not overly intruding upon or
burdening the person's daily life grows increasingly at odds with
the very need to fulfill adequate identity validation.
[0006] Traditional identity validation or personal identification
techniques are well understood and fall into three basic categories
as further explained below.
[0007] The first category of identity validation/personal
identification techniques is known as "What You Know". This
technique involves the act of conveying a piece of information that
is personally known to an individual, which can be independently
verified against a repository of such known information previously
acquired from said individual who wishes to have their identity
validated.
[0008] Pros of the "What You Know" technique include: i) something
that is always in your possession and readily and conveniently
available; and ii) cannot be easily stolen by an imposter.
[0009] Cons of the "What You Know" technique include: i) if
forgotten, the valid individual is no longer able to validate their
identity; ii) so-called "password cracking software" is now readily
available on the Internet, often at little or no cost, rendering
all but the most robust identity systems easily comprised; and iii)
modern password security measures call for robust passwords NOT
based upon your birthday, mother's maiden, and the like, which
constitutes information that is often easily obtainable by
imposters. Typically such robust passwords require a reasonably
long string (8 or more characters) consisting of a random set of
letters and numbers. The average person, unfortunately, has
difficulty remembering "robust passwords" often leading people to
write down their "robust passwords" making it readily accessible
for easy referral--and unfortunately, often to imposters as
well
[0010] The second category of identity validation/personal
identification techniques is known as "What You Have". This
technique requires the person to possess on or in their physical
person a tangible physical foreign object, such as a drivers
license, an ID badge, or even chips that can be embedded just under
the skin--all collectively and commonly known in the field of
identity validation as a "token". A token is intended to provide
proof of identity by the mere physical possession of it by the
person being validated.
[0011] Pros of the "What You Have" technique include: i) the token
is usually small and portable in nature, easy to keep on your
person; ii) depending on the technology being deployed, the token
can deliver extremely robust device level validation that cannot be
readily comprised; and iii) typically affords instant validation
either via visual means or wireless electronic methods
[0012] Cons of the "What You Have" technique include: i) if the
person being validated loses physical possession of the token they
are no longer able to be validated--despite being the valid person;
ii) if an imposter gains possession of the token, they can be
falsely validated; and iii) if the token becomes damaged or
otherwise unusable, the valid person is no longer able to validate
their identity.
[0013] The third category of identity validation/personal
identification techniques is known as "Who You Are". This technique
relies on one or more human physical and/or behavioral attributes
of a given individual that can be measured accurately and with
consistent repeatability. These attributes include but are not
limited to fingerprints, iris scans, retinal scans, facial scans,
vein scans or even such things as the manner in which a person may
perform certain actions as in the manner of speaking words,
phrases, typing or even physical act of walking--collectively
referred to as biometrics.
[0014] Pros of the "Who You Are" technique include: i) it uses an
inherent physical or behavioral attribute of a person's physical
being--so it is always with the person and generally cannot be lost
or misplaced; and ii) there is nothing to remember or lose or have
an imposter guess or steal.
[0015] Cons of the "Who You Are" technique include: i) currently,
most biometric technology ergonomics does not lend themselves well
to ease and rapidity of use; and ii) depending on the security
needs of a given environment, offset against the practicality of
the identity validation frequency and environment specific
requisite identification quality in many cases would simply rule
out the use of biometrics on a continuous basis throughout the day
due to the nature of a given biometric technology and the
associated probability of false positives versus false negative
tuning issues.
[0016] Further with respect to the "Who You Are" category of
biometrically-enabled techniques, there are two basic processes
that must take place in connection with a modern digital biometric
identity management (BIM) system, namely, Identity Enrollment and
Identity Verification. Each process is further described below.
[0017] Identity Enrollment is the process of providing and/or
discovering personal information for a physical person who desires
to enroll their identity into a given BIM system. Once the personal
information has been gathered and satisfactorily processed and
accepted into the BIM according to the BIM specific enrollment
rules, said information is associated with the given person's
biometric.
[0018] Identity Verification is the process of retrieving the
identity of a person who wishes to identify themselves in order to
gain access to a secure service and/or physical perimeter area.
Identity verification is further broken down into two specific
areas (subprocesses), namely, Personal Identity Determination and
Personal Identity Authentication. Each subprocess is further
described below.
[0019] Personal Identity Determination is the process (i.e.,
subprocess) by which a person supplies their biometric (finger
scan, iris scan, etc.) which is then submitted to the BIM for a
search--otherwise known as a "one to many" (i.e., "1:M") lookup. In
this environment, the identity of the person is not necessarily
known up front, and is therefore determined solely from the
supplied biometric. Such a method is usually very slow and can more
likely lead to false positives or negatives. Most biometric
searches do NOT lend themselves to 1:M lookup, with the exception
of iris scanning which intrinsically is designed for 1:M lookup.
For example, when certain popular television crime scene shows have
the investigator performing a search of a finger print, in reality,
such a process can take hours and even days.
[0020] Personal Identity Authentication is the process (i.e.,
subprocess) by which a person supplies an identity indicator as
well as a biometric to the BIM. The identity indicator of the
person may be one or more name, password, access code, PIN or other
identifier that is linked to (i.e., associated with) the person's
biometric in the BIM. In this environment, since the apparent
identity of the person is known up front, the BIM can quickly
determine if the biometric submitted for the person matches the
identity indicator submitted, typically using a "one to one" (i.e.,
"1:1") lookup or a "one to few" lookup. Such methods are usually
much faster that a 1:M lookup and less likely to lead to false
positives or negatives.
[0021] In highly secure physical perimeter security environments,
such as might be found in airports, financial trading floors,
pharmaceutical drug company laboratories, nuclear power plants,
military facilities, and so on, there is need to reliably verify
the identity of personnel as they initially gain access to a secure
facility and as they ingress, egress and move about within secure
perimeter environments within such facilities. Depending upon the
level of security necessary in a given perimeter scenario, will
often dictate a degree of compromise between the robustness of
identity validation and physical presence detection and convenience
and ease of use of same.
[0022] Since modern biometric systems continue to exhibit systemic
ergonomic problems that inhibit widespread deployment, existing
biometric technologies alone are not adequate to provide secure
high speed identity validation on a continuous basis other than in
the very low level security environments. It is well known, for
example, that finger scanner based security is not very robust and
can result in excessive false negatives or positives depending on
the manner in which the finger scanner is configured. Iris scanning
today represents the most robust and rapid biometric technology of
all known biometric technologies, boasting statistically negligible
level of false positives or negatives. However, given the state of
modern iris scanning devices, namely a digital camera tuned to
infrared frequencies, a person being validated must carefully and
precisely position them self in front of the iris scan camera so an
image of the iris image can be captured, a process that can be time
consuming and frustrating--leading to an unwillingness to use the
technology due to "inconvenience and hassle factors."
[0023] A real world example of where robust biometrics would be
ideal but are not currently practical is in a high security
environment such as would be found at an airport where a variety of
people work on premises on a daily basis--such as ticket agents,
baggage handlers, airplane mechanics, food transport personnel and
even TSA personnel who are most directly responsible for security.
In all of the aforementioned circumstances, positive identification
is mandatory to minimize security risks, not only to confirm
someone's identity when they report for work, but to ensure said
person does not access unauthorized areas--such as a food court
employee wandering out to the tarmac where airplanes are being
refueled and baggage is being loaded and unloaded. Equally
important to preventing unauthorized space access, is to know when
such accesses are attempted and by whom--knowing failed access
attempts is equally important as knowing valid access attempts.
[0024] In virtually all instances other than emergencies,
unauthorized physical access very likely can only mean ulterior
motives ranging from crimes of theft on up through acts of
terrorism that may involve the undetected smuggling of weapons or
contraband onto a airplane. With many existing security measures in
such environments, an imposter might need to don the appropriate
uniform such as a baggage handler might wear, obtain an identity
badge (and possibly alter it if it exhibited a photo of the
legitimate employee) and possibly even obtain an access code to
unlock certain electronically actuated doors or access points in
order to gain unauthorized access to sensitive areas. Therefore, in
an ideal world, iris scanning ideally could be deployed at these
sensitive access points, but as a practical matter, due to the
ergonomically inhibiting nature of this type of biometric
technology, that by definition requires a pro-active interaction by
the person being validated, tends to be impractical and therefore
not a viable means of maintaining security in geographically
sensitive areas.
SUMMARY
[0025] In one aspect, a firearm control system is provided for
either the new manufacture or retrofit of existing firearms to
support several features--an electronically controlled interlock
system in the weapon that may be used to prevent the trigger from
being pulled, and the use of GPS/Mobile/WiFi wireless
communications that are used to determine the physical geographic
location of the given firearm, such that if it is in a school and
the carrier of the weapon is not authorized to be on the campus of
the school (such as a student or an extraneous third party coming
onto the campus) the Cloud-based service disarms or otherwise
disables the weapon so that it may not be used.
[0026] In another aspect, a firearm control system uses biometrics
to control the operation of a firearm, namely if you are not the
registered user then it cannot be fired. In a preferred
implementation, a biometrically-enabled token ("BET token" or
"B.E.T.") would be used, wherein the carrier of the controlled
weapon would wear such a BET token (bracelet, ring, etc.) that
would be validated via a biometrics and once so validated, would
remain in constant communication with the weapon so the carrier
could fire it. If the gun becomes separated by a certain
(pre-determined) distance, then the gun becomes disabled and when
back in range of the BET token it would become re-enabled.
Furthermore, in the event the carrier of the weapon removes the BET
token, it is immediately disabled and the weapon would
automatically become disabled as well, and then to re-enable the
weapon, the carrier would have to go through the re-enablement of
the BET token and then the gun would be ready for use.
[0027] In yet another aspect, a firearm control system for a
firearm authorized for use by a person having a validated identity,
the system comprises a firearm having a frame, barrel, firing
mechanism and trigger, the trigger being operatively connected to
the firing mechanism such that selective operation of the trigger
causes the firing mechanism to operate and fire the firearm. An
interlock system is provided for enabling and disabling operation
of the firearm, the interlock system being disposed on the frame
and including a communications/control module, a trigger module
operatively connected to the communication/control module to send
and receive signals therebetween, and operatively connected to the
trigger to sense attempted operation of the trigger by a user and
send signals to the communications/control module, and a firing
mechanism module operatively connected to the communication/control
module to send and receive signals therebetween, and to the firing
mechanism to enable or disable operation of the firing mechanism.
The interlock system operates to enable and disable operation of
the firearm based on signals sent to, and received from, the
communications/control module.
[0028] In one embodiment, the communication/control module receives
external signals indicative of current validated identity
information and, upon receipt of signals from the trigger module,
the communication/control module compares the current validated
identity information to a predetermined validated identity of the
authorized user stored in the interlock system, and sends
responsive signals to the firing mechanism module that disables
operation of the firing mechanism if the validated identities do
not match.
[0029] In another embodiment, the communication/control module
receives external signals indicative of a current geographic
location of the firearm and, upon receipt of signals from the
trigger module, the communication/control module compares the
current geographic location to a list of prohibited locations
stored in the interlock system, and the sends responsive signals to
the firing mechanism module that disables operation of the firing
mechanism if the current geographic location is a prohibited
location.
[0030] In yet another embodiment, the firearm control system
further comprises a biometrically-enabled token ("BET") that is
associated with a biometrically validated identity of an authorized
user and is configured to be worn or carried by the authorized
user. The BET includes a body and a BET communication/control
module attached to the body. The BET communication/control module
communicates with the communication/control module of the firearm
to send signals indicative of current validated identity
information.
[0031] In still another embodiment, the BET communication/control
module communicates with the communication/control module of the
firearm to send signals indicative of the distance between the BET
token and the firearm.
[0032] In a further embodiment, the BET communication/control
module communicates with the communication/control module of the
firearm to send signals indicative that the BET token was removed
from the authorized user.
[0033] In the security industry, two or more such methods, such as
a pin number or password, when combined with a token or a biometric
in a single identify validation session, is typically referred to
as "two factor" or "multi factor" identification/authentication
process.
[0034] In one aspect, an identity authentication system calls for
at least a two factor identification/authentication process that in
the preferred embodiment integrates the "Who You Are" and the "What
You Have" methods of identify validation into a seamless identity
validation and continuous physical presence validation system that
provides a robust physical access entry point identity validation
means to confirm one's identity followed by a continuous and
equally robust means of confirming identity of the given person
once within a controlled security perimeter while preventing
ingress and egress by imposters attempting to gain unauthorized
access or by authorized personnel once in a secure perimeter from
either intentionally or unintentionally moving into restricted
areas within the secure perimeter where the given person should not
be able access.
[0035] In one embodiment, the system executes an appropriately
robust identity validation method that would comprise any of the
token ("What you have") identity validation methods coupled with
biometric validation ("Who you are"), at which time, assuming the
person seeking access is indeed validated to the extent required by
the security rules in place, a token is placed on their person in
such a manner that once on the person, it is associated with the
person so during subsequent times while in the secure perimeter, a
person's legitimate presence can be validated purely by the act of
having physical possession of the token.
[0036] There are also various types of tokens contemplated by the
invention designed to offer differing degrees of personal presence
validation security of the person in question predicated by the
degree of security required in a given secure perimeter
environment.
[0037] In one embodiment, a passive token is utilized, wherein the
passive token requires the person in question to display it or
otherwise actively present it to some sort of reader so that it may
be read and validated against a database to validate the person's
physical presence.
[0038] In another embodiment, an active token is utilized, wherein
the active token is electronically and securely activated and
simultaneously associated with the now validated identity of the
person seeking access.
[0039] In still another embodiment, the token has the capability
that in the event once the token is properly activated and
associated with the person seeking access, should that person
remove the token and/or attempt to transfer the token to an
imposter, the mere act of removing the token from the person would
deactivate/disable the token in such a manner that the token
sensing devices within the physically secure perimeter would
immediately sense the event and appropriate notification would be
instantly issued so that the appropriate security rules would be
invoked in order to address the transgression.
[0040] In another aspect, a method is provided for ensuring
continuous personal physical validation, the method comprising the
following steps: obtaining unique personal identification
information to validate an identity of a person, wherein validating
the identity results in a validated identity; activating a physical
token; associating the physical token with the validated identity,
wherein the physical token represents the validated identity within
a defined environment after the steps of activating and associating
are performed; placing the physical token on the person, wherein
the physical token is configured to detect removal of the physical
token from the person after being placed on the person and is
further configured to deactivate the physical token when such
removal is detected; monitoring the physical token by at least one
token sensing device within the defined environment, wherein
deactivation of the physical token produces an event that is sensed
by the token sensing device; and issuing a notification when the
event occurs.
[0041] In one embodiment, the step of obtaining unique personal
identification information includes a two factor identification
process.
[0042] In another embodiment, the two factor identification process
includes at least one "Who You Are" identification process and at
least one "What You Have" identification process.
[0043] In yet another embodiment, the "Who You Are" identification
process involves biometric validation of the person and the "What
You Have" identification process involves a token-based validation
of the person.
[0044] In a further embodiment, the physical token associated with
the validated identity was not used in the step of obtaining unique
personal identification information.
[0045] In another embodiment, the defined environment an area is
within a controlled security perimeter having limited ingress and
egress.
[0046] In another aspect, an embedded device is provided for use in
systems and methods in accordance with additional embodiments.
[0047] In yet another aspect, a medicinal administration device and
companion token are provided for use in systems and methods in
accordance with still further embodiments.
BRIEF DESCRIPTION OF THE DRAWINGS
[0048] For a more complete understanding, reference is now made to
the following description taken in conjunction with the
accompanying Drawings in which:
[0049] FIG. 1 shows a system for weapon/firearm control in
accordance with one aspect; and
[0050] FIG. 2 shows a method for weapon/firearm control in
accordance with another aspect.
DETAILED DESCRIPTION
[0051] Referring now to the drawings, wherein like reference
numbers are used herein to designate like elements throughout, the
various views and embodiments of weapon control system are
illustrated and described, and other possible embodiments are
described. The figures are not necessarily drawn to scale, and in
some instances the drawings have been exaggerated and/or simplified
in places for illustrative purposes only. One of ordinary skill in
the art will appreciate the many possible applications and
variations based on the following examples of possible
embodiments.
[0052] Referring now to FIG. 1, there is illustrated a
weapon/firearm control system in accordance with one aspect. The
weapon/firearm control system 100 includes a firearm 102 and a
biometrically enabled token 104 ("BET token" or "B.E.T."). The
firearm 102 may be, but is not limited to, a rifle, pistol or
shotgun. The firearm 102 may be of new manufacture, or it may be an
existing firearm retrofitted to operate with the system 100.
[0053] The firearm 102 includes a frame 106, a barrel 108, a firing
mechanism 109 and a trigger 110. The trigger 110 is operatively
connected to the firing mechanism 109 such that selective operation
of the trigger causes the firing mechanism to operate and fire the
firearm 102. Optionally, a safety mechanism 111 may be interposed
between the trigger 110 and the firing mechanism 109 to prevent
accidental operation of the firearm 102. In the illustrated
embodiment, the safety mechanism 111 is a grip safety.
[0054] The firearm 102 further includes an interlock system 112 for
enabling and disabling operation of the firearm. In the illustrated
embodiment, the interlock system 112 includes a
communications/control module 114, a trigger module 116 and a
firing mechanism module 118. The interlock system 112 may be
disposed in the frame 106 or other portions of the firearm 102. The
interlock system 112 operates to enable and disable operation of
the firearm 112 based on signals sent to, and received from, the
communications/control module 114. In the illustrated embodiment,
the trigger module 116 is operatively connected to the trigger 110
(denoted by arrow 120) to sense attempted operation of the trigger
by a user. Upon such attempted operation of the trigger 110, the
trigger module 116 sends signals (denoted by arrow 122) to the
communications/control module 114. Further in the illustrated
embodiment, the firing mechanism module 118 is operatively
connected to the firing mechanism 109 (denoted by arrow 124) to
enable or disable operation of the firing mechanism.
[0055] Upon attempted operation of the trigger 110, the trigger
module 116 sends signals 122 to the communications/control module
114. As further described below, the communication/control module
114 has information regarding the validated identity of the user
and/or information regarding the geographic location of the firearm
102. Upon receipt of signals 122 from the trigger module 116, the
communication/control module 114 evaluates the circumstances
according to predetermined instructions stored in the interlock
system 112, and then sends responsive signals (denoted by arrow
126) to the firing mechanism module 118 that either enable or
disable operation of the firing mechanism 109, and thus that either
enable or disable operation of the firearm 102. In alternative
embodiments, the functions of the trigger module 116 and firing
mechanism module 118 may be combined into a single module (not
shown) to selectively block the trigger 110 from operation upon
command from the communications/control module 114, rather than by
affecting operation of the firing mechanism 109 itself. In still
further embodiments, the functions of the trigger module 116 and/or
firing mechanism module 118 may selectively enable and disable the
safety 111 upon command from the communications/control module 114,
and thereby control operation of the firearm 102.
[0056] The communications/control module 114 may include
GPS-/mobile (i.e., cellular)-/ and/or WiFi-enabled wireless
communications (denoted by arrow 128) that allow the interlock
system 112 to communicate with one or more data communication
networks 129 including, but not limited to, the Internet, cellular
and/GPS satellite networks. Such communication functionality allows
the interlock system 112 to determine the physical geographical
location of the firearm 102 at any given time. This communication
functionality may further allow an external administrator 130 to
determine the physical geographical location of the firearm 102 by
communicating (denoted by signals 131) with the interlock system
112 over the network 129.
[0057] In one embodiment, the firearm control system 100 uses the
Internet, cellular and/GPS satellite network communication 128 to
determine if the firearm 102 is geographically within a school,
campus or other geographic location that is not authorized for
firearm use. If so, the interlock system 112 is instructed to
disable the firearm 102; otherwise, the interlock system is
instructed to enable the firearm for use. In another embodiment,
the firearm control system 100 uses both the geographic information
obtained from the Internet, cellular and/GPS satellite network
communications 128 and the validated identity of the user (provided
by the BET token 104 as herein described) to determine if the
firearm 102 is geographically within a school, campus or other
geographic location where the validated user is not authorized for
firearm use. If so, the interlock system 112 is instructed to
disable the firearm 102; otherwise, the interlock system is
instructed to enable the firearm for use. The latter embodiment has
the advantage of allowing authorized users with a validated
identity (e.g., law enforcement personnel) to have an enabled
firearm 102 even in a geographic location (such as a school) that
is otherwise prohibited for firearm use. It will be appreciated
that the instructions in the interlock system 112 may be changed by
means of communications 128 received from the network 129. This
allows a remote, e.g., "cloud-based", administrator 130 to monitor
and/or change the instruction in the interlock system 112.
[0058] Another aspect of the weapon/firearm control system 100 is
the use of biometrics to control the operation of the firearm 102,
e.g., if you are not the registered (i.e., authorized and/or
validated) user of the firearm, then it is disabled from operation
(i.e., firing). The BET (biometrically-enabled token) 104
facilitates the use of such biometrics in the system 100. In
preferred embodiments, the BET token 104 is configured as a
bracelet, ring or other accessory that can be worn or carried by
the user of the handgun 102. In the embodiment illustrated in FIG.
1, the BET token 104 is configured as a ring. The BET token 104 may
include a body 132 and a BET communication/control module 134
attached to or disposed within the body. In FIG. 1, the module 134
is shown enlarged for purposes of illustration.
[0059] In various embodiments, the module 134 may communicate with
the communication/control module 114 of the firearm 102 directly
(denoted by signals 134), by means of the network 129 (denoted by
signals 138) or both. In addition, the module 134 may communicate
with a remote administrator 130 via the communication network 129.
The BET token 104 and the interlock system 112 further have the
combined functionality to determine the distance (denoted D)
between the firearm 102 and the BET token.
[0060] Referring now also to FIG. 2, there is illustrated a method
for using a weapon/firearm control system in accordance with
another aspect. The method 200 includes the following steps. First
(block 202), unique personal identification information is obtained
to validate an identity of an authorized firearm carrier. In a
preferred embodiment, the method 200 executes a two-factor identity
validation method that comprises any of the token-based ("What you
have") identity validation methods coupled with a biometric-based
("Who You Are") identity validation method. Validating the identity
results in a validated identity. In other words, the authorized
user (i.e., carrier) of the firearm 102 obtains a validated
identity using biometrics. Next (block 204), a BET token 104 is
activated. Next (block 206), the physical BET token 104 is
associated with the validated identity 208. The BET token 104
represents the validated identity (of the authorized user) in
proximity to the firearm 102. Once activated via the biometrics,
the BET token 104 remains in constant communication with the
firearm 102.
[0061] Next (block 208), the physical BET token 104 is placed on
the authorized user. In some embodiments, the BET token 104 is
configured to detect removal of the BET token from the user after
being placed on the user. In some further embodiments (block 209),
the BET token 104 is further configured to deactivate the BET token
(i.e., itself) when such removal is detected. In other embodiments
(not shown), the BET token 104 may be a passive token
[0062] Under normal circumstances (block 210), communication
between the module 134 of the BET token 104 and the
communication/control module 114 of the firearm 102 causes the
interlock system 112 to enable the firearm to operate (block 212).
If, however, the firearm 102 becomes separated by more than a
certain (pre-determined) distance D.sub.max, then the interlock
system 112 disables operation of the firearm (block 211). When the
BET token 104 come back within range D.sub.max of the firearm 102,
the interlock system 112 becomes re-enabled.
[0063] In a preferred embodiment, the BET token 104 is configured
to detect if it is removed from the person of the authorized user.
In the event the authorized user/carrier of the firearm 102 removes
the BET token 104 (or if it is lost or stolen), the BET token 104
is immediately disabled, thereby also causing the interlock system
112 to disable the firearm 102. In some such embodiments, the
authorized user/carrier may have to repeat the biometric identity
validation process (blocks 206, 208) to re-enable the BET token
104, and thus to re-enable the firearm 102, such that the firearm
is again ready for use (block 212).
[0064] By way of further description of the systems and methods for
ensuring continuous personal physical validation in accordance with
particular aspects of the current invention, the following is
presented. A method for ensuring continuous personal physical
validation includes the following steps: First, unique personal
identification information is obtained to validate an identity of a
person. In one embodiment, the system executes a two-factor
identity validation method that comprises any of the token-based
("What you have") identity validation methods coupled with a
biometric-based ("Who You Are") identity validation method.
Validating the identity results in a validated identity.
[0065] Next, a physical token is activated. Next, the physical
token is associated with the validated identity. The physical token
represents the validated identity within a defined environment
after the steps of activating and associating are performed.
[0066] Next, the physical token is placed on the person. In some
embodiments, the physical token is configured to detect removal of
the physical token from the person after being placed on the
person. In further embodiments, the physical token is further
configured to deactivate the physical token (i.e., itself) when
such removal is detected. In other embodiments (not shown), the
token may be a passive token.
[0067] The person with the physical token is allowed entry into the
defined environment. Typically, the defined environment will be a
secure area having limited ingress and egress. Next, the physical
token is monitored by at least one token sensing device within the
defined environment. Deactivation of the physical token produces an
event that is sensed by the token sensing device. In some
embodiments, the event may be active, e.g., a radio signal sent
from the physical token to the token sensing device, while in other
embodiments the event may be passive, e.g., a change to a memory
value on the physical token that can be detected when interrogated
by the token sensing device.
[0068] Finally a notification is issued when the event (i.e.,
deactivation of the token) occurs. The notification may be sent to
recipients within the defined environment and/or to recipients
outside the defined environment, e.g., via a data communication
network, such as the Internet or other network.
[0069] A further system and method in accordance with another
aspect includes an embedded device comprising a GPS-/mobile
(cellular)-/WiFi- and/or biometric-enabled token chip that may be
affixed to, embedded in or implanted in people's apparel including,
but not limited to, shirts, shoes, watches, necklaces, belts. The
embedded device may operate substantially as the physical token
previously described in connection with FIGS. 1 and 2. The embedded
device may identify where a given (e.g., validated) person
physically is, so that when combined with certain pre-determined
cloud based parameters, notifications and/or alerts may be
triggered that may drive certain actions.
[0070] In one embodiment, a user with "Administration" privileges
("Admin User") may establish rules and/or geographic area
perimeters on a map via the web or mobile device by identifying
"known" locations and setting a variety of parameters such
geographic special perimeters. For example, a school may be
designated as a defined location, wherein the Admin User may drop a
virtual pin on the map, and then expand an area into a perimeter
around the defined location (i.e., around the school). Next, when a
person ("student") wearing the apparel with embedded device enters
an approved perimeter area the Admin User (and/or others previously
established by the Admin User) may receive corresponding
notification. If and when the given student leaves the approved
area, additional notifications are sent as previously described.
Thus, the Admin User (and other designated recipients) may track
the movement of the student wearing the embedded device via web or
mobile interface.
[0071] In a further embodiment, the student carries a second token
on their person such as bracelet, keychain, etc. The second token
may include wireless connectivity. If any apparel with embedded
device becomes separated by too much distance D (a
user-configurable amount) from the second token, then a
notification may be sent to predefined recipients.
[0072] In still further embodiments, the embedded device may be
implanted directly onto or into a validated person's body, wherein
data such as medical history, payment options, etc. can be
constantly updated. When the validated person with the implanted
device passes near a detector device (not shown), e.g., a
ceiling-based sensor or floor-based sensor, the data in the
embedded device may be retrieved and accessed. For example, at a
doctor's office, for information in the validated person's embedded
device may be instantly made available to the medical personnel
supported by optional password and/or biometric security, so that
only personnel authorized by the person having the embedded device
would permit the data exchange to take place.
[0073] This overall system for the embedded device comprises
physical devices (products) along with supporting software and
cloud based data facilities.
[0074] It will be appreciated by those skilled in the art having
the benefit of this disclosure that this weapon/firearm control
system provides numerous advantages for public safety, compared to
the prior art. It should be understood that the drawings and
detailed description herein are to be regarded in an illustrative
rather than a restrictive manner, and are not intended to be
limiting to the particular forms and examples disclosed. On the
contrary, included are any further modifications, changes,
rearrangements, substitutions, alternatives, design choices, and
embodiments apparent to those of ordinary skill in the art, without
departing from the spirit and scope hereof, as defined by the
following claims. Thus, it is intended that the following claims be
interpreted to embrace all such further modifications, changes,
rearrangements, substitutions, alternatives, design choices, and
embodiments.
* * * * *