The present disclosure relates to firearm security devices, and more specifically to a gun lock device and a firearm security system configured to prevent unauthorized access by utilizing biometric authentication and wireless communication for unlocking, in combination with physical locking mechanisms.
A system of one or more computers can be configured to perform particular operations or actions by virtue of having software, firmware, hardware, or a combination of them installed on the system that in operation causes or cause the system to perform the actions. One or more computer programs can be configured to perform particular operations or actions by virtue of including instructions that, when executed by data processing apparatus, cause the apparatus to perform the actions. One general aspect includes a biometric firearm locking apparatus. The biometric firearm locking apparatus also includes a lock housing having at least two apertures. The apparatus also includes a cable with two ends, the two ends being insertable into the apertures of the lock housing to secure the cable in place; a microcontroller disposed within the lock housing, the microcontroller may include a processor and memory, the processor being configured to execute instructions stored in the memory to perform locking and unlocking functions; a communications interface operatively connected to the microcontroller, the communications interface being configured to receive signals from a mobile device using wireless communication protocols; a motor disposed within the lock housing, the motor being operatively connected to the microcontroller and configured to drive a locking member between a locked configuration and an unlocked configuration; where, upon receiving a signal from the mobile device to lock the apparatus, the microcontroller causes the motor to engage the locking member to secure the ends of the cable within the apertures, thereby locking the apparatus. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.
Implementations may include one or more of the following features. The apparatus where upon receiving a signal from the mobile device to unlock the apparatus, the microcontroller causes the motor to retract the locking member, allowing the ends of the cable to be removed from the apertures. The mobile device is configured to capture biometric data, and the biometric data is used to authorize the transmission of the lock or unlock signals to the microcontroller. The biometric data captured by the mobile device includes facial recognition data, and the mobile device is configured to transmit an unlock signal to the microcontroller upon successful facial recognition authentication. The mobile device is further configured to store multiple biometric profiles, each profile corresponding to an authorized user, and the apparatus is configured to allow delegated role-based access control for unlocking the firearm. The biometric profiles are stored locally on the mobile device or remotely in a cloud-based storage system, accessible via the communications interface using secure communication protocols. The microcontroller is configured to perform locking and unlocking operations in response to short-range wireless communications using bluetooth, or long-range wireless communications using a cellular or wi-fi network. The cable is formed from a rigid material and configured to be threaded through a portion of the firearm, preventing removal of the firearm without disengaging the cable from the locking apparatus. The ends of the cable are configured with locking notches, the notches being engageable with the locking member to securely lock the cable in place within the apertures of the lock housing. Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.
The subject matter disclosed relates to a gun lock device and firearm security system designed to prevent unauthorized access to a firearm. The gun lock device includes a lower housing and an upper housing that enclose and protect the internal locking components. Within the lower housing, a motor is operatively connected to a latch pin, which is configured to rotate when the motor is actuated. The latch pin is designed to engage or disengage with a catch pin located in the upper housing, thereby securing or releasing the lock.
The device is powered by a power source connected to both the motor and a control circuit. The control circuit regulates the operation of the motor, determining whether the latch pin should engage or disengage from the catch pin, based on received external signals. The system may further include a USB-C port for recharging the power source.
Additionally, the gun lock device can be part of a larger security system that includes a mobile device capable of capturing biometric data, such as a fingerprint scan. This biometric data is transmitted to the control circuit, which unlocks the gun lock upon receiving an authorized signal. The system may also feature a cable attached to the gun lock for added physical security, and can be equipped with tamper detection sensors and an audible alert system to provide feedback in response to unlocking attempts or unauthorized access.
The cable 24 can be threaded through a slide 26 and/or other components of the firearm 30 to prevent the same from being used. The firearm 30 is thus in a locked configuration in
The microcontroller 40 also controls a motor 44 or other actuation means that drives locking member(s) 46. Based on signals received from a mobile device 48 over the communications interface 42, the microcontroller 40 can cause the locking member(s) 46 to move between locked and unlocked configurations.
In one example, when the user inserts the ends 20 and 22 of the cable 24 into the apertures 14 and 16 of the apparatus 10, and then a signal is received by the microcontroller 40 to lock the apparatus 10. The microcontroller 40 causes the motor 44 to engage the locking member(s) 46 and lock the ends 20 and 22 in place (locked configuration). Conversely, when a signal is received to unlock the apparatus, the microcontroller 40 causes the motor 44 to engage and retract the locking member(s) 46, thereby allowing the ends 20 and 22 to be removed and unlocking the firearm.
Again, this is merely an example, and not intended to be limiting. In general, the ends 20 and 22 of the cable 24 can be inserted into the lock housing 12 and secured using any suitable means to hold the ends 20 and 22 in a secure manner upon the microcontroller 40 receiving a lock signal. The ends 20 and 22 can be removed upon the microcontroller 40 receiving an unlock signal. The cable 24 can be removed from the firearm.
In some instances, the cable 24 includes two ends 20 and 22, each of which is equipped with locking notches, such as locking notch 52. These notches 52 are specifically designed to interact with the locking member 46 within the lock housing 12. Each notch 52 on the cable ends is shaped to securely engage with the locking member 46 when the cable end 20 is inserted into the aperture 14. The locking member 46, driven by the motor 44, is configured to move into a locked position, where it aligns with and engages the locking notches 52, thereby preventing the cable 24 from being removed.
The locking notches 52 are designed to provide a mechanical interlock that ensures the cable 24 remains securely fastened when the locking member 46 is in the engaged (locked) position. When the motor 44 retracts the locking member 46 in response to an unlock signal, the locking member 46 disengages from the notches 52, allowing the cable end 20 to be withdrawn from the aperture 14, thereby unlocking the apparatus.
This interaction between the locking member 46 and the locking notches 52 on the cable ends 20 and 22 ensures that the cable 24 remains securely fastened in the locked position, providing robust physical security for the firearm 30.
Any male or female arrangement can be used between the locking member 46 and the locking notches 52 to achieve secure engagement. For example, the locking member 46 may be configured as a male component that fits into corresponding female notches 52 on the cable ends 20 and 22, or vice versa, where the notches 52 may be male protrusions that engage with a female recess in the locking member 46. This flexibility allows for various interlocking configurations, as long as the engagement between the locking member 46 and the notches 52 securely fastens the cable 24 within the lock housing 12.
As noted above, the apparatus 10 acts in response to signals received from the mobile device 48. In some instances, the mobile device 48 executes a biometric application 50 that provides facial recognition or other biometric identification means. In some instances, when the user desires to lock the firearm, the user can select a lock feature from the application. The mobile device 48 then transmits a lock signal to the apparatus 10 and the lock procedure described above is initiated.
When the user desires to unlock the firearm, a facial recognition routine on the application verifies the face of the user with images obtained from a camera on the phone. Once the user's face has been recognized and authenticated, the mobile device 48 can transmit an unlock signal to the apparatus 10 and the unlock procedure as described above is initiated. Methods for performing facial recognition would be known to one of ordinary skill in the art but generally include creating a baseline facial recognition profile and comparing images obtained by the mobile device to unlock the firearm.
In addition to providing access for a single user, the system can be configured to provide delegated role-based access control. For example, an owner of the firearm 30, who has a facial recognition profile allowing them to unlock the firearm, can delegate access to another individual by adding that individual's facial recognition profile to the system. The delegated user's profile can be recognized by the mobile device 48 application, allowing them to unlock the firearm 30 as well. In some implementations, the facial recognition profiles of authorized users may be stored locally on the mobile device 48, or alternatively, in cloud storage, accessible remotely through secure communication protocols known in the art. While facial recognition has been described, other biometric authentication methods, such as fingerprints, retinal scans, or similar biometric features, may also be used.
In one embodiment, a service provider 70 is responsible for handling biometric data processing, rather than the mobile device 48. In this configuration, the mobile device 48 captures the biometric data, such as a facial recognition scan, and securely transmits the raw or encrypted biometric data to the service provider 70 over a secure communication channel. The service provider 70 processes the biometric data to perform authentication by comparing the data against stored biometric profiles in a secure database.
Once the service provider 70 successfully authenticates the user, it generates an authorization signal and sends the signal back to the mobile device 48. The mobile device 48 then relays this authorization signal to the microcontroller 40 in the gun lock apparatus 10 via the communications interface 42. Upon receiving the authorization signal, the microcontroller 40 actuates the motor 44 to move the locking member 46 to the unlocked position, allowing the removal of the cable 24 from the apertures 14 and 16, thereby unlocking the firearm 30.
This embodiment ensures that sensitive biometric data is processed and stored remotely at the service provider 70, reducing the computational burden on the mobile device 48 and potentially providing enhanced security through centralized biometric management.
In one embodiment, rather than having a cable that has ends that can each be inserted into the lock housing 12, one end of the cable 24 is permanently fixed in the lock housing 12, while the other end is releaseably detachable with the lock housing 12.
One end 22 of the cable 24 is fixed within the lock housing 12, while the other end 20 is inserted into an aperture 14 of the lock housing 12, where it engages with a locking member 46. The locking member 46 is operatively connected to a motor 44 disposed within the housing 12. The motor 44 is controlled by a microcontroller 40, which receives signals from a mobile device 48 via a communications interface 42. The mobile device 48 can capture biometric data, such as facial recognition or fingerprint scans, and transmit a lock or unlock signal to the microcontroller 40 based on the biometric verification.
When the system receives a lock signal, the microcontroller 40 activates the motor 44 to move the locking member 46 into a locked position, securing the cable end 20 within the housing 12. The fixed end 22 remains secured in its position, ensuring the cable 24 is fully engaged and the firearm 30 is immobilized. Conversely, upon receiving an unlock signal, the microcontroller 40 causes the motor 44 to move the locking member 46 to an unlocked position, allowing the cable end 20 to be removed from the housing 12 and releasing the firearm 30 from its locked configuration. In this embodiment, only one locking member 46 is required, as the opposite end 22 of the cable 24 remains fixed within the lock housing 12.
In general, the lock housing 12 is designed with a universal receiving system that can accommodate various security accessories equipped with compatible locking notches 52. While the cable 24 configuration provides one implementation, the lock housing 12 can similarly secure other accessories such as trigger lock mechanisms, barrel locks, magazine locks, or gun safe attachment plates, provided these accessories incorporate the standardized locking notch 52 interface. This modular approach allows users to adapt the same biometrically-secured housing unit 12 across different firearms 30 and security scenarios while maintaining consistent authentication and locking mechanisms. For example, a user could employ a cable 24 lock for long-term storage, switch to a trigger lock for transport, or utilize a mounting plate for secure cabinet attachment-all using the same biometric lock housing 12 and mobile device 48 authentication system.
For example, a trigger lock could include a block or stop that prevents the trigger of the gun from firing when a shaft coupled to the block is inserted behind the trigger. The end of the shaft can include a lock notch or similar female receiver that is inserted into the lock housing 12. The locking pin 46 driven by the motor-actuated mechanism can lock the end of the trigger lock in place.
The fundamental securing mechanism employs a receiver-and-pin engagement system where the accessory (whether cable 24, lock, or other device) includes a receiving feature 52 that accepts one or more locking pins 46 driven by the motor-actuated mechanism within the housing 12. While one embodiment shows triangular engagement surfaces, the receiving features 52 may implement various geometric profiles including but not limited to circular holes, rectangular slots, or other polygonal recesses. The mechanical interface between the motorized locking pin 46 and the corresponding receiving features 52 on the accessory, when engaged, creates a secure mechanical bond that can only be released upon authorized biometric authentication and subsequent motor 44 actuation.
Where appropriate, the functions described herein can be performed in one or more of hardware, software, firmware, digital components, or analog components. For example, the encoding and or decoding systems can be embodied as one or more application specific integrated circuits (ASICs) or microcontrollers that can be programmed to carry out one or more of the systems and procedures described herein. Certain terms are used throughout the description and claims refer to particular system components. As one skilled in the art will appreciate, components may be referred to by different names. This document does not intend to distinguish between components that differ in name, but not function.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present technology has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the present technology in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the present technology. Exemplary embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, and to enable others of ordinary skill in the art to understand the present technology for various embodiments with various modifications as are suited to the particular use contemplated.
If any disclosures are incorporated herein by reference and such incorporated disclosures conflict in part and/or in whole with the present disclosure, then to the extent of conflict, and/or broader disclosure, and/or broader definition of terms, the present disclosure controls. If such incorporated disclosures conflict in part and/or in whole with one another, then to the extent of conflict, the later-dated disclosure controls.
The terminology used herein can imply direct or indirect, full or partial, temporary or permanent, immediate or delayed, synchronous or asynchronous, action or inaction. For example, when an element is referred to as being “on,” “connected” or “coupled” to another element, then the element can be directly on, connected or coupled to the other element and/or intervening elements may be present, including indirect and/or direct variants. In contrast, when an element is referred to as being “directly connected” or “directly coupled” to another element, there are no intervening elements present.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be necessarily limiting of the disclosure. As used herein, the singular forms “a,” “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. The terms “comprises,” “includes” and/or “comprising,” “including” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Example embodiments of the present disclosure are described herein with reference to illustrations of idealized embodiments (and intermediate structures) of the present disclosure. As such, variations from the shapes of the illustrations as a result, for example, of manufacturing techniques and/or tolerances, are to be expected. Thus, the example embodiments of the present disclosure should not be construed as necessarily limited to the particular shapes of regions illustrated herein, but are to include deviations in shapes that result, for example, from manufacturing.
Aspects of the present technology are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the present technology. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
In this description, for purposes of explanation and not limitation, specific details are set forth, such as particular embodiments, procedures, techniques, etc. in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details.
Reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” or “according to one embodiment” (or other phrases having similar import) at various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. Furthermore, depending on the context of discussion herein, a singular term may include its plural forms and a plural term may include its singular form. Similarly, a hyphenated term (e.g., “on-demand”) may be occasionally interchangeably used with its non-hyphenated version (e.g., “on demand”), a capitalized entry (e.g., “Software”) may be interchangeably used with its non-capitalized version (e.g., “software”), a plural term may be indicated with or without an apostrophe (e.g., PE's or PEs), and an italicized term (e.g., “N+1”) may be interchangeably used with its non-italicized version (e.g., “N+1”). Such occasional interchangeable uses shall not be considered inconsistent with each other.
Also, some embodiments may be described in terms of “means for” performing a task or set of tasks. It will be understood that a “means for” may be expressed herein in terms of a structure, such as a processor, a memory, an I/O device such as a camera, or combinations thereof. Alternatively, the “means for” may include an algorithm that is descriptive of a function or method step, while in yet other embodiments the “means for” is expressed in terms of a mathematical formula, prose, or as a flow chart or signal diagram.
This non-provisional application claims the benefit and priority of U.S. Provisional Patent Application Ser. No. 63/547,085, filed on Nov. 2, 2023, which is hereby incorporated by reference in its entirety, including all appendices and attachments, as if fully set forth herein.
Number | Date | Country | |
---|---|---|---|
63547085 | Nov 2023 | US |