There are many situations in which the personal safety of an individual is at risk from an attacker. For example, violent crimes, such as robbery, rape and assault, frequently occur while the victim is walking to or from a vehicle or a residence. Oftentimes these victims are women. The crimes of molestation, rape and assault, in particular, are frequently directed at exercisers, such as walkers, hikers and joggers, who are preoccupied with the exercise activity and thus are vulnerable to a sudden attack. Exercisers are also more vulnerable to an attack because it is difficult to carry a device for protecting against an attack while exercising.
Most of the presently available self-defense devices are not suitable for a large percentage of the population. For example, many people do not wish to carry a gun and do not have the physical capacity to use a club or other bulky weapon against an attacker. There remains a need for a personal safety device that provides a strong deterrent to attackers, is safe for the user, portable, and is readily used in a natural and/or reflexive self-defense mode.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure.
In one general aspect, the present disclosure is directed to a protective device that includes a housing including an upper member, a lower member, and a flexible sheath that extends between the upper member and the lower member. Furthermore, the upper member is substantially more rigid than the flexible sheath, the housing surrounds a cavity, and the housing is sized and dimensioned to fit in a human hand. In addition, the protective device includes a first protruding portion and a second protruding portion, each protruding portion extending distally outward from the upper member, and having an activated state and a deactivated state, wherein the flexible sheath is compressed in the activated state such that a height of the housing is decreased.
The above general aspect may include one or more of the following features. For example, the protective device can also include a first groove disposed between the first protruding portion and the second protruding portion, and/or at least a first defensive component disposed within the cavity, the first defensive component being substantially elongated in a direction substantially parallel to an orientation of the first protruding portion. In some cases, the first defensive component includes a body portion and an upper portion, wherein the body portion has an outer surface that is substantially blunt, and the upper portion includes a blunt concave surface extending from the body portion to an outermost tip portion. As another example, the device includes a third protruding portion extending distally outward from the upper member, wherein the first protruding portion, the second protruding portion, and the third protruding portion are disposed in a substantially parallel arrangement. In some implementations, a second groove is disposed between the second protruding portion and the third protruding portion and/or the lower member is more rigid than the flexible sheath. In one example, the first protruding portion includes an apex portion that is substantially rounded, and/or the first protruding portion includes an apex portion that includes a plurality of bumps. In addition, the device can include an arm portion extending distally outward in an orientation substantially perpendicular to an orientation of the first protruding portion
In another general aspect, the present disclosure is directed to a protective device that includes a housing including an upper member, a lower member, and a flexible sheath that extends between the upper member and the lower member. The upper member is substantially more rigid than the flexible sheath, the housing surrounds a cavity, and the housing is sized and dimensioned to fit in a human hand. The protective device also includes an arm portion extending distally outward from a lateral side region of the upper member in a first direction, as well as a first defensive component disposed within the cavity, the first defensive component being substantially elongated in a direction perpendicular to the first direction.
The above general aspect may include one or more of the following features. In a first example, the first defensive component can include a body portion and an upper portion, and the body portion has an outer surface that is substantially blunt, and the upper portion includes a blunt concave surface extending from the body portion to an outermost tip portion. In some implementations, the protective device is operable in an activated state and a deactivated state, wherein the body portion is disposed entirely within the flexible sheath in the deactivated state and/or wherein the upper portion is disposed entirely outside of the housing in the activated state. In another example, the protective device also includes a second defensive component and a third defensive component arranged in parallel with the first defensive component.
In another general aspect, the present disclosure is directed to a method of transmitting an alert from a defensive device. The method includes compressing a flexible sheath of the device, thereby bringing an upper member and a lower member of the device closer together, exposing a plurality of elongated defensive components through openings in the upper member, and transmitting a first signal to a network when contact between a first sensing component and a second sensing component occurs.
The above general aspect may include one or more of the following features. The method can also include transmitting a second signal to a remote mobile device or to a local law enforcement agency. In some implementations, the method also includes transmitting a position of the device to a network when contact between a first sensing component and a second sensing component occurs. As another example, the method can include switching the device from a disabled mode to an enabled mode.
The drawing figures depict one or more implementations in accord with the present teachings, by way of example only, not by way of limitation. In the figures, like reference numerals refer to the same or similar elements.
In the following detailed description, numerous specific details are set forth by way of examples in order to provide a thorough understanding of the relevant teachings. However, it should be apparent that the present teachings may be practiced without such details. In other instances, well known methods, procedures, components, and/or circuitry have been described at a relatively high-level, without detail, in order to avoid unnecessarily obscuring aspects of the present teachings.
The following description provides various implementations of a handheld personal safety device and protective weapon. As noted above, there are few personal safety devices that can be easily carried and used by the general population. One significant problem with most of the commercially available stabbing or sharp-edged devices is the risk they pose to the user both before and during use. Weapons that include an uncovered sharp edge, such as a knife, have the potential to injure the user while being transported or carried. Storing an uncovered stabbing or cutting tool is impractical in most purses or bags because self-inflicted wounds and damage to such containers are too likely. One solution has been to cover the sharp edge(s) when the weapon not in use, but this renders such a device useless for the average person. During the confusion and stress of a personal attack, having to physically unsheathe or uncover a weapon before use will not be easy or even possible for most users. If the user is obligated to remember to activate, or uncover, or perform any other physical action that is not instinctive or autonomous in a defensive mode, it is too likely that the device will not be used effectively. Thus, a self-defense weapon must be continuously ready for reflexive and/or immediate use to be effective. To ensure that the weapon is properly used and available in real-life attack situations, the weapon should integrate into the natural reflexive actions of persons in a mode of self-defense.
The present implementations provide for a small, portable, lightweight, easy to use “claw” weapon that can be carried and safely stored by the user, yet rapidly activated when needed to repel an assault. In different implementations, a protective sheath isolates one or more elongated defensive components (identified and referred to previously as blades in the “Protective Weapon” application) in the body of the weapon configured to protect the user when not activated. To activate, the user squeezes the weapon, and the protective sheath constricts, thereby exposing the portions of the defensive components for use against an attacker. When the user relaxes their grip, the protective sheath expands to again sheathe the defensive components in the body of the weapon and protect the user from the defensive components.
For purposes of clarity, one implementation of a protective device (“device”) 100 is presented in
However, when a compressive force is applied to the first device 100, it can transition from the deactivated state 110 to the activated state 120, as presented in
In some implementations, the first upper member 130 includes an undulated or curved outer surface to facilitate the placement of a user's fingers. For example, in
For purposes of reference, the implementations described herein will be associated with various directional identifiers. Thus, the directional identifiers described herein are applicable to each implementation discussed below. For example, referring to the isometric view of
Reference is also made to directions or axes that are relative to the device itself, rather than to its intended orientation with regards to a user's hand or body. For example, the term “distal” refers to a part that is located further from a center of a device, while the term “proximal” refers to a part that is located closer to the center of the device. As used herein, the “center of the device” could be the center of mass and/or a central plane and/or another centrally located reference surface. In addition, the term “outermost” refers to a position that is most distal in a specified direction or along a particular axis.
Throughout this description, a device may also be associated with various axes. Referring to
A device may also be associated with various reference planes or surfaces. As used herein, the term “median plane” refers to a vertical plane which passes from the anterior side to the posterior side of the device, dividing the device into right and left halves, or lateral halves. As used herein, the term “transverse plane” refers to a horizontal plane located in the center of the device that divides the device into superior and inferior halves. As used herein, the term “coronal plane” refers to a vertical plane located in the center of the device that divides the device into anterior and posterior halves. In some embodiments, various implementations of the device are symmetric or substantially symmetric about two planes, such as the median plane and/or the transverse plane.
Referring now to the enlarged isometric view of the first device 100 in
In some implementations, the defensive components are disposed in a substantially parallel arrangement. Each defensive component comprises an inner portion extending from an elongated portion of the body. For example, in
In addition, it can be seen that the upper portion 244 includes a concave surface 248 that extends from the forward surface to an outermost tip portion 246. The concave surface 248 curves inward relative to the forward surface and, in some implementations, can terminate at a sharp, pointed end on the outermost tip portion 246. The forward surface can also be understood to include a first width, while the concave surface 248 includes a second width, and the first width is greater than the second width. In some implementations, the concave surface 248 tapers in width as it approaches the outermost tip portion 246.
Furthermore, in the deactivated state 110, the defensive component are disposed, maintained, stored, enclosed, contained, and/or secured within the flexible sheath, where the flexible sheath 160 includes a flexible and compressible material that extends between the relatively rigid upper member 130 and the relatively rigid lower member 140. The upper member 130 is substantially more rigid than the flexible sheath 160.
The differing rigidities of the components in a device may be achieved in various ways. In some implementations, the sheath may include a first material and the upper member and/or lower member may include a second material. In one implementation, the first material and second material may be substantially different materials having substantially different rigidities. In particular, the first material may be made of a semi-rigid material, including one or more of, but not limited to, rubber (natural and synthetic), elastic, foam (open and closed cell), sponge, cork, spandex fibers, stretch vinyl, nylon, springs, elastomers, viscoelastic materials, and/or other deformable materials. In addition, the second material may be a substantially rigid material, including, but not limited to plastics, polymers, aluminum, steel, carbon fiber, titanium, wood, nylon, polyurethane, polyvinyl chloride, thermoplastic, stiff rubbers, polyvinyl chloride, and/or other rigid or resilient materials. Furthermore, the second material can include features or materials that facilitate a good grip on the device, such as texturing or high-friction materials. However, it will be understood that any other materials with increasing levels of rigidity could be used. In still other embodiments, it may be possible to modify the rigidity of one or more member (upper member or lower member) by varying the geometry and/or structure of the members.
Referring again to
It can further be seen that each raised portion is spaced apart to facilitate a ready, comfortable grip in a user's hand. Specifically, disposed between each pair of raised portions is a concave portion, recess, or dip that is configured to snugly, comfortably, and/or readily receive a width of a human finger. Referring back to
In different implementations, the device may include provisions that enhance or increase the functionality of the device as a protective weapon. In some implementations, the first upper member 130 can vary from the depiction of
In some implementations, the protruding portions extend distally outward from a base portion 398 of the second upper member 330 in an orientation substantially aligned with the vertical axis 294. In
In different implementations, two or more protruding portions may be of substantially similar shape and/or dimensions. In other implementations, each protruding portion may differ in shape and/or dimensions from other protruding portions. In
Furthermore, the height of each protruding portion can vary from one another, or can be similar. In
Furthermore, in different implementations, the height of a protruding portion will be at least as great as the thickness of a human finger, for example, between 1.5 cm and 2.1 cm. In one implementation, the first protruding portion will extend upward relative to the first groove to a height that is greater than the average thickness of a human finger. Thus, in most cases, the first protruding portion will have a height relative to an adjacent groove of at least 1.5 cm.
The second device 300 can also include provisions for greater steadiness and stability in the grip of the device. By elongation of the raised portions depicted in
It should be understood that the devices with varying protruding portions described herein will include defensive components that are longer than those presented in
In some implementations, by extending or otherwise elongating the size of a raised portion to provide a protruding portion, the devices can be configured to provide users with additional safety mechanisms. For example, in some implementations, one or more protruding portions can be used during an assault to preserve and concentrate a punch's force by directing the force toward a harder and smaller contact area (relative to the size and hardness of clenched fingers). The protruding portions can also result in increased tissue disruption, including an increased likelihood of injuring an attacker's bones on impact. In addition, by extending the perimeter of the finger grip regions (see for example a finger grip region 340 in
Furthermore, in different implementations, one or more protruding portions can also be configured to receive or collect skin and/or DNA. For example, a user may punch an attacker while gripping the second device 300, such that the apex 370 of a protruding portion impacts the attacker. This contact between the apex and an attacker can allow particles of skin or other biological identifiers to collect into the opening formed in the apex 370.
As noted above, in different implementations, the geometry of the protruding portions can vary widely. Referring to
As a first example, in some implementations, a device may include an upper member as depicted in third upper member 430 has a protruding portion 432 that tapers in width as it approaches an apex portion 434. Thus, the outermost region of the protruding portion is substantially rounded, or curved. In some implementations, the apex portion 434 includes a convex surface. Thus, it can be seen that the apex portion 434 does not terminate in a sharp or pointed tip, but rather ends with a substantially round, half-sphere shape. In other words, the apex portion 434 has a semi-circular or semi-elliptical two-dimensional shape that gradually decreases in circumference.
In contrast, the fourth upper member 440 includes a protruding portion 442 with an apex portion 444 that has a generally pyramidal shape. Thus, the apex portion 444 has a generally rectangular or square two-dimensional shape that gradually decreases in area. While the implementation in this case shows the top or outermost peak of the apex portion 444 as being blunt, in other implementations, the apex portion 444 may terminate in a sharper or more pointed tip. Such an apex can allow a user to more narrowly focus the force applied against an attacker.
Referring to the fifth upper member 450, it can be seen that in different implementations, a protruding portion 452 can include a variety of texturing or irregular surface regions. In one implementation, portions of the protruding portion 452 including an apex portion 454 can include undulations, bumps, dimpling, apertures, ridges, grooves, or other texturing. This can enhance the functionality of the protruding portion during defensive moves. Furthermore, as noted previously, each protruding portion can include features that differ from other protruding portions in the same device. In
In
In other implementations, the raised portions described in detail above can also or alternatively be disposed or formed elsewhere along a device. Referring to
For example, the first arm portion 650 can extend distally outward from a base portion 698 of the sixth upper member 630, thereby increasing the overall width of the device. For purposes of reference, the outermost region of an arm portion is identified as an end portion 652. In some implementations, the end portion can correspond to the apex portions described above with respect to
In addition, the width of an arm portion can vary from one device to another. For purposes of reference, the width of an arm portion will be provided relative to a side edge 690 of the sheath. In different implementations, the width of an arm portion (see for example a fourth width 660) can range between 0.5 cm and 3 cm, though in other implementations the width may be greater than 3 cm. In addition, a width of the device without an arm portion (see for example a fifth width 662) can range between approximately 4 cm and 13 cm. Thus, with the inclusion of an arm portion along one side, a width of the device can range between 4.5 cm and 16 cm. If a second arm portion is also included on the opposite side of the device, the width can be greater, as shown in
The third device 600 can also include provisions for greater steadiness and stability in the grip of the device. By elongation of the first side portion 136 or the second side portion 138 depicted in
In different implementations, the geometry of the arm portions can also vary widely. Referring to
As a first example, in some implementations, the seventh upper member 710 has an arm portion 712 that tapers in thickness as it approaches an end portion 714. Thus, the outermost region of the protruding portion is substantially rounded, or curved. In some implementations, the end portion 714 includes a convex surface. Thus, it can be seen that the end portion 714 does not terminate in a sharp or pointed tip, but rather ends with a substantially round, hemispherical shape that is blunt. In other words, the end portion 714 has a circular two-dimensional shape that gradually decreases in circumference, or is ovoidal in shape. In contrast, the eighth upper member 720 includes an arm portion 722 with an end portion 724 that narrows such that the thickness decreases abruptly and then continues toward a rounded end shape. Furthermore, the ninth upper member 730 includes an arm portion 732 with an end portion 734 that has two distinct elongated segments 736. Finally, the tenth upper member 740 includes an arm portion 742 with an end portion 744 that includes a plurality of bumps 746 formed on its outer surface. As noted earlier, in different implementations, such texturing can increase the range of impacts that the weapon can exert on an attacker. It should be understood that each of these examples can also be applicable to the geometry of the protruding portions described above, and similarly, the examples described with respect to the protruding portions may be applicable to the geometry of the arm portions.
In
In this state a user is able to respond naturally and quickly to an aggressor, and any stabbing motion, side thrusts, and/or swiping motion while grasping the device can allow the user to apply substantial force upon an attacker via contact with the arm portion. Even instinctive or untrained, reactive motions by the user can become more effective as the arm portions provide the user with the advantage of preserving and concentrating the force of the first movements into the protruding portions. In addition, the protruding portions extend farther outward than the edges of the user's fist, thereby protecting the user's first from the impact. Finally, a user may also wish to engage the full defensive capacity of the device. In a third state 830, the user has compressed the third device 600 with a force sufficient to extend the defensive components and allow the user to engage in ‘clawing’ action as needed, as described in greater detail in the above-referenced U.S. patent application Ser. No. 14/120,552.
In some implementations, by extending or otherwise elongating a side of the upper member, the devices can be configured to provide users with additional safety mechanisms. For example, in some implementations, an arm portion can be used during an assault to preserve and concentrate a punch's force by directing the force toward a harder and smaller contact area (relative to the size and hardness of the side of a palm or hand). The arm portions can also result in increased tissue disruption, including an increased likelihood of injuring an attacker's bones on impact.
Furthermore, in different implementations, an arm portion can also be configured to receive or collect skin and/or DNA. For example, a user may make a stabbing motion against an attacker while gripping the third device 600, such that the end portion 652 impacts the attacker. This contact between the end portion and an attacker can allow particles of skin or other biological identifiers to collect into an optional opening (not illustrated here) in the end portion 652.
In different implementations, a device may include both protruding portions and arm portions. An example of such a device is presented in
In different implementations, a device may incorporate additional features to broaden the security options for a user. In some implementations, the device may include provisions for transmitting an alert to a specified recipient. For example, when activated, the device can be configured to transmit a signal to a user's family, friends, security services, and/or emergency services. As shown in
Furthermore, in some cases the device can include a Bluetooth module. In some implementations, the device can connect via the Bluetooth module to a nearby smartphone. An application on the smartphone may be preconfigured to receive these signals and transmit an alert accordingly. However, in other implementations, the device can transmit and/or receive signals directly with a network (for example via the communication module 1030), therefore bypassing the need for an additional carrier device, such as user's phone 1090.
Furthermore, the device can include a small, lightweight, long life battery to power the alert system. In some implementations, the battery will be in a sleep mode until the device is activated, and remain on until the alert is disabled, further extending the life of the battery. In addition, in some implementations, the device includes location tracking mechanism configured to provide a location of the device in real time and/or at the time the device was activated. For example, the device may include a GPS tracking unit that uses the Global Positioning System or other satellite-based location systems to determine and track its precise location at intervals. The recorded location data can be stored within the tracking unit, or it may be transmitted to a central location database, or internet-connected computer, using a cellular (GPRS or SMS), radio, or satellite modem embedded in the unit. This permits the device's location to be displayed against a map backdrop either in real time or when analyzing the tracker later, using GPS tracking software. In other implementations, the device can be configured to determine its location in a variety of other ways, including triangulation based on cellular network signals and/or wife signals.
As not all users will want or need such an alert system in their device, or there may be periods of time when such a system is not desired, the device can also include a switch that shifts the alert system from an enabled mode to a disabled mode, and from a disabled mode to an enabled mode. This can also improve battery life. Thus, when the alert system is disabled, activating the device by compression of the sheath will not trigger a transmission of a signal. However, if the alert system is enabled, activation will lead to a generation of a signal. The switch can be incorporated on the device itself, or can be accessible through a cloud service, website, SMS service, and/or mobile device application.
A schematic overview of the system is presented in
Referring to
In different implementations, the method can include additional or optional steps. For example, in some implementations, the device may be configured to transmit a second signal to a remote mobile device, and/or local law enforcement agency. In another implementation, the method involves transmitting a position of the device to a network when contact between a first sensing component and a second sensing component occurs. In some implementations, a user may switch the device from a disabled mode to an enabled mode before compressing the device to trigger the alert.
It should be understood that each of these operations can be associated with a system comprising one or more computers and one or more storage devices. The devices described herein can include computing devices, storage devices, and/or systems as described below. In one implementation, the one or more storage devices store instructions that, when executed by the one or more computers, cause the one or more computers to perform the aforementioned operations.
The computer system 1200 can implement, for example, one or more of, or portions of the modules and other component blocks included in the system illustrated in
The computer system 1200 can also implement, for example, one or more of, or portions of the operations illustrated in
Computer system 1200 can further include a read only memory (ROM) 1208 or other static storage device coupled to bus 1202 for storing static information and instructions for processor 1204. A storage device 1210, such as a flash or other non-volatile memory can be coupled to bus 1202 for storing information and instructions.
Computer system 1200 may be coupled via bus 1202 to a display 1212, such as a liquid crystal display (LCD), for displaying information, for example, associated with the status of the alert or a response from a receiver of the signal. One or more user input devices, such as the example user input device 1214 can be coupled to bus 1202, and can be configured for receiving various user inputs, such as user command selections and communicating these to processor 1204, or to a main memory 1206. The user input device 1214 can include physical structure, or virtual implementation, or both, providing user input modes or options, for controlling, for example, a cursor, visible to a user through display 1212 or through other techniques, and such modes or operations can include, for example virtual mouse, trackball, or cursor direction keys. Instructions may be read into main memory 1206 from another machine-readable medium, such as storage device 1210. In some examples, hard-wired circuitry may be used in place of or in combination with software instructions to implement the operations described herein.
The term “machine-readable medium” as used herein refers to any medium that participates in providing data that causes a machine to operate in a specific fashion. Such a medium may take forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media can include, for example, optical or magnetic disks, such as storage device 1210. Transmission media can include optical paths, or electrical or acoustic signal propagation paths, and can include acoustic or light waves, such as those generated during radio-wave and infra-red data communications, that are capable of carrying instructions detectable by a physical mechanism for input to a machine.
Computer system 1200 can also include a communication interface 1218 coupled to bus 1202, for two-way data communication coupling to a network link 1220 connected to a local network 1222. Network link 1220 can provide data communication through one or more networks to other data devices. For example, network link 1220 may provide a connection through local network 1222 to a host computer 1224 or to data equipment operated by an Internet Service Provider (ISP) 1126 to access through the Internet 1228 a server 1230, for example, to obtain code for an application program.
While various embodiments have been described, the description is intended to be exemplary, rather than limiting, and it is understood that many more embodiments and implementations are possible that are within the scope of the embodiments. Although many possible combinations of features are shown in the accompanying figures and discussed in this detailed description, many other combinations of the disclosed features are possible. Any feature of any embodiment may be used in combination with or substituted for any other feature or element in any other embodiment unless specifically restricted. Therefore, it will be understood that any of the features shown and/or discussed in the present disclosure may be implemented together in any suitable combination. Accordingly, the embodiments are not to be restricted except in light of the attached claims and their equivalents. Also, various modifications and changes may be made within the scope of the attached claims.
While the foregoing has described what are considered to be the best mode and/or other examples, it is understood that various modifications may be made therein and that the subject matter disclosed herein may be implemented in various forms and examples, and that the teachings may be applied in numerous applications, only some of which have been described herein. It is intended by the following claims to claim any and all applications, modifications and variations that fall within the true scope of the present teachings.
Unless otherwise stated, all measurements, values, ratings, positions, magnitudes, sizes, and other specifications that are set forth in this specification, including in the claims that follow, are approximate, not exact. They are intended to have a reasonable range that is consistent with the functions to which they relate and with what is customary in the art to which they pertain.
The scope of protection is limited solely by the claims that now follow. That scope is intended and should be interpreted to be as broad as is consistent with the ordinary meaning of the language that is used in the claims when interpreted in light of this specification and the prosecution history that follows and to encompass all structural and functional equivalents. Notwithstanding, none of the claims are intended to embrace subject matter that fails to satisfy the requirement of Sections 101, 102, or 103 of the Patent Act, nor should they be interpreted in such a way. Any unintended embracement of such subject matter is hereby disclaimed.
Except as stated immediately above, nothing that has been stated or illustrated is intended or should be interpreted to cause a dedication of any component, step, feature, object, benefit, advantage, or equivalent to the public, regardless of whether it is or is not recited in the claims.
It will be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein. Relational terms such as first and second and the like may be used solely to distinguish one entity or action from another without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “a” or “an” does not, without further constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises the element.
The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various examples for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claims require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed example. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
This application is a continuation-in-part of Levine et al., U.S. patent application Ser. No. 14/120,552, entitled “Protective Weapon,” filed on Jun. 4, 2014, and to be issued as U.S. Pat. No. 9,987,758, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
1181681 | Nicaud | May 1916 | A |
2099447 | Matsuyama | Nov 1937 | A |
2741025 | Stewart | Apr 1956 | A |
2845659 | Calvert | Aug 1958 | A |
4096629 | Levine | Jun 1978 | A |
5079801 | Peterson | Jan 1992 | A |
6070326 | Berns | Jun 2000 | A |
6122828 | Asterino, Jr. | Sep 2000 | A |
6394518 | Kelley | May 2002 | B1 |
D500546 | Anderson | Jan 2005 | S |
D510121 | Blair | Sep 2005 | S |
D528893 | Budd | Sep 2006 | S |
20030061714 | Pope | Apr 2003 | A1 |
20100236077 | Shirey | Sep 2010 | A1 |
20120066910 | Shantha | Mar 2012 | A1 |
Number | Date | Country | |
---|---|---|---|
20190134830 A1 | May 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14120552 | Jun 2014 | US |
Child | 15996680 | US |