The present invention relates to a weapon lock, such as, for example, a gun lock for a trigger-operated gun which is designed to be installed on the gun in a position behind the trigger to prevent the trigger from firing the gun.
Mechanical gun locks are designed to be installed on the gun in a position behind the trigger to prevent the trigger from firing the gun. These gun locks use a mechanical key that can be easily duplicated, and the locks themselves can be compromised by means of a master key or a lock pick.
Furthermore, such gun locks can be opened by anyone in possession of one of the keys. With such gun locks it is not possible to restrict the use of the gun to the gun owner or to some other person who is licensed or otherwise authorized to use the gun.
It is a principal object of the present invention to provide a gun safety system for a trigger-operated gun which is difficult to compromise and allows only the gun owner, or some other person who is licensed or otherwise authorized to use the gun.
This object, as well as other objects which will become apparent from the discussion that follows, is achieved, in accordance with the present invention, by providing a battery-powered trigger-locking device which is configured to be disposed on a gun of the type having a trigger for firing. The trigger-locking device includes a data receiver, a data memory and a logic device for determining whether data received by the receiver is the same, or substantially the same, as data stored in the memory. If a data match is indicated, the logic device causes an electromagnetic device to move a trigger-locking member to an unlocked position, permitting the gun to be fired.
According to a preferred embodiment of the invention, the gun safety system according to the invention further comprises an electronic gun key having a data transmitter for transmitting gun unlock data to the data receiver of the trigger-locking device. This gun unlock data may be a password, a long pseudo-random (and therefore hack-resistant) number or biologic data identifying the gun owner or some other person who is licensed or otherwise authorized to use the gun.
More particularly, the gun safety system includes:
(1) a gun lock configured to be installed on a gun, which includes:
(a) an electric gun lock device configured to be disposed on a gun and responsive to at least one electronic lock command signal to select among at least two operative states, including a locked state which prevents firing the gun and an unlocked state which enables firing;
(b) a data receiver for receiving a gun control signal containing first gun security data;
(c) a first data memory for storing second gun security data representing biologic personal information of at least one authorized person, permitted to select said operative state; and
(d) a first logic device, coupled to the data receiver and to the data memory, for
generating the first gun security data from the received gun control signal;
(1) (ii) comparing the first gun security data with the second gun security data stored in the first data memory, and
(2) (iii) producing an electronic lock command signal to select one of the operative states of the gun lock device, provided that the first gun security data and the second gun security data are substantially the same, in response to receipt of said gun control signal; and
(2) a gun key device for controlling the gun lock device, which comprises:
(a) a data transmitter for transmitting the gun control signal to the data receiver;
(b) a second data memory for storing biologic personal information of a putative authorized person who wishes to control the gun, the biologic personal information identifying the putative authorized person; and
(c) a second logic device, coupled to each of the data transmitter and the second data memory, for generating the gun control signal representing the first gun security data from the biologic personal information, for transmission to said data receiver.
The first logic device is operative to cause the gun lock device to select one of said operative states when the first gun security data are substantially the same as the second gun security data stored in the first data memory. The putative authorized person is therefore recognized as an authorized person only in the event that the first gun security data transmitted by the gun key device substantially matches the second gun security data stored in the first data memory, thereby preventing unauthorized use of the gun.
The first logic device, upon producing the electric signal, may cause the electromagnetic apparatus to move the movable member to the second position for a first duration of time, and thereafter to move the movable member back to the first position. The first duration of time is preferably selected from the group consisting of:
less than 1 minute;
(ii) a range of time from 1 minute to 5 minutes;
(iii) a range of time from more than 5 minutes to 30 minutes; and
(iv) more than 30 minutes.
In an alternative embodiment of the invention, the movable member, after being moved to the second/unlocked position remains in that position until a gun lock signal is received by the data receiver.
A gun key device has a data transmitter for transmitting gun unlock data to the data receiver in the trigger-locking device. As mentioned above, the gun unlock data may include a password, a pseudo-random number or data identifying a putative authorized person who wishes to use the gun. The pseudo-random number is preferably generated by the gun key device when the gun is first used.
According to a preferred embodiment of the invention, the gun key device further comprises:
(a) an input device, for inputting information from a putative authorized person who wishes to unlock the gun; and
(b) a second logic device, coupled to both the data transmitter and the input device, for generating gun unlock data defined by the putative authorized person and for causing the data transmitter to transmit the gun unlock data to the data receiver. The putative authorized person is recognized as an authorized person if the gun unlock data substantially matches the stored data in the trigger lock data memory.
When a biologic identifier is used to unlock the gun lock, the data stored in the memory of the trigger lock may include at least one biologic identifier of the owner or an authorized person.
The input device of the gun key may be a camera, for example. In this case, the camera is operative to record an image of the putative authorized person as a biologic identifier, which image may be:
a facial image;
an image of an iris;
a retinal image;
a fingerprint;
a palm print; and
an image of veins of a hand. The second logic device is then operative to process the image and to generate the gun unlock data therefrom.
Alternatively, the input device may be a microphone. The second logic device is then operative to process a voiceprint of the putative authorized person as a biologic identifier and to generate the gun unlock data therefrom.
Finally, the input device may be an alphanumeric keyboard, whereby:
the putative authorized person may input an alphanumeric code; and
(ii) the putative authorized person is recognized as an authorized person in the event the inputted code matches the stored data.
The trigger-locking device preferably comprises a first battery for providing power to at least one of the logic device, the data receiver and the data memory and a second battery for providing power to the electromechanical apparatus which is power thirsty compared to the electronic devices.
Preferably, an electric device is provided for selectively utilizing the still-functional battery when one of the two batteries is depleted.
Preferably also, the electromechanical apparatus is operative to move the movable member to the first position in the event of battery depletion.
Advantageously, the data memory comprises at least one write-once-only element to prevent degradation of the data stored in the memory and to prevent the data stored in the memory from being changed. The write-once-only element may be a PROM, an EPROM or an EEPROM, for example.
According to a preferred embodiment of the invention, the gun lock apparatus comprises at least one tamper detecting device, situated in proximity to the trigger-locking device, for detecting external manipulation of at least one of (1) the logic device, the (2) electromechanical apparatus, and (3) the moveable member. This tamper detecting device preferably generates a tamper signal upon the detection of the external manipulation, which tamper signal causes the electromechanical apparatus to maintain the movable member in the first position for a second duration of time. The tamper detecting device may be a separate element or it may be implemented by the first logic device.
Advantageously, the trigger-locking device comprises a transmitting device, coupled to the tamper detecting device, for transmitting an alarm upon generation of the tamper signal.
According to still another preferred embodiment of the present invention, the data memory may be operative to store identifying information of a registration person authorized to input data to the data memory which identifies the authorized person. In this case, the first logic device is made operative to store data concerning a person authorized to use the gun, in the data memory only if the authorized person identification information is accompanied by identification of a putative registration person that substantially matches the stored registration person identification information. Also, the first logic device is made operative to change the data stored in the data memory only if the identification information is accompanied by identification of a putative registration person that substantially matches the stored registration person identification information.
Finally, according to still another preferred embodiment of the present invention, the electromechanical apparatus includes an electric motor coupled to a gear reduction mechanism for rotating a cam. The movable member of the trigger-locking device is moved by the can between the locked first position and the unlocked second position.
Alternatively, the electric motor may be a servo-motor which is coupled mechanically to the movable member to move this member back and forth between the two positions.
In yet another alternative embodiment of the invention, an electromagnetically controlled two position switching device may be used to control the position of movable member.
For a full understanding of the present invention, reference should now be made to the following detailed description of the preferred embodiments of the invention as illustrated in the accompanying drawings.
The preferred embodiments of the present invention will now be described with reference to
Briefly in overview, a battery-operated trigger-locking device is permanently attached to/installed in a gun in a recess behind the trigger in the lower receiver mechanism. In its default condition, a movable member is in a blocking position, preventing movement of the trigger. When unlocked, the movable member is drawn rearward, or otherwise removed from its blocking position, to allow movement of the trigger.
The trigger-locking device has a Bluetooth (or other type) receiver and a storage device for storing personal information identifying an authorized user of the gun. When this particular information is received from a smartphone or similar device, the trigger-locking device removes the movable member from the blocking position, releasing the trigger.
The smartphone can be made secure in any number of ways. It can be password protected or, preferably, it can make use of its camera to verify the ID of the person holding this device. For example, the security App may use face recognition or iris recognition software to identify the owner from the camera image. The smartphone can also incorporate a fingerprint sensor, a voiceprint sensor, or other means to identify its user and ensure that the smartphone user is authorized to utilize the smartphone functions.
When the trigger lock 12 is first used, the Gunlock App can generate a pseudo-random number, a password, or a biologic (biometric) signature identifying a person authorized to use the gun and send it to the trigger-locking device for storage in its permanent memory. Once stored, this number, password or biologic identification can be changed only by the authorized person, such as the gun owner, or by a “registration person” who is duly licensed to perform this function, e.g. by a local or national government. Thereafter, whenever the smartphone sends this number, password or biologic identification again, the trigger-locking device performs a comparison and releases the trigger lock if and only if a match is found so the gun may be fired. Before sending the unlock number, password or biologic identification information, the user of the smartphone may be required to identify himself/herself by entering into the phone the same or another number, a password, a biologic identifier or some other identifying information, such as the answer to a personal question. Alternatively, the user may use the smartphone to capture his or her own biologic identifying information such as one or more of the following:
a facial image;
an image of an iris;
a retinal image;
a fingerprint;
a palm print; and
an image of veins of a hand.
Either the biologic identifying information pre-stored in the smartphone, or the newly captured biologic identifying information, or both, may be sent to the trigger-locking device for matching with corresponding biologic identifying data stored therein. In this case, the biologic identifying data, rather than an unlock number must be originally sent and stored in the data memory.
Firing the gun is therefore a two-step process for the gun owner or authorized user:
(1) Verify his/her identity with the smartphone; and
(2) Press the Gun Unlock button to enable the trigger lock to release the trigger.
The trigger remains unlocked until the gun user presses another button on the Gunlock app, appropriately called “Gun Lock,” or until the trigger lock times out and automatically locks itself by restoring the movable member to the locked position.
The trigger-locking device 12 is preferably powered by a replaceable and/or rechargeable battery (not shown).
If biologic ID data has been sent to the receiver by the smartphone 10, the data may not be an exact match; however, the received signature data may be sufficiently close to the stored signature data to satisfy the requirement that the person holding the smartphone is indeed the owner of the gun.
The electromechanical device is preferably a micro-motor 22 that turns a shaft 23 through a speed reduction gear mechanism. In this way, a very small motor may generate sufficient torque to move the movable member 14 between a locked position, adjacent the gun trigger, and an unlocked position which permits the trigger to fire the gun. The relatively large forces that may be applied against the movable member by the trigger when in the locked position are taken up by a rotatable cam 24, that presses against the movable member against the force of a spring 28. The spring 28, which is connected to a stationary member attached to the gun, biases the movable member 14 toward the unlocked position. The cam 24 abuts a cam surface on the underside of the movable member 14 and, as it rotates, it moves the movable member toward the locked position adjacent the trigger.
Alternatively, a servo-motor can be substituted for the motor and cam mechanism to move the movable member 14.
The movable member 14 surrounds the trigger guard 30 of the gun in such a way as to prevent tampering. Preferably a tamper detecting device is provided which signals the logic device 20 when it detects tampering so that this device can (1) signal the motor 22 to move the movable member 14 into the locked position, and (2) sound or transmit a warning signal.
There are a number of ways that a gun, or any other type of weapon, can be prevented from firing or otherwise rendered inoperative. In addition to the trigger locks described above, or in place thereof, the muzzle of a gun can be closed off by insertion of a blocking member to prevent passage of a munition projectile. Alternatively, or in addition, the weapon can be rendered inoperable by ignition of a pyrotechnic device that melts or otherwise destroys a critical part of the weapon's firing mechanism or its munition loading mechanism.
Upon receipt and validation of control signal with an “unblock” command, the blocking member can be manually reset to its original, unblocked position so that the gun is again ready for use.
The pyrotechnic device 70 is operative to permanently disable the gun 2. When it receives a validated command from the electronic system 16-20, it ignites and either explodes or generates sufficient heat to soften or melt critical parts of the gun mechanism to render them inoperative.
In another embodiment of the invention involving breech loading gun configurations, one or more locking devices may be utilized to prevent (or allow) the insertion of a munition into the barrel of the gun. Exemplary representative diagrams of such locking arrangements are shown in
In still another embodiment,
In each of
In general, depending upon the type of weapon, be it a handgun, rifle, automatic rifle or artillery weapon such as a mortar, cannon or the like, or even an grenade or bomb, and be it incendiary or a non-incendiary device that delivers a lethal or non-lethal charge, other mechanisms and configurations for rendering a weapon inoperative will occur to those skilled in the art.
Even though a weapon, such as a gun, may be provided with a remote controllable lock, a muzzle block and/or even a pyrotechnic device that can self-destroy, such safety measures would be useless if they are compromised. It is therefore recommended that the weapon also be provided with tamper resistant features such as means for detecting any attempt to block their operation. In so doing, if an unauthorized third party were to attempt to render the safety devices inoperable, the devices would enter their default “fail safe” mode, which is to lock, to block and/or to destroy the weapon.
The tamper resistant features preferably include:
(1) Frangible conductors hidden within the weapon which break a circuit and alert the logic device of an attempt to disassemble or otherwise compromise critical parts of the weapon, such as the safety devices themselves;
(2) Repeated wireless “pinging” of the weapon, the absence of which is detected to determine whether the wireless receiver of the weapon has been placed in a Faraday cage or otherwise compromised to prevent receipt of a disable signal; and
(3) Detection of loss of the primary batter power to the safety devices, through the use of emergency back-up power.
Other tamper detection and tamper resistant features will occur to those skilled in the art.
The interrogation signal sent by the gun key could be a generic one, simply requesting confirmation of the proximity of the gun lock to the gun key. Or it could involve alphanumeric code, or a product code 114A stored in gun key memory 114. The reply signal would be sent by the gun lock only if there is a matching alphanumeric or product code 104A stored in the first memory 104 of the gun lock. The product code stored in 104A and 114A could pertain to either the gun lock, or the gun key or both.
Other items stored in the first memory 104 include biologic identification information of one or more allowed users of the gun 104B, alphanumeric identification 104C of such users, and operating system information, 104D. Similarly, other items stored in the second memory 114 include biologic identification information of one or more allowed users of the gun 114B, alphanumeric identification 114C of such users, and operating system information, 114D.
In addition, embodiments of the invention in which the gun key device does not send the gun control signal (even if the interrogation and reply steps were properly executed) unless a properly device-identified product number (stored in 104A) is contained in the reply signal (with proper identification based on matching data stored in 114A). Such a product ID could be either a gun lock ID number, a gun key ID number, or both.
The interrogation signal sent by the gun lock could be a generic one, simply requesting confirmation of the proximity of the gun key to the gun lock. Or it could involve alphanumeric code, or a product code 204A stored in gun lock memory 204. The gun control signal would be sent by the gun lock only if there is a matching alphanumeric or product code 214A stored in the second memory 214 of the gun key. The product code stored in 204A and 214A could pertain to either the gun lock, or the gun key or both.
Other items stored in the first memory 204 include biologic identification information of one or more allowed users of the gun 204B, alphanumeric identification 204C of such users, and operating system information, 204D. Similarly, other items stored in the second memory 214 include biologic identification information of one or more allowed users of the gun 214B, alphanumeric identification 214C of such users, and operating system information, 214D.
In
There has thus been shown and described a secure, smartphone-operated weapon lock which fulfills all the objects and advantages sought therefor. Many changes, modifications, variations and other uses and applications of the subject invention will, however, become apparent to those skilled in the art after considering this specification and the accompanying drawings which disclose the preferred embodiments thereof. All such changes, modifications, variations and other uses and applications which do not depart from the spirit and scope of the invention are deemed to be covered by the invention, which is to be limited only by the claims which follow.
This application claims priority from the U.S. Provisional Application No. 61/761,270 filed Feb. 6, 2013, and entitled “SECURE SMARTPHONE-OPERATED GUN TRIGGER LOCK;” the U.S. patent application Ser. No. 13/763,951 filed Feb. 11, 2013, entitled “SECURE SMARTPHONE-OPERATED GUN TRIGGER LOCK” (now U.S. Pat. No. 8,893,420); U.S. patent application Ser. No. 14/511,222 filed Oct. 10, 2014, entitled “SECURE SMARTPHONE-OPERATED LOCKING DEVICE” (now U.S. Pat. No. 9,222,740); and U.S. patent application Ser. No. 14/542,889 filed Nov. 17, 2014, entitled “REMOTE CONTROL WEAPON LOCK” (now U.S. Pat. No. 9,377,259). This application is a continuation-in-part of said application Ser. No. 14/542,889 which, in turn, was a continuation-in-part of said application Ser. No. 14/511,222 which, in turn, was a divisional of said application Ser. No. 13/763,951.
Number | Name | Date | Kind |
---|---|---|---|
4354189 | Lemelson | Oct 1982 | A |
4487545 | Shaw, Jr. | Aug 1984 | A |
4682435 | Heltzel | Jul 1987 | A |
4970819 | Mayhak | Nov 1990 | A |
5062232 | Eppler | Nov 1991 | A |
5448847 | Teetzel | Sep 1995 | A |
5459957 | Winer | Oct 1995 | A |
5461812 | Bennett | Oct 1995 | A |
5502915 | Mendelsohn et al. | Apr 1996 | A |
5570528 | Teetzel | Nov 1996 | A |
5603180 | Houze | Feb 1997 | A |
5636464 | Ciluffo | Jun 1997 | A |
5713149 | Cady et al. | Feb 1998 | A |
5828301 | Sanchez | Oct 1998 | A |
5896691 | Kaminski et al. | Apr 1999 | A |
5937557 | Bowker et al. | Aug 1999 | A |
6293039 | Fuchs | Sep 2001 | B1 |
6314671 | Gering | Nov 2001 | B1 |
6415542 | Bates et al. | Jul 2002 | B1 |
6421943 | Caulfield et al. | Jul 2002 | B1 |
6499243 | Herzog | Dec 2002 | B1 |
6711843 | Klebes | Mar 2004 | B2 |
6711844 | Rumfelt | Mar 2004 | B2 |
6763126 | Recce | Jul 2004 | B2 |
6785995 | Herzog et al. | Sep 2004 | B2 |
6823621 | Gotfried | Nov 2004 | B2 |
6861944 | Hoepelman | Mar 2005 | B1 |
6923621 | Sato | Aug 2005 | B2 |
7030729 | Albanesi et al. | Apr 2006 | B2 |
7339456 | Buckley et al. | Mar 2008 | B1 |
7353632 | Newkirk et al. | Apr 2008 | B2 |
7356959 | Schmitter et al. | Apr 2008 | B2 |
8205372 | Anzeloni | Jun 2012 | B2 |
8205375 | Anzeloni | Jun 2012 | B1 |
20010032405 | Kaminski | Oct 2001 | A1 |
20010042332 | Gering et al. | Nov 2001 | A1 |
20020157296 | Vivian et al. | Oct 2002 | A1 |
20020174587 | Rumfelt | Nov 2002 | A1 |
20040244253 | Glock | Dec 2004 | A1 |
20070074438 | Parhofer et al. | Apr 2007 | A1 |
20070241010 | Giebel et al. | Oct 2007 | A1 |
20080039962 | McRae | Feb 2008 | A1 |
20080134556 | Remelin | Jun 2008 | A1 |
20080244699 | Parhofer et al. | Oct 2008 | A1 |
20090223104 | Anzeloni | Sep 2009 | A1 |
20110056108 | McCord | Mar 2011 | A1 |
20110061280 | Emde et al. | Mar 2011 | A1 |
20110173869 | Uhm | Jul 2011 | A1 |
20120151814 | Dietel | Jun 2012 | A1 |
20120180357 | Dietel et al. | Jul 2012 | A1 |
20130125441 | Westwood et al. | May 2013 | A1 |
20130312306 | Ruffin | Nov 2013 | A1 |
20140215885 | Sullivan et al. | Aug 2014 | A1 |
20140230301 | Chance et al. | Aug 2014 | A1 |
20140366421 | Arif | Dec 2014 | A1 |
Number | Date | Country |
---|---|---|
2008151402 | Dec 2008 | WO |
WO 2014163653 | Oct 2014 | WO |
Number | Date | Country | |
---|---|---|---|
20160273859 A1 | Sep 2016 | US |
Number | Date | Country | |
---|---|---|---|
61761270 | Feb 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13763951 | Feb 2013 | US |
Child | 14511222 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14542889 | Nov 2014 | US |
Child | 15166745 | US | |
Parent | 14511222 | Oct 2014 | US |
Child | 14542889 | US |