1. Field of Invention
This invention relates generally to systems, apparatus and methods for reducing gun violence. More specifically, at least one embodiment, relates to systems, apparatus and methods to lock the trigger of firearms located within pre-defined geographic zones.
2. Discussion of Related Art
Today's epidemic of gun violence in the U.S. is highlighted by the number of shootings that have occurred at schools around the country. Mass shootings are also occurring with increasing frequency in public venues. Smart guns are often held out as a solution to the problem, for example, guns that include biometric sensors or require the user to wear some form of electronic device to authenticate the user as the owner of the gun. However, these solutions are ineffective because a legal gun owner can still purchase such a firearm and use it to harm others without restriction. Further, proposals for smart gun technology do not get any traction among gun owners or gun manufacturers.
Other approaches generally refer to the use of GPS to restrict gun use. However, such approaches have not considered the hardware design of such technology nor the demands placed on electronic hardware included in a firearm. For example, these approaches require operation of an electronic system included in a gun but fail to address battery life where a battery is the source of power required for operation of the trigger lock. These approaches also fail to address circumstances in which a GPS signal is unavailable.
Further, the operation of such systems when included in police firearms is not fully addressed. For example, prior approaches do not provide for any system by which firearms can be selectively made active in an otherwise locked-down area.
One GPS based approach employs technology to restrict the use of a firearm to a small geographic area, for example, the gun owner's home. However, these approaches create such a limited zone of use they do not offer a solution that is acceptable to the vast majority of gun owners.
Therefore, there is a need for approaches to establish geographic areas (or zones) in which unauthorized firearms cannot be used. Systems, apparatus and methods described herein provide approaches for the preceding while maintaining firearms in an operational state when located outside these zones. Some embodiments described herein provide battery recharging that occurs automatically when the firearm is used, for example, at a target range. Further embodiments provide an approach in which firearms can be logged for use in a restricted firearms zone, for example, firearms used by police officers or other authorized security personnel.
According to one aspect, a firearm includes an electronic trigger lock system with an integral power source. In various embodiments, the system automatically generates power to charge the power source during a conventional operation of the firearm. According to one embodiment, the power generation occurs when the slide of a semi-automatic pistol cycles. In a further embodiment, the power generation occurs when either the user manually cycles the slide or the slide operates when the firearm is fired. Various embodiments provide a tamper-proof design of the electronic trigger lock system.
According to another aspect, a combination of GPS and RF are employed to establish a pre-defined zone of restricted firearms use. In some embodiments, GPS is employed as a primary technology used to establish such a zone. However, applicants find that system reliability is improved when an RF transmitter is located in the zone. The RF transmitter communicates a signal that is also received by the electronic trigger lock system in any firearm within a known radius of the transmitter. Should the GPS system be rendered inoperative for any reason (including an attack on GPS service) the RF transmitter provides an independent means of keeping the zone free of unauthorized firearms use.
According to one aspect, a locking mechanism is configured to render a firearm inoperable where the firearm includes a firearm operating mechanism that couples a trigger to a firing pin included in the firearm. In some embodiments, the locking mechanism includes a compliant mechanism coupled to the firearm operating mechanism, the compliant mechanism operable in at least a first state and a second state. In further embodiments, with the compliant mechanism in the first state the compliant mechanism is positioned to operate as a part of the firearm operating mechanism such that the firearm will fire in response to a trigger pull. With the compliant mechanism in a second state, the firearm operating mechanism is modified such that the trigger pull is incapable of firing the firearm. According to one embodiment, the compliant mechanism is included in a trigger bar of the firearm operating mechanism. According to another embodiment, the locking mechanism includes an electronic system coupled to the compliant mechanism and configured to respond to a wireless signal, wherein the electronic system operates to place the compliant mechanism in the second state in response to the wireless signal indicting that the firearm should be rendered inoperable. According to still another embodiment, the electronic system includes at least one of an inertial navigation system and a GPS system, and the wireless signal is received as a result of geographic location of the firearm.
According to another aspect, an apparatus configured for inclusion in a firearm includes a mechanical firearms lock; an electronic system including a power source, the electronic system coupled to the mechanical firearms lock, the electronic system operable to render the firearm inoperable based on a location of the firearm; and a power generation element configured to generate electrical power as a result of operation of the firearm, the electrical power employed by the electronic system.
According to a further aspect, an electronic locking system is operable to prevent a firearm from firing. The firearm includes an operating mechanism. The electronic locking system includes a power source configured to store electrical energy used to operate the electronic locking system; and a power generation element configured to generate electrical energy as a result of an operation of the operating mechanism, wherein at least a portion of the electrical energy generated by the power generation element is received by the power source.
According to still another aspect, a method of controlling an operation of a firearm using a location-aware, self-powered electronic locking device is provided. The method includes acts of including: an electronic locking system in the firearm, the electronic locking system operable in each of a first state in which the firearm is operational to fire in a conventional manner and a second state in which the firearm is prevented from firing; employing the electronic locking system to switch between the first state and the second state based on a change in a geographic location of the firearm; and including a power generation element in the electronic locking system, the power generation element configured to generate electrical energy in response to an operation of the firearm, the electrical energy employed by the electronic locking system.
The accompanying drawings are not intended to be drawn to scale. In the drawings, each identical or nearly identical component that is illustrated in various figures is represented by a like numeral. For purposes of clarity, not every component may be labeled in every drawing. In the drawings:
This invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Also, the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. The use of “including,” “comprising,” or “having,” “containing,” “involving,” and variations thereof herein, is meant to encompass the items listed thereafter and equivalents thereof as well as additional items.
The handgun 100 illustrated in
Referring now to
The trigger lock 110 can be provided in any one of a plurality of configurations depending on the embodiment. For example, the trigger lock 110 employs a solenoid-operated linear actuator in accordance with one embodiment. In this embodiment, a plunger included in the solenoid is moved between a first position (or “state”) in which the trigger 102 operates freely to a second position (or state) in which movement of the trigger 102 is blocked. A voltage is applied to energize a coil included in the solenoid and operate the plunger. A proximate end of the plunger is located within the body of the solenoid during operation while the distal end is exposed such that it engages the firing mechanism (for example, the trigger 102) of the handgun 100. According to one embodiment, the default position of the trigger lock 110 is a “live” position in which the handgun is operational in a conventional fashion. According to this embodiment, the solenoid is energized to lock-out the handgun and prevent use. According to another embodiment, the two “states” are reversed such that the default position of the trigger lock 110 is the locked position in which the handgun 100 cannot fire a shot. According to this alternate embodiment, the solenoid is energized to unlock the handgun 100 for use. In some embodiments, a limited amount of current is required to maintain the solenoid in an energized state. However, the holding current is substantially less than the inrush current required to operate the device to move the trigger lock from the default position to the second position.
According to other embodiments, a latching solenoid is employed such that the solenoid included in the trigger lock 110 is held in the locked state using a mechanical force rather than an electrical current. These embodiments avoid the need to apply a holding current to maintain the firearm in any one state. Instead, energy is only applied momentarily to unlatch the trigger lock 110 and operate the solenoid to change state between the locked state and the unlocked state.
In an alternate embodiment, the trigger lock 110 employs a rotary actuator. According to this embodiment, the rotary actuator operates in a fashion similar to a servo-motor to switch between the first state and the second state. Mechanical hardware coupled to the rotor is employed to interact with the trigger 102 and/or other element of the firing mechanism to block operation of the handgun when in the second state. According to another embodiment, a microelectromechanical system (“MEMS”) actuator is employed.
The mechanical connection between the trigger lock 110 and the trigger 102 can vary depending on the embodiment. For example, where a linear actuator is used, the distal end of the plunger can move into contact with the trigger 102 internal to the handgun 100 to lock the handgun. According to one embodiment, the plunger creates an obstruction that prevents any movement of the trigger 102.
The power source 112 can include one or more batteries, for example, lithium or alkaline batteries. Further, the power source 112 includes a rechargeable power source in various embodiments.
Depending on the embodiment, the term “processor” as used herein can refer to either a microcontroller in a conventional sense or more generally a processing device that includes I/O or other components to provide specialized functionality such as wireless communication, other RF signal processing and/or location based services as some examples. Accordingly, the processor and other aspects can be implemented with specially-programmed, special purpose hardware, for example, an application-specific integrated circuit (ASIC). Further, aspects of the invention can be implemented in software, hardware or firmware or any combination thereof. Such methods, acts, apparatus, systems, system elements and components thereof may be implemented as part of the processor described herein or as an independent component or components included in the electronic trigger lock system 104. According to some embodiments, the processor 114 includes a microcontroller.
Thus, the processor 114 can be a standalone element or, for example, be included in another component included in the electronic trigger lock system 104. In various embodiments, the processor 114 includes an internal memory configured to store software instructions for execution to implement various features and functionality described herein.
As mentioned above, the electronic trigger lock system 104 includes memory. In one embodiment, the memory is included in the processor 114. In other embodiments, the memory includes memory internal to the processor 114 and memory external to the processor 114 such as RAM, ROM, FLASH or EEPROM as some examples.
In some embodiments, the processor 114 includes a communication system. According to one embodiment, the communication system provides for local wireless communication via BLUETOOTH communication and/or long-distance communication, for example, via cellular and/or satellite communication networks. According to a further embodiment, the communication system includes an RF receiver configured to receive an RF signal transmitted by an RF transmitter to activate the trigger lock 110 of guns within receiving distance of the RF transmitter. According to still another embodiment, the processor 114 includes a GPS receiver configured to receive GPS signals employed by the electronic trigger lock system 104 to identify the location (i.e., GPS coordinates) of the handgun 100. According to a still further embodiment, the processor 114 includes each of the RF receiver and the GPS receiver. According to one embodiment, the processor 114 includes a communication system employed to wirelessly communicate the location (for example, GPS coordinates) of the handgun 100 to remote resources.
While the preceding paragraph describes the inclusion of either or both of the RF receiver and the GPS receiver in the processor 114, either or both of these elements can be provided as separate components, respectively, of the electronic trigger lock system 104. For example, each of the RF receiver and the GPS receiver can be standalone components, respectively, that are in communication with the processor 114.
According to one embodiment, the communication system provides BLUETOOTH communication suitable for transmission of information between the electronic trigger lock system 104 and a portable electronic device (for example, a mobile phone, tablet, etc.) located proximate to the handgun 100. According to this embodiment, a user can employ the electronic trigger lock system 104 in combination with a mobile phone to store user settings and data. According to one embodiment, communication between the electronic trigger lock system 104 and a user's portable electronic device is employed to update the software included in the electronic trigger lock system 104, for example, firmware for the processor 114.
According to some embodiments, the at least one motor 118 includes a plurality of small form factor AC motors. In alternate embodiments, the at least one motor 118 includes a plurality of small form factor DC motors. According to one embodiment, the at least one motor 118 is located to engage the slide 103 of the handgun 100 as is described in greater detail with reference to
In various embodiments, the voltage regulator 116 is employed to provide a fixed output voltage employed by the electronic trigger lock system 104. In one embodiment, the voltages are AC voltages. In another embodiment, the voltages are DC voltages. According to the illustrated embodiment, an input of the voltage regulator 116 is connected to the at least one motor 118. In this configuration, the power supplied by the at least one motor 118 is received by the voltage regulator 116 and converted to a constant output voltage despite any variability of the power supplied by the at least one motor 118.
According to one embodiment, the voltage converter 120 includes a transformer to adjust the voltage from a first voltage level to a second voltage level. For example, the transformer can step the AC voltage produced by the at least one motor 118 up or down depending on the embodiment. According to another embodiment, the voltage converter 120 included in the electronic trigger lock system 104 includes a DC to DC converter employed to convert power provided by the voltage regulator 116 at a first DC voltage to a second DC voltage that is employed by other elements included in the electronic trigger lock system 104. In various embodiments, an output of the voltage converter 120 can be coupled to a power bus included in the electronic trigger lock system 104.
In various embodiments, the components included in the electronic trigger lock system 104 are connected to the power bus for a source of operating voltage and current. Further, an internal communication bus may be employed to allow the various devices and/or circuitry included in the electronic trigger lock system 104 to communicate with one another. The communication bus can be used for the communication of instructions/commands and data between the illustrated components and between the illustrated components and other components included in the system 104 depending on the embodiment. For example, a signal controlling an operation of the trigger lock 110 can be communicated from the processor 114 to the trigger lock 110 via the communication bus.
According to further embodiments, the electronic trigger lock system 104 includes RFID. In some embodiments, the RFID system is employed to communicate the unique identification of the handgun 100.
According to some embodiments, the electronic trigger lock system 104 includes a user interface. For example, the user interface can communicate information concerning the operating status of the electronic trigger lock system 104 to the gun owner. For example, the user interface can provide a charge indication to allow the user to know the charge-status of a battery power source included in the electronic trigger lock system 104. Further, the user interface can allow the user a limited ability to control some operations of the electronic trigger lock system 104 provided that they do not allow the user to override the trigger locking functionality of the system 104. For example, the user interface can include an input that the user employs to activate wireless communication. Depending on the embodiment, the user interface can include one or a combination of switches, knobs, dials, buttons, sliders or other user adjustable inputs.
According to some embodiments, a user interface is provided for display in the user's portable electronic device such as a phone or tablet. For example, in one embodiment, the user has the ability to remotely lock the firearm with the electronic trigger lock system 104 via an application that includes a user interface displayed on their smartphone or tablet.
According to one embodiment, the electronic trigger lock system 104 includes an electrical connection (for example, a port) that is used to connect the electronic trigger lock system 104 to a source of electrical power for recharging the power source 112.
According to various embodiments, the electronic trigger lock system 104 is an element in a larger system with cloud-based resources that are hosted remote from the handgun 100. These remote resources can include servers, databases, communication systems and location based services among some examples. The remote resources can receive inputs to establish areas of restricted firearms use. For example, public safety officials in a city or town can establish a user account using these resources. As one example, these officials identify school zones in their community and provide the GPS coordinate(s) to establish a “safe” zone in the vicinity of each school where firearms use is restricted to public safety officers.
According to these embodiments, the location based services can include resources employed to receive and process GPS location information from the handgun 100. The remote resources process the information to determine whether the handgun 100 is located in an area of restricted firearms use. If the handgun 100 is located at such a location, the remote resources can communicate a signal to the electronic trigger lock system 104 to activate the trigger lock and render the handgun 100 inoperable. The location based services can also include signals communicated to the electronic trigger lock system 104 to render the handgun 100 operable when it exits the restricted location.
In various embodiments, a conventional operation of the firearm automatically generates electricity employed to operate the electronic trigger lock system. For example, where the default state maintains the firearm in the locked state, a discharged power source renders the firearm inoperative. However, the ability to manually charge the power source by cycling the firearm's operating mechanism provides the user with an ability to recharge the power source without firing a shot. Once recharged, the electronic trigger lock system operates to permit use provided that the user is not in a restricted area, for example, a geo-fenced area. Operation of the slide mechanism of a semi-automatic pistol provides one approach that can be employed for power generation. However, other types of firearms and operating mechanisms can include similar power generation capabilities. For example, operation of a pump shotgun, a revolver or a lever action gun can also be employed to charge the power source included in the electronic trigger lock system. Where the system is included in a revolver, a motor can be integrated into the revolver such that the spinning (or rotary motion) of the cylinder generates electricity. According to one embodiment, the motor is included as an integral part of the cylinder. In an alternate embodiment, the motor is included in the grip of the revolver.
Referring now to
According to the illustrated embodiment, each motor included in the at least one motor 118, respectively, is an AC motor that includes a stator 122 and a rotor 124. According to another embodiment, the at least one motor 118, respectively, is a DC motor that includes the stator 122 and the rotor 124. In general, the slide 103 includes a mechanical connection to each rotor 124.
According to one embodiment, the slide 103 and the at least one motor 118 are connected via a friction-based sliding engagement between the slide 103 and the rotor 124. In one embodiment, the rotor 124 includes a component located at a distal end of the rotor 124 for engagement with the slide 103. In other embodiments, the slide 103 makes a direct connection with the rotor 124 itself without any additional component(s). For example, the slide 103 can include an engagement surface 126 located such that the engagement surface contacts an upper portion of each rotor 124. With the friction-based contact between the engagement surface 126 and each rotor 124 the linear travel of the slide is transferred to rotary motion of the rotor. As each rotor spins the armature included in the motor rotates to generate electrical power at the output of the motor.
Other approaches can be employed to connect each rotor 124 to the slide 103. For example, a gear can be installed at or near the distal end of the rotor. According to this embodiment, the engagement surface 126 can include a series of teeth sized and located to engage the gear(s) included in the at least one motor 118. Here too, the linear travel of the slide 103 is transferred to rotary motion of the rotor. According to another embodiment, the slide 103 includes a horizontal slot that receives a distal end of each rotor within it. The interior of the slot can provide a sliding friction-based engagement with the rotors 124. Alternatively, the interior of the slot can include a series of teeth that mesh with the toothed gears located on the rotors 124.
Referring now to
According to one embodiment, the zone of restricted firearms use 130 is a geo-fenced region with boundaries that are defined by GPS coordinates. This approach allows a very specific area to be pre-defined. For example, the zone of restricted firearms use 130 can be a region (or a portion of a region) surrounding a public venue that is based on topography to eliminate shooting vantage points. In another example, the zone of restricted firearms use 130 is based on the path of a set of streets surrounding a school, i.e., a school zone. Alternatively, GPS can be employed to create a geo-fenced region defined as the zone within a predefined radius of a school. According to this embodiment, the central coordinates of the school property or a school building can be used as the center of a geo-fenced region that has a roughly circular shape. Both topography and building structures can interfere with the receipt of GPS signals and the overall shape of the zone of restricted firearms use 130 in this embodiment.
According to the preceding embodiments, the GPS coordinates of the firearm 134 are determined by the electronic trigger lock system 104 included in the firearm. The location information is communicated over a wireless network to the remote resources to allow the host system to track the location of the firearm 134 and control an operation of the trigger lock 110 based on the location. As a result, the host system included in the remote resources can communicate the signal to render a firearm inoperable when it is located in a pre-defined geo-fenced region.
Because GPS service may not always be available, some embodiments include an RF mode either alone or in combination with the GPS-based system. According to these embodiments, an RF transmitter is used to establish the zone of restricted firearms use 130. In general, the zones 130 established using an RF transmitter have an overall circular shape with a pre-defined radius based on the strength of the transmitter. Both topography and building structures can interfere with the unimpeded transmission of the RF signal and the overall shape of the zone of restricted firearms use 130 in this embodiment.
In operation, a desired zone of restricted firearms use is identified. A broadcasting system is placed at an approximately central location of the zone. A transmitter included in the broadcasting system is operated to continuously transmit a signal that activates the trigger lock 110 of guns within receiving distance of the RF transmitter.
According to various embodiments, any firearm equipped with the electronic trigger lock system can be uniquely identified. The cloud-based resources included in the system can be employed to register a firearm to allow use in the zone of restricted firearms use. For example, embodiments of the systems described herein allow public safety personnel (for example, police officers) to maintain their firearms in a fully operational state within the zone of restricted firearms use 130. Police departments often have lockers in which firearms are stored. According to some embodiments, these “gun lockers” are equipped with RFID readers. The firearms (for example, the handgun 100) include RFID technology. The RFID readers are in communication with the remote cloud-based resources. When a firearm is placed in the RFID enabled gun locker the firearm is identified by the host system as an authorized firearm. Once logged into the system, the firearm is uniquely identified. When such an authorized firearm enters the zone of restricted firearms use 130 the firearm remains operational.
Referring now to
In various embodiments, each of the plurality of firearms 502A-502C includes a system such as an electronic system including a trigger lock, for example, the electronic trigger lock system 104. The electronic system that is integral to the firearm can be employed to render a firearm inoperable in the restricted zones.
The system administrator 508 can include an entity and personnel responsible for operation and maintenance of the resources 506. In some embodiments, the system administrator 508 is a service provider that does not have any direct role as a public safety authority. In these, embodiments, the system administrator 508 may be the entity that builds and hosts the resources 506 for the various public safety authorities 510. Thus, the system administrator 508 can include personnel responsible for software design of backend resources and also web or mobile applications offered to the public safety authorities 510 and/or the owners or custodians of the plurality of firearms 502. The system administrator 508 may also be the supplier of the electronic locking systems included in the firearms 508.
The public safety authority 510 can include federal, state or municipal organizations. Further, the public safety authorities can include law enforcement or other government operations depending on the embodiment, for example, education officials. The public safety authority 510 defines zones of restricted firearms use and approves the firearms that are authorized for use in these zones.
In general, the network 504 can include either or both of local-area networks (LANs), wide area networks (WANs), wireless communication, wired communication and may include the Internet. According to a further embodiment, the network 504 provides access to one or more remote devices, servers, application resource management and/or data storage systems, for example, the resources 506. In general, the system 500 provides for communication of the illustrated components with one another and/or with any of the other resources and devices coupled to the network 504. For example, the network 504 can allow communication with the resources 506 for any of the plurality of firearms 502A-C, the system administrator 508 and the public safety authority 510 employing a selected one of the plurality of user devices 512, respectively.
Communication can occur using any of Wi-Fi networks, Bluetooth communication, cellular networks, satellite communication, and peer-to-peer networks available either alone or in combination with one another via the network 504. In one embodiment, the network 504 provides for communication via cellular and/or satellite communication networks, for example, between the plurality of firearms 502 and the resources 506. Depending on the embodiment, the network 504 may be any type and/or form of network known to those of ordinary skill in the art capable of supporting the operations described herein. Thus, other communication protocols and topologies can also be implemented in accordance with various embodiments.
In various embodiments, the resources 506 provide the interface and tools for establishing and managing zones of restricted firearms use, establishing an inventory of firearms equipped with an electronic trigger lock system, setting permissions for each firearm included in the inventory and generating locking signals that are transmitted to disable firearms in restricted zones, as some examples. Further, the resources 506 can be employed to authorize and establish accounts for authorized public safety authorities to employ the resources 506 to establish, manage and set the preceding, respectively.
In the illustrated embodiment, the resources 506 include a processor 516, a memory 518, a network interface 520, a firearms registration engine 522, a location-based locking engine 524, law enforcement data storage 526, zone data storage 528 and firearms data storage 529. The memory 518 includes a plurality of programs 519. Depending on the embodiment, the resources 506 can be hosted on one or more of a variety of computing devices such as a general purpose computer such as a PC, a laptop, a tablet computer, mobile phone, a server or other computing device. According to one embodiment, the resources 506 are distributed across a plurality of computing devices, for example, using a cloud based storage provider.
The network interface 520 is employed for communication, via the network 504, between the resources 506 and other elements connected to the network including the system administrator 508 and the public safety authority 510.
The memory 518 can store the plurality of programs 519 that when executed by the processor 516 operate to receive, store and manage data included in any of the law enforcement data storage 526, the zone data storage 528 and the firearms data storage 529. According to further embodiments, the plurality of programs 519 operate to process information from any one, any combination or all of the preceding data-stores to establish zones of restricted firearms use, register firearms and generate locking signals that render firearms inoperative when they are located within one or more selected zones. In accordance with one embodiment, the location-based locking engine 524 operates in substantially real time.
According to some embodiments, the firearms registration engine 522 operates to allow the registration of each of the plurality of firearms 502 with the system 500. In general, the registered firearms include those firearms equipped with the electronic trigger lock system 104. In a further embodiment, the registrations can include any firearm regardless of whether the firearm is equipped with an electronic trigger lock. In one embodiment, the firearms registration engine 522 operates to prompt a user to provide information to uniquely identify the firearm, and to identify an owner or custodian of the firearm including contact information. The firearms registration engine 522 can also operate to prompt the user (for example, the system administrator 508 or public safety authority 510) to provide an identification of zones of restricted firearms use in which the firearm will remain operational. The preceding information is communicated to the firearms data storage 529.
According to some embodiments, the location-based locking engine 524 receives the GPS location of registered firearms and the GPS coordinates of the zones of restricted firearms use. The location-based locking engine 524 operates to process the information and communicate a signal to the electronic trigger lock system 104 (see
According to some embodiments, the law enforcement data storage 526 stores information concerning one or more public safety authorities that employ the system 500. This can include an identification of the public safety authority, authorized users established for the public safety authority and zones of restricted firearms use established by the public safety authority to name a few examples. In various embodiments, the system 500 is employed by multiple public safety authorities. In these embodiments, the public safety authorities may include federal, state or municipal organizations. Further, the public safety authorities can include law enforcement or other government operations depending on the embodiment. According to one embodiment, more than one public safety office can create and manage zones of restricted firearms use in a common geographic area. For example, federal and local law enforcement and/or education officials.
According to some embodiments, the zone data storage 528 stores information that provides the details used to identify, establish and manage zones of restricted firearms use, for example, as illustrated and described with reference to
According to some embodiments, the firearms data storage 529 stores information concerning each of the plurality of firearms 502 that are registered in the system 500, for example, as illustrated and described with reference to
The firearms data storage can also store location information concerning registered firearms. This information can include the dates and times when the uniquely-identified firearm is located within a particular zone, enters the zone and departs from the zone. The preceding information can be stored regardless of whether the firearm was authorized for use in the zone such that it remained operational, or alternatively, rendered inoperative because it was not authorized for use in the zone.
Depending on the embodiment, each of the law enforcement data storage 526, the zone data storage 528 and the firearms data storage 529, respectively, can include any of a relational database, object-oriented database, unstructured database, or other database. Further, the law enforcement data storage 526, the zone data storage 528 and the firearms data storage 529 can be included in any aspect of a memory system, such as in RAM, ROM or disc, and may also be separately stored on one or more dedicated data servers included in the resources 506. In addition, the data storage can be organized in a manner different than illustrated in
The components included in the resources 506 can be coupled by one or more communication buses or signal lines. The communication buses can be used for the communication of instructions/commands and data between the illustrated components and between the illustrated components and other components included in the resources 506 depending on the embodiment.
The plurality of user devices 512 can include any type of computing device suitable for communicating with the resources 506 via the network 504. Accordingly, the plurality of user devices 512 of can include one or more of a variety of computing devices such as a general purpose computer, for example, a PC, a laptop, a tablet computer, a hand-held computer, a personal digital assistant, a mobile telephone, a camera, a smart phone or a laptop computer.
In the illustrated embodiment, the local RF communication system 514 can be included to allow a zone of restricted firearms use to be implemented in an area where GPS signal reception is unreliable. A broadcasting system is placed at an approximately central location of the zone. A transmitter included in the broadcasting system is operated to transmit a signal that activates the electronic apparatus (for example, the trigger lock 110 of
Referring now to
In general, the user interface 632 communicates information concerning the operating status of the electronic apparatus 630 to the operator of the firearm. For example, the user interface can provide a charge indication to the operator to make them aware of the charge-status of a battery power source included in the electronic apparatus 630. Further, the user interface 632 can allow the operator a limited ability to control some operations of the electronic apparatus 630 provided that they do not allow the operator to override the trigger locking functionality of the system. For example, the user interface can 632 include an input that the operator employs to activate wireless communication. Depending on the embodiment, the user interface can include one or a combination of LEDs, switches, knobs, dials, buttons, sliders or a display as some examples. According to some embodiments, the user interface 632 is provided for display in the user's portable electronic device such as a phone or tablet. For example, in one embodiment, the user has the ability to remotely lock the firearm with an electronic trigger lock system in the firearm via an application that includes a user interface displayed on their smartphone or tablet.
According to some embodiments, the power source 634 includes one or more batteries or other electrical energy storage devices. In one embodiment, the power source 634 includes a rechargeable battery such as a lithium ion battery. In further embodiments, the power source 634 includes a power generation source, for example, as described with reference to the firearm 100 and electronic trigger lock system 104 of
Depending on the embodiment, the processor 636 can be a standalone element, for example, a microprocessor. In another embodiment, the processor 636 is included in microcontroller. In one embodiment, the memory 638 is included in the processor 636. In another embodiment, the memory 638 includes memory internal to the processor 636 and memory external to the processor. Depending on the embodiment, the memory 638 can include RAM, ROM, EEPROM and/or FLASH memory. In various embodiments, the memory 638 is configured to store software instructions 639. Depending on the embodiment, the software instructions 639 can be implemented as individual software programs or modules, or combined with one or another in various configurations. Also depending on the embodiment, various functions of the electronic apparatus 630 can be implemented in hardware and/or in software, including in one or more signal processing and/or application specific integrated circuits.
Depending on the embodiment, the communication system 640 can include any of Wi-Fi networks, Bluetooth™ communication, cellular networks, satellite communication, and peer-to-peer networks available either alone or in combination with one another. Other communication protocols and topologies can also be implemented in accordance with various embodiments.
In various embodiments, the location positioning system 642 can employ cellular triangulation, RFID, GPS or any of the preceding alone, in combination with one another or in combination with other location positioning technology. For example, in further embodiments, the location positioning system 642 includes inertial sensing systems such as accelerometers and/or gyroscopes employed in an inertial navigation system. In some embodiments, the location positioning system 642 is employed to identify the location of the firearm 100, 502 for communication to the resources 506 illustrated in
According to some embodiments, the location-based locking engine 524 processes the information received from the electronic apparatus 630 to determine whether the firearm in which the system 600 is installed is located in a zone of restricted firearms use, and if so, whether it is authorized for use in the zone. A locking signal is communicated from the resources 506 to render the firearm inoperable when the location-based locking engine 524 determines the firearm in which the system 600 is installed is located in a zone of restricted firearms in which it is not authorized for use.
Depending on the embodiment, the locking mechanism controller 644 includes control logic and an electrically operated element employed to operate the mechanical firearms lock 646. The mechanical firearms lock 646 renders the firearm inoperable by physically blocking, restraining or modifying the firing mechanism. The locking mechanism controller 646 can include any of a solenoid-operated linear actuator, a rotary actuator or a different operating element capable of operating in at least two states, for example, by changing from a first state to a second state based on receipt of an electrical signal that includes either or both of a logic signal or a power signal. The two states can include a first state or “live” position in which the handgun is operational in a conventional fashion and a second “locked” state in which the firearm is rendered inoperable. For example, as illustrated and described with reference to the trigger lock 110 to
Referring now to
The process 700 includes a series of acts including actions and decision points. The actions include an act of selecting the zone management application 750, an act of selecting an existing zone 752, an act of editing a zone 754, an first act of uniquely identifying a zone 756, a first act of defining a geo-fenced region 758, a second act of uniquely identifying a zone 760, a second act of defining a geo-fenced region 762, an act of establishing a duration of a temporary zone 764, an act of confirming and saving a change to the zones 766, an act of viewing a zone 768 and an act of deleting a zone 770. The decision points include an act of determining whether an existing zone will be accessed or a new zone created 772, an act of determining whether a selected zone will be viewed or changed 774, an act of determining whether a selected zone will be edited or removed 776, and an act of determining whether a newly created zone will be a permanent zone or a temporary zone 778.
According to various embodiments, the system 500 and resources 506 can be employed to allow the system administrator 508 and the public safety authority 510 to view or change one or more zones via the process 700, for example, using a web application. The process 700 begins at the act of selecting the zone management application 750 available via the resources 506. For example, the application may provide other functionality that the user can access instead of zone management. The process moves to the act of determining whether an existing zone will be accessed or a new zone created 772. Here, the user navigates the application to proceed to the desired function. If the user selects “existing zone” at the act 772, the process 700 moves to selecting the existing zone 752 where they provide and/or select the unique identifier associated with a zone they wish to view, edit or delete.
When the zone is selected, the process 700 moves to the act of determining whether the selected zone will only be viewed or changed 774. If the user decides to view the zone, the process 700 moves to the act of viewing the selected zone 768. In one embodiment, the application renders information for display to the user concerning the selected zone. The information can include identification information such as names and property address(es) included in the zone, maps or images that illustrate the geo-fenced region defined for the zone and an identification of the controlling public safety authority for the zone as some examples.
Alternatively, if the user elects to make a change to a zone, the process 700 moves from the act 774 to the act of determining whether the selected zone will be edited or removed 776. If the user selects “remove” or “delete”, the process moves from the act 776 to the act of deleting the zone 770. The user is then provided an opportunity to confirm and save the removal of the zone at the act 766. According to one embodiment, the removal eliminates a zone of restricted firearms use such that the firearms previously rendered inoperative in the zone will no longer be disabled when in that location. The preceding can result for example with a change in property use. A demolition of a school provides one such example.
If at the act of determining whether the selected zone will be edited or removed 776, the user elects to edit, the process 700 moves to the act of editing the zone 754. Here, the application can provide the authorized user with access to information concerning the selected zone. Depending on the embodiment, the user can change the geographic size and/or boundaries of the zone or revise identification information concerning the zone as two examples. According to one embodiment, the user can review a list of firearms authorized for use in the zone and remove any firearms that no longer authorized, for example, where the ownership of the firearm has changed. Once the edits are complete, the process moves to the act of confirming and saving the information 766. Here, the user is provided an opportunity to review the edits to the zone before the information is saved.
If the user selects “new zone” at the act 772, the process 700 moves to the act 778 where the user elects to either create permanent zone or a temporary zone. As used here, the term “permanent” refers to the fact that the zone is established for an indefinite length of time. As will be apparent to one of ordinary skill in the art in view of the disclosure provided herein, a permanent zone can be modified or deleted if the responsible authority finds that it is no longer needed. In contrast, a temporary zone has a fixed duration that is established when the zone is first created. Temporary zones can also be modified or deleted in advance of the originally-scheduled end date.
With a permanent zone selected at the act 778, the process 700 moves to the first act of uniquely identifying the zone. Here, the user provides identification information, for example, name, address that distinguishes the new zone from any other zones that already exist in the system. With the unique identifying information provided, the process moves to the first act of defining a geo-fenced region 758. Here, the user provides the GPS coordinates of the zone. This information can be provided in different ways depending on the embodiment. In one approach, the user identifies a GPS coordinate that identifies a centrally located position in the zone along with a desired radius for the zone. In an alternate approach, the user identifies the GPS coordinates that define an outer edge of the zone. For example, the user can provide a first GPS coordinate that corresponds to a first street corner at the edge of the zone, a second GPS coordinate that corresponds to a second street corner, etc. In this example, the outer boundaries that define the zone are the streets that run between the GPS coordinates provided by the user.
Once the geo-fenced region is defined by the user at the act 758, the process moves to the act of confirming and saving the information 766. Here, the user is provided an opportunity to review and edit the identification and boundaries for the zone before the information is saved.
With a temporary zone selected at the act 778, the process 700 moves to the second act of uniquely identifying the zone 760. Here, the user provides identification information, for example, name, address that distinguishes the temporary zone from any other zones that already exist in the system. With the unique identifying information provided, the process moves to the second act of defining a geo-fenced region 762. Here too, the user provides the GPS coordinates of the zone. This information can be provided in different ways depending on the embodiment. In one approach, the user identifies a GPS coordinate that identifies a centrally located position in the zone along with a desired radius for the zone. In an alternate approach, the user identifies the GPS coordinates that define an outer edge of the zone. For example, the user can provide a first GPS coordinate that corresponds to a first street corner at the edge of the zone, a second GPS coordinate that corresponds to a second street corner, etc. In this example, the outer boundaries that define the zone are the streets that run between the GPS coordinates.
Once the geo-fenced region is defined by the user at the act 762, the process moves to the act of establishing a duration of the temporary zone 764. Here, the user identifies the dates and times during which the temporary zone will be active. For example, an ordinary venue that becomes a host for a concert or event expected to draw a crowd provides one example where a temporary zone can be established for the duration of the event. In this example, the temporary zone may be set-up for two or three days. With the geo-fenced region and duration of the temporary zone established by the user, the process moves to the act of confirming and saving the information 766. Here, the user is provided an opportunity to review and edit the identification, boundaries and duration for the zone before the information is saved.
Referring now to
According to various embodiments, the system 500 and resources 506 can be employed to allow the system administrator 508 and the public safety authority 510 to add, remove, view or change one or more firearms in the system inventory via the process 800, for example, using the web application that also allows for zone management. The process 800 begins at the act of selecting the inventory management application 880 available via the resources 506. The process moves to the act of determining whether records concerning an existing firearm will be accessed or a new firearm added to the inventory 892. Here, the user navigates the application to proceed to the desired function. If the user selects “existing firearm” at the act 892, the process 800 moves to selecting the firearm 882 where they provide and/or select the unique identifier associated with a firearm they wish to view, edit or deactivate.
When the firearm is selected, the process 800 moves to the act of determining whether the selected firearm will be viewed or deactivated 886. If the user decides to deactivate the firearm, the process 800 moves to the act of deactivating the selected firearm 886. A firearm will be deactivated when, for example, it is no longer eligible for operation in a zone of restricted firearms use. The preceding may be a result of a change in ownership or custodianship of the firearm or a change or deletion of a zone in which the firearm was authorized for operation. With the firearm identified by the user, the process moves to the act of confirming and saving the information 891. Here, the user is provided an opportunity to review the change before the record is either deleted or the firearm permission removed.
If the user decides to edit the firearm at the act 893, the process 800 moves to the act of editing the characteristics and/or permissions of the firearm 884. Here, the user is provided with an ability to add or remove the zones of restricted firearms use for which the firearm is authorized for use. Other permissions associated with the firearm can also be updated, for example, the individuals authorized to carry the firearm. The user can also update identification information, for example, the firearms identification and owner identification as two examples. With the edits made by the user, the process moves to the act of confirming and saving the changes 891. Here, the user is provided an opportunity to review the edits before the record is updated.
If the user selects “new” at the act of selecting a new or existing firearm 892, the process 800 moves to the act of uniquely identifying a firearm 888. Here, the user provides identification information that uniquely identifies the firearm that is being added to the inventory. In some embodiments, the serial number of the firearm is provided at the act 888. However, other information can be provided alone or in addition to the serial number. In general, the identifying information is provided in alpha numeric form. The information or combination of information is used to uniquely identify the firearm.
During the setup for a new firearm, the user also provides the characteristics and/or permissions for the new firearm at the act 890. Here, the user is provided with an ability to identify any zones of restricted firearms use in which the firearm is authorized for use. Other permissions associated with the firearm can also be provided, for example, the individuals authorized to carry the firearm. The user can also include temporal restrictions on the permissions, for example, by establishing authorized use for specific dates, times days of the week, etc. Characteristics can include the make and model of the firearm, for example. With the characteristics and permissions established, the process moves to the act of confirming and saving the new firearm 891. Here, the user is provided an opportunity to review the identification, characteristics and permissions before the record is updated.
The process 900 includes a series of acts including actions and decision points. The actions include an act of receiving location information concerning a firearm 994, an act of maintaining a firearm in an operational state 995 and an act of locking a firearm 996. The decision points include an act of determining whether a firearm is located in a zone of restricted firearms use 997 and an act of determining whether a firearm located in a zone of restricted firearms use is authorized for operation within the zone 998.
The process 900 begins with the act of receiving location information concerning a firearm 994. This act can be implemented with a communication of the GPS coordinates from the firearm to the system resources, for example, the resources 506. For example, depending on the embodiment, the GPS information is provided by the electronic trigger lock 104 or the electronic apparatus 630. According to various embodiments, the communication of the GPS information occurs on a substantially real time basis. The process moves to the act of determining whether the firearm is located in a zone of restricted firearms use 997. According to one embodiment, this act is implemented in resources remote from the firearm, for example, the resources 506. In this embodiment, the location-based locking engine 524 or another element included in the system 500 evaluates the current GPS coordinates received from the firearm against the geo-fenced zones of restricted firearms use maintained by the system.
If the GPS coordinates are not within a zone of restricted firearms use, the process 900 moves to the act of maintaining the firearm in an operational state 995. According to various embodiments, the “live” or the fully operational state of the firearm is the default operating state. In these embodiments, no affirmative action is required as a part of the process 900. Thereafter, the process 900 returns to the start of the process 900 and the act 994 to monitor the location of the firearm on a substantially continuous basis.
If at the act 997, the firearm is located within a zone of restricted firearms use, the process 900 moves to the act of determining whether the firearm is authorized for operation within the zone 998. According to one embodiment, the system resources 506 are employed to process the location information in combination with information concerning the locations of the geo-fenced regions at the act 998. According to one embodiment, the preceding is performed by the location-based locking engine 524 included in the system resources 506. If the firearm is located in a zone of restricted firearms use where it is authorized for use, the process 900 moves to the act of maintaining the firearm in an operational state 995.
If the firearm is located in a zone of restricted firearms use where it is not authorized for use, the process 900 moves to the act of locking the firearm 996. According to one embodiment, the location-based locking engine 524 generates a locking signal that is communicated from the system resources 506 to the firearm. The electronic apparatus in the firearm receives the signal and operates to render the firearm inoperative. The process 900 then returns to the act of receiving location information concerning the firearm 994. In some embodiments, the preceding is performed on a substantially continuous basis such that the process 900 operates to return the firearm to a fully operational status when the firearm is moved outside the zone of restricted firearms use.
According to various embodiments, the approaches described herein include the use of a compliant mechanism included in the firearm. For example, in one embodiment, the electronic trigger lock system 104 includes a compliant mechanism. As another example, the mechanical firearms lock 646 of the system 600 includes a compliant mechanism. In various embodiments, the compliant mechanism is characterized by the use of one or more flexible members that store energy. In further embodiments, the energy storage characteristics of the flexible members are designed with specific force-deflection properties, for example, properties that cause the mechanism to bias to a desired position. According to some embodiment, the compliant mechanism is integrated into the firing mechanism of a firearm where it can be employed to maintain a firearm in a fully operational state when in a first state and also render the firing mechanism inoperable when in a second state. As used herein, the term “inoperable” means that the firearm cannot be operated to fire ammunition. One of ordinary skill in the art in view of the disclosure provided herein will recognize that portions of a firing mechanism can be operational or move when the trigger of the firearm is pulled even though the firearm is rendered inoperable. Further, a firearm that is rendered inoperable may also be capable of loading and/or ejecting ammunition.
Applicants have recognized advantages provided by the inclusion of a compliant mechanism in a trigger locking device. These advantages can include increased reliability because compliant mechanisms reduce parts counts, greater precision in motion because compliant mechanism reduce the need to provide “slack” in the mechanism, reduced requirements for lubrication because the locking mechanism has fewer movable joints than other forms of locking mechanisms, reduced size and weight of the locking mechanism, reduced travel required of operating elements required to render the firearm inoperable and reduced manufacturing complexity.
Referring now to
Depending on the embodiment, the rigid member 1026 can be manufactured from the same material as the trigger bar or a different material as the trigger bar. Thus, the rigid member can be manufactured from metal, metal alloys or plastic depending on the embodiment. According to one embodiment, the rigid member 1026 and the plurality of flexible members 1028A-C are both manufactured from the same material as the remainder of the firearms operating mechanism. According to one embodiment, the rigid member 1026 and the plurality of flexible members 1028A-C are manufactured from steel. Alternate materials of manufacture include: fiber glass; carbon fiber, titanium, tungsten, inconel, chromium and aluminum
While the electromechanical operator 1030 is identified as a motor in
In general, the locking mechanism 1000 is operational in two states, a first state in which the firearm in which it is included is operational and a second state in which the firearm is inoperable.
Referring now to
According to the illustrated embodiment, the locking mechanism 1200 is a compliant member included in a trigger bar. The locking mechanism 1200 includes a rigid member 1226, a plurality of flexible members 1228A-1228D, a travelling member 1234 and a set of grooves including a first groove 1236A, a second groove 1236B and a third groove 1236C. The rigid member 1226 includes an engagement surface 1238. In the illustrated embodiment, the rigid member 1226 in combination with the plurality of flexible members 1228A-1228D connects a rear portion of the trigger bar to a front portion of the trigger bar. As is discussed further in the below-description, the actuators employed with the locking mechanism are not illustrated. In general, however, an actuator is coupled to the travelling member 1234. In some embodiments, the engagement surface includes a slope along the upper edge of the rigid member to allow the travelling member to more easily move from the position shown in
In some embodiments, the traveling member 1234 is moved linearly between the unlocked position illustrated in
With the locking mechanism 1200 locked as illustrated in
While
According to some embodiments, one or more elements of an overall system as described herein can be provided in hardware or software included in a mobile device, for example, a tablet computer or smartphone. According to one version, at least a portion of the system is provided in a mobile app, for example, an app that receives feedback from the electronic trigger lock system 104 or the electronic apparatus 630.
It will be apparent to one of ordinary skill in the art based on the disclosure herein that the terms “trigger lock,” “firearm locking mechanism” and “mechanical firearms lock” can refer to an apparatus that blocks, restrains, disengages or otherwise modifies any part of the linkage or mechanism that transfers a trigger-pull into an operation of a firing pin. Thus, a firearms locking mechanism or mechanical firearms lock may directly engage the trigger of the firearm or may not do so depending on the embodiment. According to one embodiment, the trigger bar is modified.
While the electronic systems are primarily illustrated and described with reference to a semi-automatic pistol herein, the approaches described herein can be employed with other styles and types of firearms. For example, the electronic systems 104, 600 can be employed with revolvers, rifles, shotguns and any other type of firearm that employs a trigger. The approaches described herein can also be employed in BB guns, pellet guns and AIRSOFT guns as some other examples. Further, while the embodiments illustrated and described herein refer to a motor operated as a generator to generate electricity, other power generation devices can be employed depending on the embodiment.
Having thus described several aspects of at least one embodiment of this invention, it is to be appreciated various alterations, modifications, and improvements will readily occur to those skilled in the art. Such alterations, modifications, and improvements are intended to be part of this disclosure, and are intended to be within the spirit and scope of the invention. Accordingly, the foregoing description and drawings are by way of example only.
Number | Name | Date | Kind |
---|---|---|---|
338189 | Potter | Mar 1886 | A |
1024932 | Haeghen | Apr 1912 | A |
2372519 | Roper | Mar 1945 | A |
2846925 | Norman | Aug 1958 | A |
3184876 | Walther | May 1965 | A |
3608224 | Hildebrandt | Sep 1971 | A |
3914996 | Davis | Oct 1975 | A |
4682435 | Heltzel | Jul 1987 | A |
5675925 | Wurger | Oct 1997 | A |
5704153 | Kaminski | Jan 1998 | A |
6223460 | Schmitter et al. | May 2001 | B1 |
6223461 | Mardirossian | May 2001 | B1 |
6237271 | Kaminski | May 2001 | B1 |
6240669 | Spaniel et al. | Jun 2001 | B1 |
6253479 | Fuchs et al. | Jul 2001 | B1 |
6415542 | Bates | Jul 2002 | B1 |
6457271 | Vaid et al. | Oct 2002 | B1 |
6588136 | Baker et al. | Jul 2003 | B2 |
6823621 | Gotfried | Nov 2004 | B2 |
6952895 | Zonshine | Oct 2005 | B1 |
7356959 | Schmitter et al. | Apr 2008 | B2 |
7716863 | Johnson | May 2010 | B1 |
8127482 | O'shaughnessy et al. | Mar 2012 | B2 |
8312660 | Fujisaki | Nov 2012 | B1 |
8549780 | Emde et al. | Oct 2013 | B2 |
8686576 | Smith | Apr 2014 | B1 |
8826575 | Ufer | Sep 2014 | B2 |
8850944 | Zhou | Oct 2014 | B2 |
8966797 | Carlson | Mar 2015 | B2 |
9115944 | Arif et al. | Aug 2015 | B2 |
9140509 | Sullivan | Sep 2015 | B2 |
9175915 | Harvey | Nov 2015 | B2 |
9222743 | Shah | Dec 2015 | B1 |
9250030 | Henry | Feb 2016 | B2 |
9261315 | Travis | Feb 2016 | B2 |
9316454 | Milde, Jr. | Apr 2016 | B2 |
9341425 | Carlson | May 2016 | B2 |
9341443 | Chukwu | May 2016 | B2 |
9347723 | Burdine | May 2016 | B2 |
9354011 | Cooke et al. | May 2016 | B2 |
9395132 | Stewart et al. | Jul 2016 | B2 |
9400150 | Stewart et al. | Jul 2016 | B2 |
9404698 | Stewart et al. | Aug 2016 | B2 |
9435597 | Goren et al. | Sep 2016 | B2 |
9470485 | Kley | Oct 2016 | B1 |
9599418 | Steele | Mar 2017 | B2 |
9628470 | Mori | Apr 2017 | B2 |
9644911 | Mclean, III | May 2017 | B1 |
9651325 | Gant et al. | May 2017 | B1 |
9658012 | Stewart et al. | May 2017 | B2 |
9658013 | Stewart et al. | May 2017 | B2 |
9704132 | Fraccaroli | Jul 2017 | B2 |
9746266 | Barido et al. | Aug 2017 | B1 |
9810497 | Carlson | Nov 2017 | B2 |
9841249 | Nicks | Dec 2017 | B1 |
9863731 | Alderman | Jan 2018 | B1 |
9921017 | Kley | Mar 2018 | B1 |
10001335 | Patterson et al. | Jun 2018 | B2 |
10107583 | Stewart et al. | Oct 2018 | B2 |
10578384 | Gwillim, Jr. | Mar 2020 | B1 |
10775122 | Rofkahr, Jr. | Sep 2020 | B1 |
10890395 | Wilcox | Jan 2021 | B2 |
20010016998 | Chapman | Aug 2001 | A1 |
20010042332 | Gering et al. | Nov 2001 | A1 |
20020116857 | Wonisch et al. | Aug 2002 | A1 |
20020194762 | Cominolli | Dec 2002 | A1 |
20030097776 | Brosow | May 2003 | A1 |
20050279165 | Yuasa | Dec 2005 | A1 |
20060242879 | Schmitter | Nov 2006 | A1 |
20070186457 | Pitt | Aug 2007 | A1 |
20090108589 | Racho | Apr 2009 | A1 |
20100251586 | Packer | Oct 2010 | A1 |
20110063102 | Ivtsenkov | Mar 2011 | A1 |
20110126622 | Turner | Jun 2011 | A1 |
20120090213 | Pichler | Apr 2012 | A1 |
20120104877 | Isaacs | May 2012 | A1 |
20120180357 | Dietel et al. | Jul 2012 | A1 |
20140173962 | Goren | Jun 2014 | A1 |
20140360073 | Stewart | Dec 2014 | A1 |
20140366420 | Hager | Dec 2014 | A1 |
20150027020 | Sheets, Jr. et al. | Jan 2015 | A1 |
20150153124 | Carlson | Jun 2015 | A1 |
20150253109 | Wichner | Sep 2015 | A1 |
20150345887 | Shneorson et al. | Dec 2015 | A1 |
20160025438 | Alderman | Jan 2016 | A1 |
20160084599 | Alicea, Jr. | Mar 2016 | A1 |
20160190859 | Blum | Jun 2016 | A1 |
20160252317 | Biran et al. | Sep 2016 | A1 |
20160320154 | Krieger | Nov 2016 | A1 |
20160341506 | Steele | Nov 2016 | A1 |
20170074610 | Winiecki | Mar 2017 | A1 |
20170074611 | Winiecki | Mar 2017 | A1 |
20170077741 | Winiecki | Mar 2017 | A1 |
20170176123 | Milde, Jr. | Jun 2017 | A1 |
20170234636 | Hafen | Aug 2017 | A1 |
20170241727 | Stewart et al. | Aug 2017 | A1 |
20170241728 | Stewart et al. | Aug 2017 | A1 |
20180045479 | Milde, Jr. | Feb 2018 | A1 |
20180051950 | Gering | Feb 2018 | A1 |
20180058786 | Carlson | Mar 2018 | A1 |
20180156566 | Wei | Jun 2018 | A1 |
20180164060 | Alok | Jun 2018 | A1 |
20180259285 | Galie | Sep 2018 | A1 |
20180268119 | Nicoll | Sep 2018 | A1 |
20180274872 | Zukowski et al. | Sep 2018 | A1 |
20180299220 | Du et al. | Oct 2018 | A1 |
20190003803 | Kapogianis | Jan 2019 | A1 |
20190003804 | Deng | Jan 2019 | A1 |
20190025000 | Bascom | Jan 2019 | A1 |
20190195585 | Rensing | Jun 2019 | A1 |
20190226785 | Delgado Acarreta et al. | Jul 2019 | A1 |
20190281259 | Palazzolo | Sep 2019 | A1 |
20190310042 | Himmich | Oct 2019 | A1 |
20190376756 | Nieh et al. | Dec 2019 | A1 |
20200025488 | Alicea, Jr. | Jan 2020 | A1 |
20200041224 | Makarov et al. | Feb 2020 | A1 |
20200191511 | Breda | Jun 2020 | A1 |
20200300569 | Apostolopoulos | Sep 2020 | A1 |
Number | Date | Country |
---|---|---|
102007062648 | Jan 2010 | DE |
2017151162 | Sep 2017 | WO |
2017172379 | Oct 2017 | WO |
Entry |
---|
Grant, Ron, “Gun Protection Smart Lock” retrieved from Internet archives Jul. 9, 2019, https://web.archive.org/web/20171109113017/http://www.filmmusicarts.com/GPSLock2.html. |
Number | Date | Country | |
---|---|---|---|
20210055069 A1 | Feb 2021 | US |
Number | Date | Country | |
---|---|---|---|
62682400 | Jun 2018 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16436150 | Jun 2019 | US |
Child | 17023291 | US |