The present disclosure relates to weapon detection, and more particularly, to weapon detection using electromagnetic signals.
Weapons are detected in some public places for safety purposes. For example, guns and other dangerous weapons are screened at airports using a variety of devices, such as metal detectors, millimeter wave machines, backscatter X-ray and cabinet X-ray machines.
Metal detectors identify metal objects using magnetic fields. Some metal detectors use non-ionizing radiation. Non-ionizing radiation has enough energy to move atoms in a molecule around or cause them to vibrate, but not enough to remove electrons from atoms. Millimeter wave machines use non-ionizing radiofrequency waves to detect weapons. Millimeter wave machines can show hidden threats such as guns and knives. In airports, both metal detectors and millimeter wave machines use low energy, non-ionizing radiation to send energy across scanned surfaces. Backscatter X-ray machines use very low energy X-rays that are reflected back to the machines. Backscatter X-ray machines, such as backscatter passenger scanners are used to detect hidden weapons, tools, liquids, currency etc. Cabinet X-ray machines are used to screen luggage and carry-on items of passengers. Cabinet X-ray machines are equipped with thick walls of the enclosed cabinet and lead curtains at the entry and exit points of the cabinets to keep radiation from escaping.
However, current weapon detectors require passengers and luggage to be detected one at a time. The detection process is time-consuming and not productive. Therefore, current weapon detectors are not suitable for public places with high traffic and fast-moving crowds, such as schools, hospitals, shopping malls, etc. Moreover, backscatter scanning devices meant for airline passengers have caused controversies focused on both the privacy issues of the scans and the safety of the devices themselves. Furthermore, X-ray radiation can bring a risk of health issues and cannot be used frequently on human beings.
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track RFID tags attached to objects. An RFID system includes an RFID reader and RFID tags. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the RFID tag transmits digital data, for example, an identifying inventory number, back to the RFID reader. RFID technology has been widely used in payment systems or toll roads, animal tracking, etc. RFID technology has advantages of accuracy, efficiency, and security. Additionally, RFID radiation does not cause harmful effects on human beings like X-rays.
Embodiments of the present disclosure address the problems of privacy, health issues, and inefficiency by providing systems, methods, and tags for weapon detection using RFID technology.
Embodiments of the disclosure provide a weapon detection system using RFID technology. The weapon detection system includes a detector and a receiver. The detector is an RFID detector and configured to send Radio Frequency (RF) signals. The receiver is an RFID tag and configured to receive RF signals from the detector and return RF signals to the detector. The RFID tag is embedded in a weapon and stores information about the weapon.
Embodiments of the disclosure also provide a method for detecting weapons using RFID technology. The method includes sending RF signals by an RFID detector; receiving, by an RFID tag, RF signals from the RFID detector; returning, by the RFID tag, RF signals to the RFID detector; and triggering an alarm in response to detecting the RFID tag by the RFID detector. The RFID tag is embedded in a weapon and stores information about the weapon.
Embodiments of the disclosure further provide an RFID tag for detecting weapons. The RFID tag includes a chip and a tag antenna. The RFID tag is embedded in a weapon and stores information about the weapon.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
A system using magnetic fields, radiofrequency waves, or X-rays may be used to detect weapons in public places. For example, airports use metal detectors, millimeter wave machines, or X-ray machines to help identify weapons such as guns. Due to the slow response of current detection devices, passengers and luggage are required to go through the detection devices one after another. This results in a clog in the security line. In addition, X-rays can damage the health of human beings. Meanwhile, privacy cannot be protected when passengers are exposed to some of the above-mentioned devices.
Embodiments of the present disclosure provide weapon detection systems by using electromagnetic technology. An exemplary system may include a detector and a receiver. The detector may send electromagnetic signals. The receiver may receive electromagnetic signals from the detector and return electromagnetic signals to the detector. The receiver may be embedded in a weapon.
In one example, the electromagnetic signals may be Radio Frequency (RF) signals. The detector may be an RFID detector. The receiver may be an RFID tag which may store information about the weapon, for example, the make, model, manufacturer, and serial number. The RFID detector may comprise an RFID reader, a detector antenna, and an alarm. The RFID tag may comprise a chip and a tag antenna. The combination of RFID reader and RFID tag can improve the efficiency of identifying weapons. Meanwhile, RFID signals may cause less damage to the health of human beings compared to X-rays. Additionally, privacy of human beings will not be violated under the RFID detection systems.
It is contemplated that the ways in which objects 104 may go through the entrance of buildings are not limited by the example shown in
RFID detector 202 may comprise an RFID reader 204, a detector antenna 206, and an alarm 208. RFID reader 204 may decode RF signals. Detector antenna 206 may send and transmit RF signals. Alarm 208 may be triggered when RFID tag 210 is detected by RFID detector 202. RFID tag 210 may comprise a chip 212 and a tag antenna 214. Chip 212 and tag antenna 214 may be temporarily powered by energy from RFID reader 204. Tag antenna 214 may receive and transmit the RF signals from RFID reader 204. Tag antenna 214 may collect energy and channel the energy to chip 212 to turn it on. Chip 212 may store information about the weapon to which RFID tag 210 is embedded.
In some embodiments of the present disclosure, the frequency of the RF signals may range from 3 MHz to 30 MHz. For example, the frequency may be 13.56 MHz. In other embodiments, frequency of the RF signals may range from 300 MHz to 3 GHZ. For example, the frequency may range from 840 MHz to 960 MHz. In another example, the frequency may range from 900 MHz to 915 MHz.
Consistent with some embodiments, in step S402, a detector (e.g., detector 102) may send electromagnetic signals. In step S404, a receiver that is affixed to an object (e.g., objects 104) may receive electromagnetic signals from the detector. In step S406, the receiver may return electromagnetic signals to the detector.
In some embodiments, the electromagnetic signals may be Radio Frequency (RF) signals. The detector may be an RFID detector (e.g., RFID detector 202). The receiver may be an RFID tag (e.g., RFID tag 210) embedded in a weapon. The RFID detector may send energy (i.e., RF signals) to the RFID tag. The RFID tag may return RF signals to the RFID detector. RFID detector 202 may include an RFID reader (e.g., RFID reader 204), a detector antenna (e.g., detector antenna 206), and an alarm (e.g., alarm 208). The RFID reader may decode RF signals. The detector antenna may send and transmit RF signals. The RFID tag may comprise a chip (e.g., chip 212) and a tag antenna (e.g., tag antenna 214). The chip and tag antenna may be temporarily powered by energy from the RFID reader. The tag antenna may receive and transmit the RF signals from the RFID reader. The tag antenna may collect energy and channel the energy to the chip to turn it on. The chip may store information about the weapon in which the RFID tag is embedded.
In step S408, an alarm (e.g., alarm 208) may be triggered when a target object (e.g., object 104b) is detected. The target object may comprise an RFID tag (e.g., RFID tag 210). The alarm may be set in a variety of designs. For example, the alarm may be a flashlight, a siren, or a combination of flashlight and siren.
In some embodiments of the present disclosure, the frequency of the RF signals may range from 3 MHz to 30 MHz. For example, the frequency may be 13.56 MHz. In other embodiments, the frequency of the RF signals may range from 300 MHz to 3 GHZ. For example, the frequency may range from 840 MHz to 960 MHz. In another example, the frequency may range from 900 MHz to 915 MHz.
It will be apparent to those skilled in the art that various modifications and variations can be made to the disclosed systems and related methods. Other embodiments will be apparent to those skilled in the art from consideration of the specification and practice of the disclosed system and related methods.
It is intended that the specification and examples be considered as exemplary only, with a true scope being indicated by the following claims and their equivalents.