This disclosure relates generally to firearms, and, more particularly, to a weapons firing safeties that include a weapons identification exchange with an enabling device.
Communications systems have been used to control firearm safeties for some time. For example, some communications controlled firearm safeties have been described in German Patents DE 25 05 604; DE 29 40 513; and DE 102 22 332 and in U.S. Pat. No. 3,703,845. According to German Patent DE 25 05 604, a transmitter sends signals (for example, light signals) to a weapon to enable certain operations of the weapon. The signals are directed toward a receiver mounted on the weapon. According to German Patent DE 29 40 513, such signals—e.g., infrared light signals—are encoded, and the weapon safety device includes a decoding device, which only releases certain functions of the weapon depending on which encoded signal is received by the weapon safety device. For example, one signal may be sent for unlocking the weapon to allow loading and unloading, and another signal may be sent for unlocking the weapon to allow shooting.
U.S. Pat. No. 3,703,845 describes an electromagnetic unlocking and locking device. In addition, German Patent DE 102 22 332 describes a pattern transmitter (code transmitter) that transmits signals in the form of radio waves, acoustic signals, optical signals or electrical signals to a weapon, and the weapon itself comprises an electronic comparator circuit, which checks the received signal patterns for their validity and only unlocks (releases the safety of) the weapon if a valid signal is received.
All these systems are basically suitable to be used in a shooting facility or in a shooting range in order restrict the use of weapons to a certain spatial range. That is, the weapon may only be shot, for example, in a certain direction or only in a certain zone, in which it can receive the corresponding release signals. Also, as described above with German Patent DE 102 22 332, a weapon may be arranged to acknowledge different release signals, i.e., different signals intended to enable different operations. As described in German Patent DE 102 22 332, this may be done using changing signal patterns created by means of corresponding dialog functions. Thus, the weapon may receive a variety of signals from the enabling apparatus. However, the information exchange between the weapon and the enabling apparatus is limited to the weapon sending an inquiry signal to the pattern transmitter, which then transmits a corresponding release signal to the weapon. The pattern transmitter releases every weapon, which has sent an inquiry signal, and that is located within the transmission range of the enabling apparatus. Thus, this system does not provide an individually controllable release of weapons. It means that the flexibility of these systems with relation to the controllable weapons is limited. So, for example, the only way to ensure that a lost or stolen weapon can no longer be activated by the enabling device (i.e., the pattern transmitter) is to change the signal pattern for the release signal and/or for the inquiry signal. To achieve this, the signal receivers and the inquiry signal transmitters on the weapons that are to continue to be released (i.e., authorized weapons) must be changed accordingly.
U.S. Pat. No. 6,237,271 also discloses weapon safety that is controlled via communications. In U.S. Pat. No. 6,237,271, a weapon-based transmitter sends an inquiry signal, which is received by a weapon-independent enabling apparatus, which then transmits an identification signal to a receiver in the weapon. The receiver, upon receiving this identification signal, then triggers a weapon-based safety device to enable the weapon. In the system of the '271 patent, the actual identification and enabling process are performed from the weapon itself. This means that the exchange of identification requires an active transmitter on the weapon. This arrangement does not allow an exchange of identification controlled exclusively by a weapon-independent enabling apparatus.
The present description relates to weapons firing safety systems that enable the firing of a weapon (i.e., bring the weapon into a functional condition) by means of an identification exchange between the weapon and an enabling apparatus. In this system, the example weapon includes an individual weapon identification and a safety device. The enabling apparatus captures the weapon identification and, if appropriate, sends a release signal to the safety device arranged in the weapon. The example enabling apparatus includes a control unit and an identification memory. Further, the enabling apparatus is controlled in that the release signal is only sent if the captured weapon identification matches a weapon identification registered in the identification memory.
The example system also may include a user identification 11, which is located on another identification carrier 12, which also may be designed as a transponder with its own transmission and reception antennas.
Example transponders that are suitable for the illustrated system include, for example, radio frequency identification (RFID) data carriers that have memory function. The transponder may be designed in a whole range of variants starting with a simple read-only transponder up to a sophisticated transponder equipped with encoding functions. In their basic design, transponders with a memory function contain a memory (for example, a RAM, ROM, EEPROM or FeRAM) and a high frequency (HF) interface for power supply and communication with the read/write device. The HF interface thereby forms the interface between a transfer channel from the read/write device to the transponder and the digital circuit elements of the transponder itself. In general, the HF interface corresponds with a classic modem (modulator/demodulator), as the HF interface is also used for analog data transfer via telephone lines. The HF interface of the transponder has a load or backscatter modulator (or another procedure, such as, for example, a frequency divider or a count-down oscillator), which is activated by the digital transmission data in order to send data back to the read device. Passive transponders, i.e., transponders without their own power supply, are supplied with power via the HF field of the read/write device. The HF interface receives current from the transponder antenna and provides it, in the form of a direct current, to the chip as a regulated voltage supply. The transponders may be provided with their own microprocessors, which execute data transfer from and to the transponder and process control of commands, file management and cryptographical or encoding algorithms.
It is also possible to equip transponders with sensor functions, so that temperature, humidity, shock, acceleration or other physical variables, for example, can be recorded in the transponder and can be output by a read/write device. Thus, for example, critical operating variables can be captured for weapons. Other example data include the maximum attained temperature of a weapon barrel or the number of shots fired. The recording of such parameters allows the weapon to be controlled (e.g., enabled) based on the actual characteristics of the operation of the weapon. For example, the weapon may be locked after a certain number of shots or upon reaching a limit temperature.
In addition, glass transponders may be used in some examples. Glass transponders, the inductors of which are coiled around a highly permeable ferrite rod (ferrite antenna), are suitable for the installation of transponders in a metallic environment, such as the environment of a firearm. In the case of an installation in an oblong depression or recess of a metal surface, the transponder may be easily read. Even covering such an arrangement with a metal cover is possible if the cover is fastened between the two metal surfaces with a narrow slot or gap of dielectric material (e.g., paint, plastic). Thus, the field lines running parallel to the metallic surface may enter the hollow area via the dielectric gap so that the transponder can be read. In addition, so-called disk tags (disk-shaped transponders) may be embedded between metal plates. The top and bottom sides of the tags are covered with metallic foil made of a highly permeable amorphous metal, each of which cover only one half of the tag so that a magnetic flow through the inductor of the transponder is created at the slot or gap between the two foil parts so that the transponder can be read.
For installation in non-metallic bodies, there are a number of flat, rod-shaped or other transponder designs that can be glued on/in, cast in, poured in, screwed in or otherwise fastened to the non-metallic body. For instance the transponders may be so flat that the transponders may even be applied along the surfaces of a weapon.
As shown in
The regulating element 9 can be designed as an electromagnetic regulation element, which engages a trigger mechanism (not shown). In this example, a trigger rod (not shown) may be blocked, released or hooked off a trigger guard (not shown) or a hammer (not shown).
In another example utilization of the example system, in addition to the weapon identification 7, a user identification 11 is requested. This user identification 11 may also be stored in a transponder 12 (i.e., the user identification carrier 12), which the user of the weapon 6 carries with him. In this case, the global control signal 15 triggers the transmission of the user identification signal 18, which contains the user identification 11, to the enabling apparatus 1, which is then transmitted by the enabling apparatus 1 through the first antenna 5 to the control unit 2. The control unit 2 executes a comparison operation to determine if the transmitted user identification 11 matches a user identification that is already stored in the user identification memory 4. If there is a combined inquiry of weapon and user identification codes 7 and 11, the weapon-enabling signal 17 is only transmitted if both identification codes 7 and 11 are present in the memories 3, 4 accordingly. Therefore, certain weapon identification codes may be assigned to certain users. Consequently, not every user may use every weapon. To maintain the identification data, the enabling apparatus 1 may be equipped with an entry device 19 and/or a reading device 20. In some examples, the data and/or signal exchange, i.e., the communications occurs between the enabling apparatus 1 and the weapon 6 (i.e., the identification carriers or transponders 10 and 12) via radio waves. In other examples, the communication may occur optically, acoustically, through physical lines or in another suitable manner.
One of ordinary skill in the art will appreciate that the examples described herein are beneficial to the identification and enablement of weapons in manner that resolves the deficiencies of prior systems, namely that the example systems described herein facilitate the enabling of weapons individually, flexibly, centrally, and comprehensively. As described above, within the example systems, the weapon identification 7 is contained in the weapon identification carrier or transponder 10 that is associated with the weapon 6 and that, upon receiving the control signal 15 from the enabling apparatus 2, transmits the weapon identification signal 16 that includes the particular weapon identification 7, which is received by the enabling apparatus 1. The enabling signal 17 is only transmitted if it is verified in an authorization step that the weapon identification 7 (of a weapon that is ascertained within the action range of the enabling apparatus 1) matches a weapon identification registered in the weapons identification memory 3. Only when this authorization process occurs successfully is the encoded and weapon-individual enabling signal 17 transmitted to the weapon 67. When the authorization process does not occur successfully, i.e., the comparison of the received weapon identification 7 and the registered weapon identification do not match, the weapon 6 is not enabled. This system allows, by changing the identification memory 3, to centrally and simply determine which weapons are to be enabled. The example system may also be used to intentionally leave weapons that are generally suitable to be enabled non-enabled if their enabling is not desired or authorized. Thus, to ensure a weapon 6 is non-enabled and remains non-enabled, it is sufficient to only remove the weapon identification 7 of that weapon 6 from the weapon identification memory 3. This is particularly beneficial to control weapons that have been lost, stolen or misplaced.
As mentioned above, the example systems described herein may be used in the shooting facility 27, e.g., a shooting range, and may include the additional intermediate block or locking device (
As stated above, there example system may also include an exchange of user-specific identification 11. This combination of weapon- and user-specific identifications allows additional measures to increase the safety, an example of which is provided above. In addition, for example, the enabling of a weapon 6 may be restricted to a certain combination of user and weapon identification codes 7, 11. Thus, only a certain user or group of users is registered for one or more weapon identification codes 7 and vice versa.
Also, in some example, the identification codes 7, 11 may be changed through the enabling apparatus 1. Thus, encoding procedures may be performed, in which the identification 7, 11 is changed upon each exchange of identification 7, 11 according to a certain algorithm so that forging the identification is impossible or at least much more difficult, should unauthorized third parties get hold of the identification exchange signals 16, 18.
The example weapon safety system may additionally be equipped with a reading device, which allows storing weapon and/or user identification 7, 11 in an identification memory 3, 4. This allows the identification data to be safely accurately recorded in the identification memory 3, 4 without error. Alternatively, such data also may be entered through a corresponding entry device or a terminal 19, 20.
The recording of the weapon identification 7 in or on an identification carrier 10 allows for the independent manufacture of the weapon 6 and the creation of the identification 7 and/or the identification carrier 10. So, for example, even weapons 6 that have been manufactured without any suitable identification 7 can be subsequently equipped with the identification carrier 10 and with the safety device 8, with which they then become suitable for use in the weapon safety system described herein.
The example identification carriers 10 may be designed as an active or passive transponder. When designed as a passive transponder, the identification carrier 10 is activated by the signal energy transmitted by the enabling apparatus 1, which then allows the weapon identification 7 to be scanned by the enabling apparatus 1. The enabling apparatus 1 then sends the enabling signal 17 to the transponder 10, which then activates the safety device 8 to enable the weapon 6. The energy required to actuate the safety device 8 may be supplied by the signal energy sent by the enabling apparatus 1 and received by the antenna in the transponder 10. However, the safety device 8 also may be equipped with its own power supply, for example, in the form of a battery or a small accumulator, which supplies the safety device 8 with the energy required for controlling operations.
When designed as an active transponder, the identification carrier 10, the transponder 10 is activated over a switching signal and then transmits its own signal. Such transponders require a source of energy or external supply of energy. The safety device 8 and the transponder 10 mounted on the weapon 6 may jointly use a common power supply.
In some examples, the safety device 8 may act upon the trigger mechanism (not shown) and/or the trigger rod (not shown) through the regulating element 9, which may be, for example, an electromagnetic regulating element. It also may be possible that the trigger rod be locked in place so that the trigger mechanism cannot be actuated. Alternatively, it may be possible to hook off the trigger rod on the actual trigger guard (not shown) or the knock-over lever (not shown) by means of the regulating element 9 so that the hammer (not shown) and trigger guard are uncoupled from each other.
As described above, the exchange of information (e.g., the identification 7, 11) may occur via the first antenna 5. In some example systems, there may be a plurality of first antennas 5a, 5b and 5c (or more). The first antenna 5 is coupled to the enabling apparatus 1 and is communicatively coupled simultaneously with several weapons 6 and/or users. However, though there is seemingly simultaneous communication with a plurality of identification carriers 7, 11, the exchange of identification 7, 11 information actually occurs in sequence. However, the processing of these cycles, i.e., subsequent signals proceeds so quickly that a user cannot perceive them. Thus, the enabling of several weapons is perceived as occurring at the time.
As shown in
Although certain example methods and apparatus have been described herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the appended claims either literally or under the doctrine of equivalents.
Number | Date | Country | Kind |
---|---|---|---|
10 2004 025 718.3 | May 2004 | DE | national |
This patent is a continuation of International Patent Application Serial No. PCT/EP2005/005674, filed May 25, 2005, which claims priority to German Patent Application 10 2004 025 718.3, filed on May 26, 2004, both of which are hereby incorporated herein by reference in their entireties.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/EP05/05674 | May 2005 | US |
Child | 11603783 | Nov 2006 | US |