Patent classifications
F41A17/066
SYSTEMS AND TECHNIQUES FOR DETERMINING WHETHER A USER IS HOLDING A GUN
The present disclosure provides systems and techniques for determining whether a user is holding a gun. The gun may include a sensor, such as a laser proximity sensor, a capacitive proximity sensor, a load cell, an accelerometer, or a biometric sensor, and the gun may determine whether a user is holding the gun based on an output generated by the sensor. A processor housed in the gun may identify activation of a proximity sensor, determine that a user is holding the gun based on the activation of the proximity sensor, and perform an action in response to determining that the user is holding the gun. The action performed by the processor may include performing a boot procedure, performing a health check procedure, visually indicating state information about the gun, audibly indicating state information about the gun, or tactilely indicating state information about the gun.
Firearm Analytics Device
The invention describes a system for or recording the usage of a firearm and helping a user during usage of the firearm using multiple sensors to gather various information. The system includes a plurality of sensors to record various usage and status data of the firearm. The system further includes a communication module communicatively coupled to the sensors. The communication module is further connected to a processor. The system further includes a memory, a clock chip and an information disseminating device that includes a communication port. The plurality of sensors are configured to gather various information about a firearm device that may be a pistol, a revolver, a gun, etc. after being attached to the firearm device. In addition to the operational information, some of the sensors out of the plurality of sensors may gather information about surrounding environment of the firearm like lighting conditions, wind flow etc. to help a user of the firearm device to use it efficiently.
Firearm with User Authentication to Remove or Add Components
A method authenticates a user before the user can remove or attach a component to a firearm. When the user is authenticated, the user can remove or attach a component to the firearm. The firearm prevents the removal or attachment of the component when the user is not authenticated.
SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING VIDEO SHOOTING GUNS AND PERSONAL SAFETY MANAGEMENT APPLICATIONS
In accordance with disclosed embodiments, there are provided systems, methods, and apparatuses for implementing video shooting guns and personal safety management applications. An exemplary personal safety device may include, for example, a processor and a memory to execute instructions; a rechargeable battery to electrically power the personal safety device; a front facing video camera to capture video data of a scene anterior to a front face of the personal safety device; a rear facing video camera to capture video data of a scene posterior to a rear of the personal safety device; an audio capture device to capture audio data from an environment within which the personal safety device is to operate; a trigger to initiate recording of the front facing video camera, the rear facing video camera, and the audio capture device when triggered by an operator of the personal safety device; and a transceiver to transmit the recorded video data from the front and rear cameras and the captured audio data to a remote location over a network. According to another embodiment, a holster operates in conjunction with a body camera to activate audio and video capture and streaming upon removal of a firearm from the holster. Other related embodiments are disclosed.
SYSTEM AND METHOD FOR SMART WEAPON IMPLEMENTATION AND DEPLOYMENT
A weapon is equipped with processing capabilities and can include, inter alia, communication technology, geographic positioning systems, a camera, memory and the ability to enable or disable the weapon remotely. Through the application of various protocols (e.g., access, monitor, control, programming), a weapon can be designated for one or more authorized users, and will not operate when not being used by an authorized user. Other implementations include smart ammunition that can also be programmed for a specific user, or more preferably for a specific weapon, such that the weapon and/or the ammunition would not work without the other, and only by the registered authorized user of the same.
Trigger lock
A trigger lock that can be mounted to the trigger guard of a handheld firearm. The trigger lock has a cover assembly displaceably mounted to a lock housing assembly. The cover assembly is displaceable between a locked position and an unlocked position. A mount adapter is removeably mated to a housing body within the lock housing assembly. The removeable mount adapter has a mount surface shaped to correspond with the outer surface of the trigger guard, allowing the trigger lock to be used on various makes and models of firearms. The trigger lock includes a locking means which in one embodiment has a lock rotor with a camming surface to displace one or more locking members into the cover assembly.
Remote control weapon lock
A battery-powered trigger-locking device, which is configured to be disposed on a gun with a trigger for firing, includes a data receiver, a data memory and a logic device for determining whether data received by the receiver is the same, or substantially the same, as data stored in the memory. If a data match is indicated, the logic device causes an electromagnetic device to move a trigger-locking member to an unlocked position, permitting the gun to be fired. A separate electronic gun key is provided to transmit gun unlock data to the data receiver of the trigger-locking device. This gun unlock data may be a password, a long pseudo-random number or biologic data identifying the gun owner or some other person who is licensed or otherwise authorized to fire the gun.
Adaptable Gun Safety System
A firearm with identification, safety system, preventing use by an unauthorized user. The firearm includes a scanner capable of scanning a middle and ring finger on the grip of the gun; a memory chip means for means for storing data representative of at least one fingerprint; a microprocessor connected to said scanner and said memory chip for receiving and transmitting said data, a motor means for keeping metal plate position behind the trigger until said microprocessor authenticates said fingerprint with said data; a USB port provided as an electronic interface between the microprocessor and provided preprogrammed handdrive to utilize administrative and programming function; an external computer access which is used to enhance future programing and reset the microprocessor; a power battery unit means operatively connected to said system and act as a power source; and indicator means operatively connected to said power battery for indicating low battery condition.
Trigger lock
A trigger lock that can be mounted to the trigger guard of a handheld firearm. The trigger lock has a cover assembly displaceably mounted to a lock housing assembly. The cover assembly is displaceable between a locked position and an unlocked position. A mount adapter is removeably mated to a housing body within the lock housing assembly. The removeable mount adapter has a mount surface shaped to correspond with the outer surface of the trigger guard, allowing the trigger lock to be used on various makes and models of firearms. The trigger lock includes a locking means which in one embodiment has a lock rotor with a camming surface to displace one or more locking members into the cover assembly.
USER AUTHENTICATION AT AN ELECTROMECHANICAL GUN
The present disclosure provides systems and techniques for authenticating a user at gun. The gun may include an authentication manager capable of implementing logic, processing signals, or executing instructions. The authentication manager may receive first query data from a first authentication sensor of the gun, receive second query data from a second authentication sensor of the gun, perform an authentication procedure to determine whether the first query data or the second query data matches enrollment data, where a match is determined based on the first query data or the second query data and the enrollment data satisfying a similarity threshold. The authentication manager may determine that the user is authorized to operate the gun and transmit a signal in response to the determining that the user is authorized to operate the gun. The signal may cause the gun to enter an active state which allows the gun to be fired.