Method and system for securing firearms

ABSTRACT

System for securing firearms and methods for making and using the same.

TECHNICAL FIELD

The disclosed embodiments relate generally to firearms safety, and in particular to methods and systems for securing firearms.

BACKGROUND

Firearms, in particular handguns, are often at risk of being used by unauthorized people, including children. There are over 50 million households in the United States, which have at least one licensed weapon in use. With limited access to smarter gun securing technologies, each year over 1,400 American children succumb to injuries and deaths due to accidental gun violence. Accidental deaths and injuries due to shooting remain a prevalent problem in society. Each year over 1.4 million weapons are stolen in the United States, which leads to their misuse. On average, over 30 officers in law enforcement are victims of gun theft per year in the United States; moreover, in 2016 alone three officers were killed with their own weapon. As a result, it has long been desired to implement a security system and methodology for guns that will help prevent accidental shootings as well as unauthorized usage of guns, while allowing authorized users to operate their guns in a convenient and lawful manner without being hampered by the technology being employed.

Thus, the present disclosure provides a secure intelligent firearms system and methodology that addresses these long felt needs and provides various layers of safety that reliably secure the lawful usage of the firearm.

BRIEF DESCRIPTION OF THE DRAWING

FIG. 1 is an illustration of a preferred embodiment of the secure intelligent firearms system showing a combination of a smart holster and smart gun attachment.

FIG. 2 is an illustration of an exemplary use case of the smart holster shown in FIG. 1.

FIG. 3 is an exploded view of the preferred embodiment of the smart holster shown in FIG. 2.

FIG. 4 is a cutaway view of a Glock-26 gun showing the location of the control system for the smart gun.

FIG. 5 is a section view of an embodiment of the gun with a locking attachment installed.

FIG. 6 is a general system block diagram of the preferred embodiment of the secure intelligent firearms system of FIG. 1.

FIG. 7 is a general system block diagram of an alternative embodiment of the secure intelligent firearms system of FIG. 1.

FIG. 8 is an exemplary drawing of an embodiment of a printed circuit board in the holster of the secure intelligent firearms system of FIG. 1.

FIG. 9 is an overall block diagram of the control system utilized in the gun of the preferred embodiment of the secure intelligent firearms system of FIG. 1.

FIG. 10 is an overall block diagram of the control system utilized in the holster of the preferred embodiment of the secure intelligent firearms system of FIG. 1.

FIG. 11 is a flowchart of the standard holster lock processes of the preferred embodiment

FIG. 12 is a flowchart of optional features of the preferred embodiment.

FIG. 13 is a flowchart of additional optional features of the preferred embodiment.

FIG. 14 is a flowchart of further additional optional features of the preferred embodiment.

FIG. 15 shows a cutaway view of the smart holster and the smart gun of FIG. 1, wherein the smart holster locks the smart gun.

FIG. 16 shows a cutaway view of the smart holster and the smart gun of FIG. 1, wherein the smart holster unlocks the smart gun.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The disclosed embodiments provide a secure intelligent firearms system employing varying levels of security that may be configured by the user. The system uses a smart holster, and a smart gun, or a combination thereof. In one embodiment, the smart holster and the smart gun can interoperate with each other to provide one or more varying levels of security without sacrificing convenience.

Each of the smart holster and the carry-on module can have a built-in control modules and various sensors that, when integrated, form the control system of the device. The smart holster includes a portable, unbreakable holster that covers the firing mechanism of the gun. The portable and unbreakable holster can be integrated with a hierarchal automatic control system embedded in the holster that identifies an authorized user by one or more means and releases the gun from the smart holster after the identification process. In one embodiment, the smart holster will have a locking mechanism that prevents a holstered gun from being removed from the holster by an unauthorized user. The locking mechanism is controlled by holster control circuitry that may require detection of an authorized fingerprint from a finger placed on the smart holster, for example.

Additionally and/or alternatively, an active radio frequency (RF) identification system may be employed. In one embodiment, the RF identification system can supplement the fingerprint authorization (e.g. being a backup if fingerprint authorization is inconclusive).

Additionally and/or alternatively, voice recognition can be used with radio frequency messaging techniques to authorize the user additional levels of security.

Additionally and/or alternatively, a mechanical override can be used to release the gun from the holster in the event of an electronic malfunction. This override can incorporate a self-destruction process making it void. For example, the mechanical override can include a lock that will disable the locking mechanism. The lock can authorize a user by means of a pattern engaged unlocking mechanism. The pattern can be set by the user prior to setup. The mechanical override lock can takes a user's pattern and can disable the locking mechanism within the smart holster.

The smart holster used to hold the gun/firearm can employ one or more security methodologies to ensure authorized use. In one embodiment, the smart holster will have a locking mechanism that prevents the gun/firearm from being withdrawn from the holster by an unauthorized user. To block the gun from being removed from the holster, the locking attachment contains a stopper, which is placed between the trigger guard and the trigger. In another embodiment, the smart holster contains a mechanical lever that latches onto the ejector port of the gun/firearm. The smart holster locking mechanism is controlled by a control circuitry that may require detection of an authorized fingerprint from a finger placed on the holster. In one example, fingerprint detection can be used in conjunction with a radio frequency identification (RFID) system to supplement the fingerprint authorization.

Additionally and/or alternatively, the gun, the carry-on module and/or the holster can be in communication with a smartphone application. The smartphone application can display the confidence interval setting for the fingerprint sensor. Moreover, the battery power and time-to-recharge for the gun and the holster are indicated and notifications will be prompted by the smartphone and/or smart watch and/or computer through Bluetooth Low Energy (BLE) communication protocol.

In an alternative embodiment, a carry-on module can be similar to a badge or key-chain. Voice of the authorized user can be used to activate the holster-gun locking mechanism via the carry-one module. Additionally and/or alternatively, a combination of proximity and voice recognition for the unlocking the gun can be used. Advantageously, maximum security can be derived when using the smart holster is in conjunction with the wearable/carry-on module. The carry on module can include a microcontroller with BLE and/or RF capabilities. Additionally and/or alternatively, a battery can be housed within the carry on module. Additionally and/or alternatively, a microphone can be housed within the carry on module. The carry on module can be able to communicate with a user mobile device and/or with the smart holster wirelessly. The microcontroller reads voice frequencies and send signal to actuate mechanical locking mechanism.

FIG. 1 is an illustration of a preferred embodiment of the secure intelligent firearms system 100 showing a combination of a smart holster 102. A controller housing 110 is adapted from a pre-existing void in the handle of the gun 104, which is used to encase the control circuitry 401 as shown in FIG. 4. A holster fingerprint detector 114 is strategically located on the smart holster 102 to make it easy for the user to place his finger thereupon in order to obtain authorization for accessing the smart gun 104 from the smart holster 102. A pair of LED lights 116 are also shown on the smart holster 102 which are used for visual indicators to the user (e.g. authorized or unauthorized). A holster belt 112 is affixed to the smart holster 102, and a standard magazine 106 can be inserted into the smart gun 104. FIG. 1 shows a pressure sensor 108 affixed to the handle of the gun 104, which can, for example, be embodied by a force sensitive resistor (FSR).

FIG. 2 is an illustration of a rear (inside) view of the smart holster 102 of FIG. 1. A solenoid 202 is located as shown on the rear of the holster, and operates with a mechanical configuration 204 within the holster to release the smart gun 104 from the holster after authorization for access of the gun is obtained as described below. Charging port 206 (e.g. a micro-USB port) is provided in order to charge the internal battery that powers the control circuitry (shown in FIG. 8) of the smart holster 102. Housing 208 is provided to encase the battery as well as a microcontroller and related circuitry utilized for authorization and release of the gun 104 (shown in FIG. 1) from the smart holster 102 (as shown in FIG. 8). FIG. 3 is a perspective view of the preferred embodiment of the smart holster shown in FIG. 2.

Upon electric signal from controller (or microcontroller) 802 based on authorization, a servo motor connected rotates 90 degrees at maximum speed. As the motor rotates, the pin attached to the motor and having a length of approx. 1″ turns a helical gear which allows motion to translate perpendicularly. The gear turns with the same ratio as the motor and is connected to the titanium stopper. The stopper is therefore dropped from position 1 (90 degrees) (shown in FIG. 15) to position 2 (180 degrees) (shown in FIG. 16) within a prescribed time frame based on motor specification and electric current/voltage provided.

In one embodiment, the gun locks into the holster and remains locked until a user chooses to authorize himself via fingerprint scanner and/or via mechanical override pattern padlock. The gun can lock into the holster and remain locked because, for example, a lever within the holster can latch onto the ejector port of the gun. The latch can release upon activation via fingerprint scanner and/or via mechanical override locking disabling. In one example, a steel lever within the holster can latch onto the ejection port of the firearm. A spring on one side of the lever can pull the one side of the lever towards the holster which can pushes the other side of the lever up against the firearm ejection port when the firearm is fully within the holster. To unlock, a linear actuator can retract and pull the lever, opposite to the spring, which pulls on the spring.

In another embodiment, the mechanical locking system can initiate when the RF in the holster detects the RF in the gun attachment passively. When the two RF's are within proximity, a signal can be sent to the microcontroller to actuate the locking mechanism.

In yet another embodiment, the locking mechanism can initiate when a pressure detection is felt by a pressure pad within the holster. When the gun is within the holster, pressure is detected by the pressure detecting sensor. A signal can be sent to the microcontroller. The microcontroller can initiate the actuation of the locking mechanism.

In yet another embodiment, the locking mechanism can initiate when the fingerprint scanner detects presence of the fingerprint for a predetermined duration. For example, after the gun is positioned into the holster, the user can press the finger on the finger print scanner for the predetermined duration. A signal can be sent to the microcontroller. The microcontroller can initiate the actuation of the locking mechanism.

FIG. 4 is a cutaway view of a gun 402 that can operate with the smart holster in accordance with the preferred embodiment. The exemplary gun 402 can include a Glock-26 gun that may be readily adapted in order to operate with the smart holster.

FIG. 5 is a cutaway view of the gun with a locking attachment 502 installed. The locking attachment 502 shown in FIG. 5 is preferably an attachable, permanent device. Military grade sealant will be used for installation onto the gun (e.g. 3M Scotch-Weld Epoxy Adhesive 1751). This attachable locking attachment 502 may for example be made from nylon with electronic and mechanical components within. A gear/spring assembly maneuvers a stopper behind trigger when in the locked mode. The locking mechanism may be made from aluminum 7075-T6, which is a very high strength material used for highly stressed structural parts (e.g. used in aerospace applications).

The Attachment 502 can be an additional security method to be attached to the gun. This embodiment can lock the gun to prevent the use of it from an unauthorized person. The attachment could have a biometric identification system, a control circuitry, a mechanical locking system, and/or a battery.

When using the attachment 502, the gun can be unlocked through the control system via the biometric identification system, a voice recognition system, and/or an RFID system.

The attachment 502 can be used as a part of the Gun Security System. For example, the attachment 502 can be integrated to the gun circuitry providing a complete control of the gun sensors and the locking system, in addition to communication with the computer or cellphone.

Therefore, the user of the system has the option to combine the different security methods based on the need or preferences. For example, the user can use a standalone gun. The standalone gun can have functions including, for example, access to information about the status of the gun through pressure sensors, accelerometers, round counting, and/or GPS.

In another example, the gun can be used with the Attachment 502 to provide a locking system to prevent the unauthorized use of the gun.

In another example, the gun can be used with holster to provide the functionalities of the standalone gun plus locking system while the gun is in the holster. If the gun is using the attachment it can also be placed inside the holster, and the control system can activate the holster's locking system instead of, and/or in addition to, the attachment's locking system.

FIG. 6 is a general system block diagram of the preferred embodiment of the secure intelligent firearms system of FIG. 1. Various components of the system are shown here, including the smart holster 102 and gun 104 of FIG. 1. As described herein, the smart holster 102 is a portable, unbreakable holster that locks the gun inside, integrated to a built-in control module (shown in FIG. 8), sensors, and/or identification technologies. A locking accessory 502 is an external fixable attachment for the gun that blocks use of the trigger from the outside of the gun, integrated to a built-in control module, sensors, and identification technologies. The smart holster and/or gun combination may utilize communications services such as a Global System for Mobile Communications (GSM) connection 608 in order to communicate with a desktop computer 610 (or in the alternative a portable device such as a tablet or smartphone 612, as shown). An identification card 602 may be used to house an RFID chip 604 for identification purposes. In the alternative, the RFID chip 604 may be integrated with a wearable device such as a smartwatch or the like.

FIG. 9 is an overall block diagram of the control system utilized in the gun of the preferred embodiment of the secure intelligent firearms system of FIG. 1. A microcontroller 702 is intraoperative with sensors 710 (e.g. fingerprint). The microcontroller 702 can execute instruction that is stored on a memory (not shown). The GSM module 720 is connected to the microcontroller 702 and communicates via existing communications channel 608 with a user interface on a desktop computer 610 and/or handheld computer 612. A GPS module 704 may be used if desired for generating location coordinates of the gun. Light connection 716 may be used to control one or more LEDs on the gun to provide status, warning lights, etc. A battery 714 is also shown, which is rechargeable and which is used to provide portable power to the control circuitry of the gun. Debugging port 718 is provided to allow external access to the control circuitry 700 for debugging, monitoring, and other purposes.

FIG. 10 is an overall block diagram of the control system utilized in the holster of the preferred embodiment of the secure intelligent firearms system of FIG. 1. A microcontroller 802 is intraoperative with a fingerprint sensor 804. The microcontroller 802 can execute instructions that are stored on a memory (not shown). A locking mechanism 812 is also shown as being attached to the microcontroller 802, which may for example be a solenoid 202 as shown in FIG. 2 and that will be used with a mechanical configuration to prevent unauthorized removal of a gun from the holster. An RF module 814 is provided for external wireless communications if desired. Light connection 808 may be used to control one or more LED lights 116 (shown in FIG. 1) on the holster to provide status, warning lights, etc. A battery 810 is also shown, which is rechargeable and which is used to provide portable power to the control circuitry of the smart holster. Debugging port 816 is provided to allow external access to the control circuitry 800 for debugging, monitoring, and other purposes.

The flowcharts of FIGS. 11-14 describe the functionality of the various security features of the intelligent firearms system and are now explained in detail.

In FIG. 11, the standard holster lock processes are illustrated. At step 902, placement of a finger by a user on the holster fingerprint detector 114 is sensed. That is, the user must first place his finger on the holster fingerprint detector 114 in order to withdraw the gun 104 from the locked smart holster 102. The holster fingerprint detector 114 can operate in any suitable manner, and may require the user's index finger or any other finger as may be desired. The user will have previously registered his fingerprint(s) with the holster during an initialization process. This may be similar, for example, to the fingerprint registration process utilized on current smartphones such as the IPHONE/Android/Windows.

The fingerprint analysis will then be executed by processing circuitry 802 in any suitable manner. The results of the fingerprint detection process that is executed as the user places his finger on the detector 114 may be one of three possibilities; a no-confidence identification match, a high-confidence identification match, or a low confidence identification match.

The fingerprint sensor 804 (shown in FIG. 10) takes an image and sends it to microcontroller 802 for comparison with a stored image. The microcontroller 802 comparison analyzes the differences in ridge and valley features within fingerprint, as is known in the art, by utilizing, for example, approximately hundreds of points to compare between input image and stored image.

The probability that the value of a parameter falls within a specified range of values is known as the confidence interval of the fingerprint sensor. Usually the user can set the confidence level based on the level of security required. For example, maximum confidence can compare more points, and minimum confidence can compare less points but will compute more quickly.

To actuate the unlocking mechanism by analyzing fingerprint, a fingerprint from the user can be inputted by applying the finger to the sensor. The image sensor within the fingerprint scanner takes a detailed image of the ridges and valleys of the user's fingerprint. The image of the fingerprint is translated into a biometric message in the form of a signal. The image is translated into an encoded message with multiple points of interest depending on set confidence level which can be custom to the user's preference. The signal is then sent to the microprocessor for comparison. The fingerprint scanner sends encoded message to the controller to be analyzed based on stored information that was recorded during an enrollment and initialization process. The processor compares the encoded message with stored information within the memory of the controller. The controller then compares points of interest with images that were stored during enrollment and initialization. The fingerprint analysis will then be executed by processing circuitry designed within the microcontroller. The results of the fingerprint detection process that is executed as the user places his finger on the detector may be one of three possibilities; a no-confidence identification match, a high-confidence identification match, or a low confidence identification match. Criteria of no-confidence identification match, high-confidence identification match and/or low-confidence match can be preset based on the level of security required.

A no-confidence identification match will occur when the detected fingerprint data simply does not match the stored fingerprint data that has been pre-registered with the holster. If this occurs at step 904, then the user is deemed to be unauthorized at step 912 and the holster remains locked so that the gun is inaccessible. This authorization failure may be stored in local memory, and an optional failure alarm (audible and/or visual using LED lights 116) may be triggered.

A high-confidence identification match will occur when the detected fingerprint data substantially matches the stored fingerprint data that has been pre-registered with the holster. If this occurs at step 908, then the user is deemed to be authorized at step 918 and the holster is unlocked so that the gun is accessible. For example, the solenoid 202 may be activated to release the gun from the holster. This authorization success may be stored in local memory, and an optional success signal (audible and/or visual using LED lights 116) may be triggered.

Another possibility is for a low-confidence match to occur at step 906, which happens when the results of the fingerprint analysis are essentially indeterminate—the user has been declared neither authorized nor unauthorized based solely on the fingerprint analysis. If this occurs then a secondary test can be employed to ascertain if the user is authorized. At step 910, the presence of an RFID chip will be sensed by an RFID detector in the holster. The RFID chip may for example be integrated with an ID card 602 (shown in FIG. 6) that is required to be carried by the user in proximity of the holster, or it may be integrated into a wearable device such as a smartwatch, etc. As an alternative to RFID, other proximity-sensing methodologies may be employed for this purpose. At step 914, if the RFID chip is not sensed as being present, then it is assumed that the user is unauthorized at step 912 and the holster remains locked so that the gun is inaccessible. This authorization failure may be stored in local memory, and an optional failure alarm (audible and/or visual using LED lights 116) may be triggered.

If, however, the RFID chip is sensed as being present at step 916, then it is assumed that the user is authorized at step 918 and the holster is unlocked by activating the solenoid so that the gun is accessible. This authorization success may be stored in local memory, and an optional success signal (audible and/or visual using LED lights 116) may be triggered.

The degree of confidence that may result from the fingerprint analysis leading to execution of steps 904, 906 or 908 may be programmed by the system designer as desired. For example, the system designer may mandate that a very high degree of confidence of the fingerprint scan must be present in order to authorize the user at step 918. Optionally, this may be modified by an authorized user if desired in order to ensure accuracy of the methodology.

In the event that the user has been authorized at step 918 and the holster is unlocked so that the gun is accessible, then several optional features may be employed at step 920.

Although FIG. 11 shows one exemplary security hierarchy of fingerprint and RFID, any security hierarchy can be selected, preset and used, without limitation. For example, the RFID can be used to determine whether the user is authorized, and fingerprint detection can be used upon determining that the user does not possess the RFID chip. In another example, the voice recognition can be used prior to using fingerprint and/or RFID. The radio frequency can be constantly searching for the compatible ID. In one example, both authorization techniques, including fingerprint and RFID, can be used in conjunction to supplement each other to avoid electronic lagging.

With reference to FIG. 12, at step 1002 a GPS module 704 (shown in FIG. 7) may be active. If the GPS module 704 is active, the location of the gun may be determined at step 1004. In addition, a holster screen display (not shown) may be active at step 1006, and the bullet count may be made available at step 1008.

If desired, a standard gun may be used with the smart holster described above, so that authorization of the user via the smart holster technology will release the gun to the user and it may then be fired at will as in the prior art. In another embodiment, a smart gun is used so that additional layers of security are realized. Thus, use of a smart gun provides optional features that are described at FIG. 13. At step 1104, force may be detected on the gun grip, and then at step 1108 the gun trigger lock is made inactive rendering the gun is fireable. This ensures that a person is holding the gun with his hand in order to fire, thus preventing firing when the gun is dropped or otherwise not being held by a user.

However, the once force is detected to have been removed, at 1110, from the grip by the FSR 108 (or if force has never been detected by the FSR at step 1106), then at step 1112 the gun trigger lock is active and the further authorization is required. This further authorization may take the form of a secondary fingerprint scanner located on the gun, which may be detected and analyzed at step 1114. As described below, this process may be similar to the fingerprint analysis described above for the holster fingerprint detector.

Thus, with reference to FIG. 14, at step 1114, placement of a finger by a user on the secondary (gun) fingerprint detector is sensed. That is, the user can place his finger on the secondary fingerprint detector in order to acquire further authorization to use the gun. The secondary fingerprint detector can operate in any suitable manner, and may require the user's index finger or any other finger as may be desired. The user will have previously registered his fingerprint(s) during an enrollment and initialization process. This may be similar, for example, to the fingerprint registration process utilized on current smartphones such as the IPHONE.

The fingerprint analysis will then be executed by processing circuitry 702 in the gun. The results of the fingerprint detection process that is executed as the user places his finger on the detector may be one of three possibilities; a no-confidence identification match, a high-confidence identification match, or a low confidence identification match.

As described above, a no-confidence identification match will occur when the detected fingerprint data simply does not match the stored fingerprint data that has been pre-registered. If this occurs at step 1202, then the user is deemed to be unauthorized at step 1210 and the gun trigger lock remains active so that the gun is not fireable. This authorization failure may be stored in local memory, and an optional failure alarm (audible and/or visual using LED lights may be triggered.

A high-confidence identification match will occur when the detected fingerprint data substantially matches the stored fingerprint data that has been pre-registered. If this occurs at step 1206, then the user is deemed to be authorized at step 1216 and the trigger lock is made inactive so that the gun is fireable. This authorization success may be stored in local memory (not shown), and an optional success signal (audible and/or visual using LED lights) may be triggered.

Another possibility is for a low-confidence match to occur at step 1204, which means that the results of the fingerprint analysis are essentially indeterminate—the user has been declared neither authorized nor unauthorized based solely on the fingerprint analysis. If this occurs then a secondary test will be employed to ascertain if the user is authorized. At step 1208, the presence of an RFID chip will be sensed by an RFID detector in the gun. The RFID chip may for example be integrated with an ID card that is required to be carried by the user in proximity of the gun, or it may be integrated into a wearable device such as a smartwatch, etc. This RFID chip may be the same as the one utilized for holster authorization as described above, or a different one may be required. As with the holster, any proximity-sensing methodology may be employed for this purpose. At step 1212, if the RFID chip is not sensed as being present, then it is assumed that the user is unauthorized at step 1210 and the gun trigger lock remains active so that the gun is not fireable. This authorization failure may be stored in local memory, and an optional failure alarm (audible and/or visual using LED lights) may be triggered.

If, however, the RFID chip is sensed as being present at step 1214, then it is assumed that the user is authorized at step 1216 and the trigger lock is made inactive so that the gun is fireable. This authorization success may be stored in local memory, and an optional success signal (audible and/or visual using LED lights) may be triggered.

The degree of confidence that may result from the fingerprint analysis leading to execution of steps 1202, 1204, and 1206 may be programmed by the system designer as desired. For example, the system designer may mandate that a very high degree of confidence of the fingerprint scan must be present in order to authorize the user at step 1216. This may be modified by an authorized user if desired in order to ensure accuracy of the methodology.

Status of the holster and/or gun can be signaled to the user. In its basic configuration, the control system installed in the smart holster provides the user with the following information about the status of the gun when this is unattended.

Additionally and/or alternatively, the control module and the sensors can allow sending alarms to the user's phone or a website providing information about the status of the gun and alerting the owner when the gun is moved from its storage location (using the GPS function described above). This interface would utilize the GSM features described above. The human-gun interface could monitor more than one gun associated to the user.

Additionally and/or alternatively, the gun can have a round counting function. One of the sensors installed in the gun detects when the bullet goes from the last position of the magazine to the loading position. This information is used by the monitoring algorithm to provide the user with information about bullets inventory, times for maintenance of the gun and the option to have a history ledger of the gun.

Additionally and/or alternatively, setup options of the holster and/or gun can be selected by the user. The control system functionalities could be set up by the user through the human-gun interface. The user can select what kind of alarms and when would like to receive them, as well as, activate or deactivate the round counting.

The disclosed system consists of biometric authorization to access one's firearm. With the integration of radio frequency devices, such as low energy bluetooth provided in phones, the biometrics could be bypassed to access the firearm in the case of a low-confidence authorization. This concept allows gun owners to access their firearm even if the biometrics don't read their print 100%. The concept of a biometric storage device is disruptive to the gun safe market due to the ability to keep firearm secure in different locations. The flexibility is something that cannot be established with current technology. The system architecture which incorporates a hierarchy of system preferences to access the firearm is unlike any device on the market. The ability to monitor firearm activity is also another feature that brings about disruptive technology to many different markets including insurance and network security.

Today's solution for firearm storage is inconvenient, can cost a person their life, and indirectly causes negligence in its methods of storage. The G3S Model 1.0 offers gun owners a more convenient way of storing weapons at home without sacrificing reliability of their firearm. Based on customer discovery efforts, almost all gun owners say they have secured their weapons safely at home. At the same time, most gun owners worry greatly about home intrusion. Although a gun owner will secure their weapons in a safe, the safe, for the most part, is large and must be stationed in a secure area, such as the basement or shed. It is virtually impossible for gun owners to access their firearm in the event of an emergency. Therefore, through customer discovery interviews, it was found that most gun owners solve this problem by storing their most reliable and smallest weapon in their bedroom night stand or dresser drawer. But, this method of storage leaves weapons vulnerable to theft and unauthorized use in the absence of the owner. Many gun owners understand this risk they are taking and don't have a way to reduce this risk of keeping unsecure guns at home. Other methods they could take are using gun locks, which require a key, or a smaller gun box that they can keep in their bedroom. Companies such as Vaultek provide gun owners with smaller, more flexible ways of storage using fingerprint technology, electronic pin pad and standard keys to gain access. The total market size for gun locking devices could be assumed to be as large if not larger than the market size for handguns. With this assumption in mind, we can layout the analysis for gun locking devices. Biometric gun locking devices are still an emerging technology and don't have a major market share. The economic benefit from the adoption of this technology can be significant with insurance companies managing risk. The G3S has the ability to monitor firearm activity. The user will be able to track when and where the firearm was unlocked and for how long. With this information, insurance companies can conduct risk analysis and measure how active of a firearm user one can is. After information is collected by insurance companies, they will be able to calculate the risk of certain individuals who own this technology. By managing the risk of their customers, insurance companies will have the ability to reduce premiums for users to prove low risk behavior. The gun owner will have incentive to buy this type of safety device because they will be able to prove they are low risk users and therefore receive lower monthly insurance payments. On the other side, insurance companies will want to insure users with this product so they can prove less risk on their end.

The concept of hierarchical systems of authorization is the innovation that will disrupt the firearm industry. Arising but fundamental challenges include: 1. robustness and reliability. The owner of a firearm needs weapons for one reason, self-defense. It is imperative, from customer observation, that the firearm must be accessible at any time in any location. On the other hand, many firearm owner are concerned that their firearm is too accessible such that their children may have a way of obtaining it. Smart guns do help allow users to access firearms quickly, in the case of an emergency, and also allow users to secure weapons safely from unauthorized users, such as children. The problems of smart guns are the reasons for smart holsters. Tampering with the internal mechanisms of firearms can cause significant reliability issues. More importantly, fingerprint sensor, pressure sensors, whichever device it may be to allow access, will always have some percent of failure. The challenges face by all smart gun developers is to make some device which is as reliable as a purely mechanical firearm. Electronics are inherently prone to failure but reducing the risk of failure will allow smart guns to prevail and cause “dumb guns” to become obsolete.

The system of hierarchical authorization reduces the failure of authorization. In moments of dire need, our system will not not allow access unlike a conventional fingerprint scanner may if ones hands are sweaty. Although the system includes fingerprint scanners as a method of authorization, there are three other systems that work in conjunction with fingerprint scanners to accept a user. The fingerprint sensor resides in the highest position of hierarchical preference of the microcontroller. Since fingerprints are widely known to be a unique identifier, like a personal seal, a fingerprint is an ideal solution to authenticate and differentiate the user of the firearm. According to Longitudinal study of fingerprint recognition, no significant change in friction ridge skin structure occurs over time. Fingerprint recognition distinguishes large numbers of individuals; a database of approximately 500 million are stored within Federal Bureau of Investigation. Optical sensor, for example, takes image of input and the MC receives image and compares with stored image. The MC analyzes the difference in ridge and valley within fingerprint, which utilizes approximately hundreds of points to compare between input image and stored image. The probability that the value of a parameter falls within a specified range of values is known as the confidence interval of the fingerprint sensor.

The hierarchical system is integrated based on the principle that fingerprint scanners function and authorize at certain confidence intervals. For example, maximum confidence will compare more points and minimum confidence will compare less points, but will compute more quickly. The user will have complete control of the confidence interval and can choose the system operating preference. More about this will be described in the technical description. The results of the fingerprint detection process that is executed as the user places his finger on the detector may be one of three possibilities; a no-confidence identification match, a high-confidence identification match, or a low confidence identification match. A high-confidence identification match will occur when the detected fingerprint data substantially matches the stored fingerprint data that has been pre-registered with the holster. If this occurs, then the user is deemed to be authorized and the holster is unlocked so that the gun is accessible. For example, the motor may be activated to release the gun from the holster. A no-confidence identification match will occur when the detected fingerprint data simply does not match the stored fingerprint data that has been pre-registered with the holster. If this occurs, then the user is deemed to be unauthorized and the holster remains locked so that the gun is inaccessible. Another possibility is for a low-confidence match to occur. This means that the results of the fingerprint analysis is essentially indeterminate—the user has been declared neither authorized or unauthorized based solely on the fingerprint analysis. In the case of an indeterminate analysis conducted by the fingerprint sensor, the system will look, instantaneously, to the next system in the hierarchy.

The proximity of the user can be determined using smartphone applications and low energy Bluetooth functionalities. Both systems can operate fine independently but, the biggest challenges emerge when trying to operate these two systems in sync with one another. Say, for instance, the user attempts to unlock his gun. The fingerprint is read when the user's hand touches the sensor. The sensor reads 75 points out of 100 points because his/her heart rates has increased and his/her glands are starting to perspire. The system validates that the user is attempting to obtain access to the gun but is showing indeterminate access by method of fingerprint authorization. The system acknowledges a low confidence entry and instantly begins to send a signal for bluetooth access. This distance has been set by the user, say 2 feet for arguments sake, and the system sends out the signal looking for reception by the authorized bluetooth device (ideally a smartphone). Keep in mind, in an emergency scenario, the user may not have their phone on their person and in that case, they will not be allowed access to the firearm. Fortunately, the third level of redundancy in the hierarchical system will grant access to the user if an indeterminate fingerprint sensor is read and a bluetooth receptor signal cannot be received. The system will also consists of a voice control module that gives users the advantage of accessing their firearm with their voice frequency. A preset recording of their voice will be logged into the system's database and will continually be learning from user's day to day activities. The user will pre-set their voice with different octaves and frequencies to assure the system can function swiftly in the case of an emergency.

The system operates as a hierarchy, where if one cannot be read, it will be able to be bypassed to the next level of authorization. The user will have the flexibility to choose which system takes precedence over the other. Additionally, the user will be able to have the ability to set our secure (how many data points to authorize) which will set the speed at which the system operates. With more data points read, more computing must be done, and more slowly the system will allow access. This preference can change based on the user, if they have children, if they live in a dangerous area, etc.

The last function that is essential to market adaptation is the mechanical override system. Supposed there is a case where the battery dies or and electronic malfunction occurs. The gun still must be able to be access by authorized users. Today, this method is done mechanically with keys, dials, and pattern locks. The system designed will allow mechanical override. This may be the way some users prefer to access their firearm. Others may find this to be a last resort and inconvenient for their everyday activities with guns. Either way, a redundant mechanical system is implemented to ensure access to firearms in any case.

The innovation of this technology does not stop at locking mechanism and hierarchical authorization systems. A device like this, at home, securing firearms, has the capability of transmitting valuable data that can potentially save lives. The data transfer aspect of this device can be explained further in the technical description section. But, users will have the ability to monitor their firearms at home. While away, in remote locations from their secured firearm, a user will be able to see the activity of the firearm and whether or not it is being taken or used or attempted to be used by an unauthorized user. The challenge here, will be securely transmitting data to the user over a network. The system within the device will have the capability to sync with the household wifi. When the user is away, they will be able to get information of their secured firearm through the wifi network. Due to privacy obstacles, users want a product they know will be secured, both physically and on the network. The unique way in which we develop the software will allow the data to transfer only on a closed system between the device and the users phone. If, for instance, data transmission is high priority, such as movement of device or unauthorized usage, then the software will open the system for emergency cases to the outside network

Our smart holster device is mobile and not to be confused with a vault or safe however, the controls system and actuators can be implemented on other products in the future. The device is able to collect activity datas such as firearm usage, safety status and many more. The system allows user identification, management of authorized users, configuration of the features, analysis of the collected data to anticipate or recommend user maintenance, replacement, and many more. Potentially, the collected data can be used by third party entities, such as insurance companies, for risk assessment to lower rates only under the user's term.

The smart holster device is a mobile firearm storage and monitoring system. Currently there are no holsters in the market able to secure a firearm using authentication available to purchase that contains electronics. There plenty of lockboxes, safes, or vaults that uses fingerprints or RFID tag however, the systems often fail to authenticate rapidly with reliability and the fingerprint and RFID tag work separately. There are also currently no holster that can track activity. Our smart holster device employs sensors and IoT chips controlled by an ARM processor. The proposed sensors are accelerometers, biometric identifiers, voice identifiers, Wi-Fi module, and Bluetooth or RFID or NFC. The selected biometric identifier sensor or radio frequency sensor will control an actuator (DC motor, servo motor, or solenoid) that is connected to a mechanism that will be locking and unlocking the firearm. While this system can work on its own, a user interface software will allow the user to fully use the device to its' full potential. The user interface will mainly provide battery status, locked or unlocked statuses and allows the user to remotely lock and unlock the device. Furthermore, the interface can also track data such as time stamping, usage, movements and even automatically lock or unlock after a period of time. The interface can also send push messages to the user's phone with texts or notifications on low battery level, someone touched the locked firearm, or maintenance of the device (like battery to be replaced) to ensure the best reliability. The main way to unlock the smart holster is to use the fingerprint sensor to authorize the user. However, fingerprint sensors are known not to be reliable when the user's fingerprint is wet, oily, dirty, or have gloves on. A capacitance fingerprint with ingress protection is used to reduce the chance of failing with wet, oily, or dirty fingers. However, relying on just the fingerprint sensor is not enough. This is where radio frequency comes in to detect whether or not the user is nearby or not. The user will have on a small ring, necklace, or any accessories that can be on the user at all time which a passive or active radio frequency signal that can be identified.

Currently, a fingerprint sensor and RF only exists as a separate entity. There is no authentication system that uses both fingerprint and RF together in the market. This is where development is required to marry the two sensors together. When the fingerprint fails to detect the user's fingerprint, it can automatically switch to the RF to identify the user. This control system will work simultaneously. In order to achieve this, the fingerprint sensor has to have a confidence level. The confidence level is a percentage that shows how similar the recently scanned image is compared to the registered image based on the sensors algorithm (optical, capacitive, or ultrasonic fingerprint sensor). The image is usually ridges of the user's fingerprint converted into data. With the confidence level, the processor can decide whether or not to switch to the RF chip to authorize the user. The user interface allows the user to adjust the confidence level to their liking. Every person's fingerprint is different and so is their day to day. Day to day meaning in the morning after showering or brushing teeth, their fingerprint is clearer than at the end of the day where their hands are not as clean. The interface will recommend the user do a fingerprint confidence calibration where it will register the percentage of their fully cleaned finger, dusty finger, and oily finger to set the most optimized confidence level. This system of bypassing the fingerprint to RF based on the confidence level is what we call a hierarchical system. If the fingerprint generates a confidence level above 80%, it will unlock. If the fingerprint generates below 50%, it will switch over to the RF to detect a signal to unlock. However, if the RF signal is weak and the fingerprint confidence level is below 50%, the device will not unlock. A third type of sensor can be used to actuate the selected motor using voice recognition. Voice recognition is reserved for emergencies when the user is unable to lock the device using fingerprint or presence of the RF tag. In the case of an electronic failure, a mechanical disengage system can unlock the device. The mechanical disengage uses a pattern lock or pattern key to release the locking pin. The pattern lock is set up by the user prior to locking the firearm and is completely separate from the electronic controls circuitry.

The smart holster device is made of a lightweight and durable material that can be used as a holster mounted on a belt, left on a furniture, or mounted into a bolted mount with attachments. The device's outer shell covers the firearm trigger to prevent to prevent authorization. The device is designed to withstand vibrations and prevent dust/liquid ingress (IP64 rating). The locking mechanism is designed to withstand external forces such as pulling. The device is also design to be tamper proof using tamper proof screws and seals. The dimensions of the device is an added thickness of approximately 2 inches of the firearm selected and is firearm specific. The length is not to exceed the length of the chosen firearm and the width is an added inch.

Privacy of the user data is also considered in this IoT device. User interface is designed in a way that allows the data it produces to never reach DNS servers. The user can enable privacy mode where the device will collect data and only be uploaded to the user interface installed to a smartphone using Bluetooth or NFC for analysis. However, important push information such as movement of the firearm, battery status or maintenance will be sent through the internet to the user's phone but the user has a choice to turn it off completely.

The disclosed embodiments are susceptible to various modifications and alternative forms, and specific examples thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the disclosed embodiments are not to be limited to the particular forms or methods disclosed, but to the contrary, the disclosed embodiments are to cover all modifications, equivalents, and alternatives. 

What is claimed is:
 1. A system for securing a firearm, comprising: a holster for storing a firearm; and a locking member coupled to said holster and configured to be in first or second positions, the first position locking the firearm in the holster and the second position unlocking the firearm from the holster; and a controller coupled to said holster and configured to determine an authorization status of a person proximal to said holster and to set the locking member in first or second positions based on the authorization status.
 2. The system of claim 1, further comprising a fingerprint sensor located on the holster and configured to detect a fingerprint of the person and to send the fingerprint to the controller, wherein the controller is configured to set the locking member in the first position upon determining that the person is not authorized based on the fingerprint.
 3. The system of claim 2, wherein the controller is configured to set the locking member in the second position upon determining that the person is authorized based on the fingerprint.
 4. The system of claim 1, wherein the controller is configured to wirelessly receive a signal transmitted from a device proximal to the holster and to determine the authorization status of the person based on the signal, wherein the controller is configured to set the locking member in the first position upon determining that the person is not authorized based on the signal.
 5. The system of claim 4, wherein the controller is configured to set the locking member in the second position upon determining that the person is authorized based on the signal.
 6. The system of claim 4, wherein the signal includes a Bluetooth signal transmitted from the device proximal to said holster.
 7. The system of claim 4, wherein said controller includes a voice recognition module configured to analyze a voice of the person to determine the authorization status of the person based on the voice, wherein the controller is configured to set the locking member in the first position upon determining that the person is not authorized based on the voice.
 8. The system of claim 7, wherein the controller is configured to set the locking member in the second position upon determining that the person is authorized based on the voice. 