Weapon control system

ABSTRACT

A firearm control system for a firearm authorized for use by a person having a validated identity comprises a firearm having a frame, barrel, firing mechanism and trigger. An interlock system is provided for enabling and disabling operation of the firearm, the interlock system being disposed on the frame and including a communications/control module, a trigger module operatively connected to the communication/control module, and operatively connected to the trigger to sense attempted operation of the trigger by a user and send signals to the communications/control module, and a firing mechanism module operatively connected to the communication/control module, and to the firing mechanism to enable or disable operation of the firing mechanism. The interlock system operates to enable and disable operation of the firearm based on signals sent to, and received from, the communications/control module.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims benefit of U.S. Provisional Application No. 61/804,345, filed Mar. 22, 2013, entitled WEAPON CONTROL SYSTEM (Atty. Dkt. No. VMPT-31662), which is herein incorporated by reference in its entirety.

TECHNICAL FIELD

The following disclosure relates to weapons/firearms, e.g., rifles and handguns, having a system for biometric user identification and authentication, and for methods of using same. More specifically, it relates to a firearm having an operational interlock utilizing a token-based biometrically enabled system for the continuous physical presence validation of the user.

BACKGROUND

In light of recent crimes involving firearms, namely, handguns and rifles, in schools and on school campuses, there is an ever-growing concern about the use of such weapons in these environments. A need therefore exists, for a firearm that is disabled from use in certain environments.

In other circumstances, injury or death may occur when a firearm is used by a child or other person that is not authorized to use the firearm. A need therefore exists, for a firearm that is disabled from use by anyone other than an authorized user.

The ability to positively identify an individual grows increasingly important with every passing day, particularly given the widespread proliferation of information system technology that permeates are daily lives. From the use of an ATM machine, to logging onto your favorite website on through Homeland Security initiatives, the ability to quickly, efficiently, and most of all, positively identify someone, while not overly intruding upon or burdening the person's daily life grows increasingly at odds with the very need to fulfill adequate identity validation.

Traditional identity validation or personal identification techniques are well understood and fall into three basic categories as further explained below.

The first category of identity validation/personal identification techniques is known as “What You Know”. This technique involves the act of conveying a piece of information that is personally known to an individual, which can be independently verified against a repository of such known information previously acquired from said individual who wishes to have their identity validated.

Pros of the “What You Know” technique include: i) something that is always in your possession and readily and conveniently available; and ii) cannot be easily stolen by an imposter.

Cons of the “What You Know” technique include: i) if forgotten, the valid individual is no longer able to validate their identity; ii) so-called “password cracking software” is now readily available on the Internet, often at little or no cost, rendering all but the most robust identity systems easily comprised; and iii) modern password security measures call for robust passwords NOT based upon your birthday, mother's maiden, and the like, which constitutes information that is often easily obtainable by imposters. Typically such robust passwords require a reasonably long string (8 or more characters) consisting of a random set of letters and numbers. The average person, unfortunately, has difficulty remembering “robust passwords” often leading people to write down their “robust passwords” making it readily accessible for easy referral—and unfortunately, often to imposters as well

The second category of identity validation/personal identification techniques is known as “What You Have”. This technique requires the person to possess on or in their physical person a tangible physical foreign object, such as a drivers license, an ID badge, or even chips that can be embedded just under the skin—all collectively and commonly known in the field of identity validation as a “token”. A token is intended to provide proof of identity by the mere physical possession of it by the person being validated.

Pros of the “What You Have” technique include: i) the token is usually small and portable in nature, easy to keep on your person; ii) depending on the technology being deployed, the token can deliver extremely robust device level validation that cannot be readily comprised; and iii) typically affords instant validation either via visual means or wireless electronic methods

Cons of the “What You Have” technique include: i) if the person being validated loses physical possession of the token they are no longer able to be validated—despite being the valid person; ii) if an imposter gains possession of the token, they can be falsely validated; and iii) if the token becomes damaged or otherwise unusable, the valid person is no longer able to validate their identity.

The third category of identity validation/personal identification techniques is known as “Who You Are”. This technique relies on one or more human physical and/or behavioral attributes of a given individual that can be measured accurately and with consistent repeatability. These attributes include but are not limited to fingerprints, iris scans, retinal scans, facial scans, vein scans or even such things as the manner in which a person may perform certain actions as in the manner of speaking words, phrases, typing or even physical act of walking—collectively referred to as biometrics.

Pros of the “Who You Are” technique include: i) it uses an inherent physical or behavioral attribute of a person's physical being—so it is always with the person and generally cannot be lost or misplaced; and ii) there is nothing to remember or lose or have an imposter guess or steal.

Cons of the “Who You Are” technique include: i) currently, most biometric technology ergonomics does not lend themselves well to ease and rapidity of use; and ii) depending on the security needs of a given environment, offset against the practicality of the identity validation frequency and environment specific requisite identification quality in many cases would simply rule out the use of biometrics on a continuous basis throughout the day due to the nature of a given biometric technology and the associated probability of false positives versus false negative tuning issues.

Further with respect to the “Who You Are” category of biometrically-enabled techniques, there are two basic processes that must take place in connection with a modern digital biometric identity management (BIM) system, namely, Identity Enrollment and Identity Verification. Each process is further described below.

Identity Enrollment is the process of providing and/or discovering personal information for a physical person who desires to enroll their identity into a given BIM system. Once the personal information has been gathered and satisfactorily processed and accepted into the BIM according to the BIM specific enrollment rules, said information is associated with the given person's biometric.

Identity Verification is the process of retrieving the identity of a person who wishes to identify themselves in order to gain access to a secure service and/or physical perimeter area. Identity verification is further broken down into two specific areas (subprocesses), namely, Personal Identity Determination and Personal Identity Authentication. Each subprocess is further described below.

Personal Identity Determination is the process (i.e., subprocess) by which a person supplies their biometric (finger scan, iris scan, etc.) which is then submitted to the BIM for a search—otherwise known as a “one to many” (i.e., “1:M”) lookup. In this environment, the identity of the person is not necessarily known up front, and is therefore determined solely from the supplied biometric. Such a method is usually very slow and can more likely lead to false positives or negatives. Most biometric searches do NOT lend themselves to 1:M lookup, with the exception of iris scanning which intrinsically is designed for 1:M lookup. For example, when certain popular television crime scene shows have the investigator performing a search of a finger print, in reality, such a process can take hours and even days.

Personal Identity Authentication is the process (i.e., subprocess) by which a person supplies an identity indicator as well as a biometric to the BIM. The identity indicator of the person may be one or more name, password, access code, PIN or other identifier that is linked to (i.e., associated with) the person's biometric in the BIM. In this environment, since the apparent identity of the person is known up front, the BIM can quickly determine if the biometric submitted for the person matches the identity indicator submitted, typically using a “one to one” (i.e., “1:1”) lookup or a “one to few” lookup. Such methods are usually much faster that a 1:M lookup and less likely to lead to false positives or negatives.

In highly secure physical perimeter security environments, such as might be found in airports, financial trading floors, pharmaceutical drug company laboratories, nuclear power plants, military facilities, and so on, there is need to reliably verify the identity of personnel as they initially gain access to a secure facility and as they ingress, egress and move about within secure perimeter environments within such facilities. Depending upon the level of security necessary in a given perimeter scenario, will often dictate a degree of compromise between the robustness of identity validation and physical presence detection and convenience and ease of use of same.

Since modern biometric systems continue to exhibit systemic ergonomic problems that inhibit widespread deployment, existing biometric technologies alone are not adequate to provide secure high speed identity validation on a continuous basis other than in the very low level security environments. It is well known, for example, that finger scanner based security is not very robust and can result in excessive false negatives or positives depending on the manner in which the finger scanner is configured. Iris scanning today represents the most robust and rapid biometric technology of all known biometric technologies, boasting statistically negligible level of false positives or negatives. However, given the state of modern iris scanning devices, namely a digital camera tuned to infrared frequencies, a person being validated must carefully and precisely position them self in front of the iris scan camera so an image of the iris image can be captured, a process that can be time consuming and frustrating—leading to an unwillingness to use the technology due to “inconvenience and hassle factors.”

A real world example of where robust biometrics would be ideal but are not currently practical is in a high security environment such as would be found at an airport where a variety of people work on premises on a daily basis—such as ticket agents, baggage handlers, airplane mechanics, food transport personnel and even TSA personnel who are most directly responsible for security. In all of the aforementioned circumstances, positive identification is mandatory to minimize security risks, not only to confirm someone's identity when they report for work, but to ensure said person does not access unauthorized areas—such as a food court employee wandering out to the tarmac where airplanes are being refueled and baggage is being loaded and unloaded. Equally important to preventing unauthorized space access, is to know when such accesses are attempted and by whom—knowing failed access attempts is equally important as knowing valid access attempts.

In virtually all instances other than emergencies, unauthorized physical access very likely can only mean ulterior motives ranging from crimes of theft on up through acts of terrorism that may involve the undetected smuggling of weapons or contraband onto a airplane. With many existing security measures in such environments, an imposter might need to don the appropriate uniform such as a baggage handler might wear, obtain an identity badge (and possibly alter it if it exhibited a photo of the legitimate employee) and possibly even obtain an access code to unlock certain electronically actuated doors or access points in order to gain unauthorized access to sensitive areas. Therefore, in an ideal world, iris scanning ideally could be deployed at these sensitive access points, but as a practical matter, due to the ergonomically inhibiting nature of this type of biometric technology, that by definition requires a pro-active interaction by the person being validated, tends to be impractical and therefore not a viable means of maintaining security in geographically sensitive areas.

SUMMARY

In one aspect, a firearm control system is provided for either the new manufacture or retrofit of existing firearms to support several features—an electronically controlled interlock system in the weapon that may be used to prevent the trigger from being pulled, and the use of GPS/Mobile/WiFi wireless communications that are used to determine the physical geographic location of the given firearm, such that if it is in a school and the carrier of the weapon is not authorized to be on the campus of the school (such as a student or an extraneous third party coming onto the campus) the Cloud-based service disarms or otherwise disables the weapon so that it may not be used.

In another aspect, a firearm control system uses biometrics to control the operation of a firearm, namely if you are not the registered user then it cannot be fired. In a preferred implementation, a biometrically-enabled token (“BET token” or “B.E.T.”) would be used, wherein the carrier of the controlled weapon would wear such a BET token (bracelet, ring, etc.) that would be validated via a biometrics and once so validated, would remain in constant communication with the weapon so the carrier could fire it. If the gun becomes separated by a certain (pre-determined) distance, then the gun becomes disabled and when back in range of the BET token it would become re-enabled. Furthermore, in the event the carrier of the weapon removes the BET token, it is immediately disabled and the weapon would automatically become disabled as well, and then to re-enable the weapon, the carrier would have to go through the re-enablement of the BET token and then the gun would be ready for use.

In yet another aspect, a firearm control system for a firearm authorized for use by a person having a validated identity, the system comprises a firearm having a frame, barrel, firing mechanism and trigger, the trigger being operatively connected to the firing mechanism such that selective operation of the trigger causes the firing mechanism to operate and fire the firearm. An interlock system is provided for enabling and disabling operation of the firearm, the interlock system being disposed on the frame and including a communications/control module, a trigger module operatively connected to the communication/control module to send and receive signals therebetween, and operatively connected to the trigger to sense attempted operation of the trigger by a user and send signals to the communications/control module, and a firing mechanism module operatively connected to the communication/control module to send and receive signals therebetween, and to the firing mechanism to enable or disable operation of the firing mechanism. The interlock system operates to enable and disable operation of the firearm based on signals sent to, and received from, the communications/control module.

In one embodiment, the communication/control module receives external signals indicative of current validated identity information and, upon receipt of signals from the trigger module, the communication/control module compares the current validated identity information to a predetermined validated identity of the authorized user stored in the interlock system, and sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the validated identities do not match.

In another embodiment, the communication/control module receives external signals indicative of a current geographic location of the firearm and, upon receipt of signals from the trigger module, the communication/control module compares the current geographic location to a list of prohibited locations stored in the interlock system, and the sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the current geographic location is a prohibited location.

In yet another embodiment, the firearm control system further comprises a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user. The BET includes a body and a BET communication/control module attached to the body. The BET communication/control module communicates with the communication/control module of the firearm to send signals indicative of current validated identity information.

In still another embodiment, the BET communication/control module communicates with the communication/control module of the firearm to send signals indicative of the distance between the BET token and the firearm.

In a further embodiment, the BET communication/control module communicates with the communication/control module of the firearm to send signals indicative that the BET token was removed from the authorized user.

In the security industry, two or more such methods, such as a pin number or password, when combined with a token or a biometric in a single identify validation session, is typically referred to as “two factor” or “multi factor” identification/authentication process.

In one aspect, an identity authentication system calls for at least a two factor identification/authentication process that in the preferred embodiment integrates the “Who You Are” and the “What You Have” methods of identify validation into a seamless identity validation and continuous physical presence validation system that provides a robust physical access entry point identity validation means to confirm one's identity followed by a continuous and equally robust means of confirming identity of the given person once within a controlled security perimeter while preventing ingress and egress by imposters attempting to gain unauthorized access or by authorized personnel once in a secure perimeter from either intentionally or unintentionally moving into restricted areas within the secure perimeter where the given person should not be able access.

In one embodiment, the system executes an appropriately robust identity validation method that would comprise any of the token (“What you have”) identity validation methods coupled with biometric validation (“Who you are”), at which time, assuming the person seeking access is indeed validated to the extent required by the security rules in place, a token is placed on their person in such a manner that once on the person, it is associated with the person so during subsequent times while in the secure perimeter, a person's legitimate presence can be validated purely by the act of having physical possession of the token.

There are also various types of tokens contemplated by the invention designed to offer differing degrees of personal presence validation security of the person in question predicated by the degree of security required in a given secure perimeter environment.

In one embodiment, a passive token is utilized, wherein the passive token requires the person in question to display it or otherwise actively present it to some sort of reader so that it may be read and validated against a database to validate the person's physical presence.

In another embodiment, an active token is utilized, wherein the active token is electronically and securely activated and simultaneously associated with the now validated identity of the person seeking access.

In still another embodiment, the token has the capability that in the event once the token is properly activated and associated with the person seeking access, should that person remove the token and/or attempt to transfer the token to an imposter, the mere act of removing the token from the person would deactivate/disable the token in such a manner that the token sensing devices within the physically secure perimeter would immediately sense the event and appropriate notification would be instantly issued so that the appropriate security rules would be invoked in order to address the transgression.

In another aspect, a method is provided for ensuring continuous personal physical validation, the method comprising the following steps: obtaining unique personal identification information to validate an identity of a person, wherein validating the identity results in a validated identity; activating a physical token; associating the physical token with the validated identity, wherein the physical token represents the validated identity within a defined environment after the steps of activating and associating are performed; placing the physical token on the person, wherein the physical token is configured to detect removal of the physical token from the person after being placed on the person and is further configured to deactivate the physical token when such removal is detected; monitoring the physical token by at least one token sensing device within the defined environment, wherein deactivation of the physical token produces an event that is sensed by the token sensing device; and issuing a notification when the event occurs.

In one embodiment, the step of obtaining unique personal identification information includes a two factor identification process.

In another embodiment, the two factor identification process includes at least one “Who You Are” identification process and at least one “What You Have” identification process.

In yet another embodiment, the “Who You Are” identification process involves biometric validation of the person and the “What You Have” identification process involves a token-based validation of the person.

In a further embodiment, the physical token associated with the validated identity was not used in the step of obtaining unique personal identification information.

In another embodiment, the defined environment an area is within a controlled security perimeter having limited ingress and egress.

In another aspect, an embedded device is provided for use in systems and methods in accordance with additional embodiments.

In yet another aspect, a medicinal administration device and companion token are provided for use in systems and methods in accordance with still further embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding, reference is now made to the following description taken in conjunction with the accompanying Drawings in which:

FIG. 1 shows a system for weapon/firearm control in accordance with one aspect; and

FIG. 2 shows a method for weapon/firearm control in accordance with another aspect.

DETAILED DESCRIPTION

Referring now to the drawings, wherein like reference numbers are used herein to designate like elements throughout, the various views and embodiments of weapon control system are illustrated and described, and other possible embodiments are described. The figures are not necessarily drawn to scale, and in some instances the drawings have been exaggerated and/or simplified in places for illustrative purposes only. One of ordinary skill in the art will appreciate the many possible applications and variations based on the following examples of possible embodiments.

Referring now to FIG. 1, there is illustrated a weapon/firearm control system in accordance with one aspect. The weapon/firearm control system 100 includes a firearm 102 and a biometrically enabled token 104 (“BET token” or “B.E.T.”). The firearm 102 may be, but is not limited to, a rifle, pistol or shotgun. The firearm 102 may be of new manufacture, or it may be an existing firearm retrofitted to operate with the system 100.

The firearm 102 includes a frame 106, a barrel 108, a firing mechanism 109 and a trigger 110. The trigger 110 is operatively connected to the firing mechanism 109 such that selective operation of the trigger causes the firing mechanism to operate and fire the firearm 102. Optionally, a safety mechanism 111 may be interposed between the trigger 110 and the firing mechanism 109 to prevent accidental operation of the firearm 102. In the illustrated embodiment, the safety mechanism 111 is a grip safety.

The firearm 102 further includes an interlock system 112 for enabling and disabling operation of the firearm. In the illustrated embodiment, the interlock system 112 includes a communications/control module 114, a trigger module 116 and a firing mechanism module 118. The interlock system 112 may be disposed in the frame 106 or other portions of the firearm 102. The interlock system 112 operates to enable and disable operation of the firearm 112 based on signals sent to, and received from, the communications/control module 114. In the illustrated embodiment, the trigger module 116 is operatively connected to the trigger 110 (denoted by arrow 120) to sense attempted operation of the trigger by a user. Upon such attempted operation of the trigger 110, the trigger module 116 sends signals (denoted by arrow 122) to the communications/control module 114. Further in the illustrated embodiment, the firing mechanism module 118 is operatively connected to the firing mechanism 109 (denoted by arrow 124) to enable or disable operation of the firing mechanism.

Upon attempted operation of the trigger 110, the trigger module 116 sends signals 122 to the communications/control module 114. As further described below, the communication/control module 114 has information regarding the validated identity of the user and/or information regarding the geographic location of the firearm 102. Upon receipt of signals 122 from the trigger module 116, the communication/control module 114 evaluates the circumstances according to predetermined instructions stored in the interlock system 112, and then sends responsive signals (denoted by arrow 126) to the firing mechanism module 118 that either enable or disable operation of the firing mechanism 109, and thus that either enable or disable operation of the firearm 102. In alternative embodiments, the functions of the trigger module 116 and firing mechanism module 118 may be combined into a single module (not shown) to selectively block the trigger 110 from operation upon command from the communications/control module 114, rather than by affecting operation of the firing mechanism 109 itself. In still further embodiments, the functions of the trigger module 116 and/or firing mechanism module 118 may selectively enable and disable the safety 111 upon command from the communications/control module 114, and thereby control operation of the firearm 102.

The communications/control module 114 may include GPS-/mobile (i.e., cellular)-/ and/or WiFi-enabled wireless communications (denoted by arrow 128) that allow the interlock system 112 to communicate with one or more data communication networks 129 including, but not limited to, the Internet, cellular and/GPS satellite networks. Such communication functionality allows the interlock system 112 to determine the physical geographical location of the firearm 102 at any given time. This communication functionality may further allow an external administrator 130 to determine the physical geographical location of the firearm 102 by communicating (denoted by signals 131) with the interlock system 112 over the network 129.

In one embodiment, the firearm control system 100 uses the Internet, cellular and/GPS satellite network communication 128 to determine if the firearm 102 is geographically within a school, campus or other geographic location that is not authorized for firearm use. If so, the interlock system 112 is instructed to disable the firearm 102; otherwise, the interlock system is instructed to enable the firearm for use. In another embodiment, the firearm control system 100 uses both the geographic information obtained from the Internet, cellular and/GPS satellite network communications 128 and the validated identity of the user (provided by the BET token 104 as herein described) to determine if the firearm 102 is geographically within a school, campus or other geographic location where the validated user is not authorized for firearm use. If so, the interlock system 112 is instructed to disable the firearm 102; otherwise, the interlock system is instructed to enable the firearm for use. The latter embodiment has the advantage of allowing authorized users with a validated identity (e.g., law enforcement personnel) to have an enabled firearm 102 even in a geographic location (such as a school) that is otherwise prohibited for firearm use. It will be appreciated that the instructions in the interlock system 112 may be changed by means of communications 128 received from the network 129. This allows a remote, e.g., “cloud-based”, administrator 130 to monitor and/or change the instruction in the interlock system 112.

Another aspect of the weapon/firearm control system 100 is the use of biometrics to control the operation of the firearm 102, e.g., if you are not the registered (i.e., authorized and/or validated) user of the firearm, then it is disabled from operation (i.e., firing). The BET (biometrically-enabled token) 104 facilitates the use of such biometrics in the system 100. In preferred embodiments, the BET token 104 is configured as a bracelet, ring or other accessory that can be worn or carried by the user of the handgun 102. In the embodiment illustrated in FIG. 1, the BET token 104 is configured as a ring. The BET token 104 may include a body 132 and a BET communication/control module 134 attached to or disposed within the body. In FIG. 1, the module 134 is shown enlarged for purposes of illustration.

In various embodiments, the module 134 may communicate with the communication/control module 114 of the firearm 102 directly (denoted by signals 134), by means of the network 129 (denoted by signals 138) or both. In addition, the module 134 may communicate with a remote administrator 130 via the communication network 129. The BET token 104 and the interlock system 112 further have the combined functionality to determine the distance (denoted D) between the firearm 102 and the BET token.

Referring now also to FIG. 2, there is illustrated a method for using a weapon/firearm control system in accordance with another aspect. The method 200 includes the following steps. First (block 202), unique personal identification information is obtained to validate an identity of an authorized firearm carrier. In a preferred embodiment, the method 200 executes a two-factor identity validation method that comprises any of the token-based (“What you have”) identity validation methods coupled with a biometric-based (“Who You Are”) identity validation method. Validating the identity results in a validated identity. In other words, the authorized user (i.e., carrier) of the firearm 102 obtains a validated identity using biometrics. Next (block 204), a BET token 104 is activated. Next (block 206), the physical BET token 104 is associated with the validated identity 208. The BET token 104 represents the validated identity (of the authorized user) in proximity to the firearm 102. Once activated via the biometrics, the BET token 104 remains in constant communication with the firearm 102.

Next (block 208), the physical BET token 104 is placed on the authorized user. In some embodiments, the BET token 104 is configured to detect removal of the BET token from the user after being placed on the user. In some further embodiments (block 209), the BET token 104 is further configured to deactivate the BET token (i.e., itself) when such removal is detected. In other embodiments (not shown), the BET token 104 may be a passive token

Under normal circumstances (block 210), communication between the module 134 of the BET token 104 and the communication/control module 114 of the firearm 102 causes the interlock system 112 to enable the firearm to operate (block 212). If, however, the firearm 102 becomes separated by more than a certain (pre-determined) distance D_(max), then the interlock system 112 disables operation of the firearm (block 211). When the BET token 104 come back within range D_(max) of the firearm 102, the interlock system 112 becomes re-enabled.

In a preferred embodiment, the BET token 104 is configured to detect if it is removed from the person of the authorized user. In the event the authorized user/carrier of the firearm 102 removes the BET token 104 (or if it is lost or stolen), the BET token 104 is immediately disabled, thereby also causing the interlock system 112 to disable the firearm 102. In some such embodiments, the authorized user/carrier may have to repeat the biometric identity validation process (blocks 206, 208) to re-enable the BET token 104, and thus to re-enable the firearm 102, such that the firearm is again ready for use (block 212).

By way of further description of the systems and methods for ensuring continuous personal physical validation in accordance with particular aspects of the current invention, the following is presented. A method for ensuring continuous personal physical validation includes the following steps: First, unique personal identification information is obtained to validate an identity of a person. In one embodiment, the system executes a two-factor identity validation method that comprises any of the token-based (“What you have”) identity validation methods coupled with a biometric-based (“Who You Are”) identity validation method. Validating the identity results in a validated identity.

Next, a physical token is activated. Next, the physical token is associated with the validated identity. The physical token represents the validated identity within a defined environment after the steps of activating and associating are performed.

Next, the physical token is placed on the person. In some embodiments, the physical token is configured to detect removal of the physical token from the person after being placed on the person. In further embodiments, the physical token is further configured to deactivate the physical token (i.e., itself) when such removal is detected. In other embodiments (not shown), the token may be a passive token.

The person with the physical token is allowed entry into the defined environment. Typically, the defined environment will be a secure area having limited ingress and egress. Next, the physical token is monitored by at least one token sensing device within the defined environment. Deactivation of the physical token produces an event that is sensed by the token sensing device. In some embodiments, the event may be active, e.g., a radio signal sent from the physical token to the token sensing device, while in other embodiments the event may be passive, e.g., a change to a memory value on the physical token that can be detected when interrogated by the token sensing device.

Finally a notification is issued when the event (i.e., deactivation of the token) occurs. The notification may be sent to recipients within the defined environment and/or to recipients outside the defined environment, e.g., via a data communication network, such as the Internet or other network.

A further system and method in accordance with another aspect includes an embedded device comprising a GPS-/mobile (cellular)-/WiFi- and/or biometric-enabled token chip that may be affixed to, embedded in or implanted in people's apparel including, but not limited to, shirts, shoes, watches, necklaces, belts. The embedded device may operate substantially as the physical token previously described in connection with FIGS. 1 and 2. The embedded device may identify where a given (e.g., validated) person physically is, so that when combined with certain pre-determined cloud based parameters, notifications and/or alerts may be triggered that may drive certain actions.

In one embodiment, a user with “Administration” privileges (“Admin User”) may establish rules and/or geographic area perimeters on a map via the web or mobile device by identifying “known” locations and setting a variety of parameters such geographic special perimeters. For example, a school may be designated as a defined location, wherein the Admin User may drop a virtual pin on the map, and then expand an area into a perimeter around the defined location (i.e., around the school). Next, when a person (“student”) wearing the apparel with embedded device enters an approved perimeter area the Admin User (and/or others previously established by the Admin User) may receive corresponding notification. If and when the given student leaves the approved area, additional notifications are sent as previously described. Thus, the Admin User (and other designated recipients) may track the movement of the student wearing the embedded device via web or mobile interface.

In a further embodiment, the student carries a second token on their person such as bracelet, keychain, etc. The second token may include wireless connectivity. If any apparel with embedded device becomes separated by too much distance D (a user-configurable amount) from the second token, then a notification may be sent to predefined recipients.

In still further embodiments, the embedded device may be implanted directly onto or into a validated person's body, wherein data such as medical history, payment options, etc. can be constantly updated. When the validated person with the implanted device passes near a detector device (not shown), e.g., a ceiling-based sensor or floor-based sensor, the data in the embedded device may be retrieved and accessed. For example, at a doctor's office, for information in the validated person's embedded device may be instantly made available to the medical personnel supported by optional password and/or biometric security, so that only personnel authorized by the person having the embedded device would permit the data exchange to take place.

This overall system for the embedded device comprises physical devices (products) along with supporting software and cloud based data facilities.

It will be appreciated by those skilled in the art having the benefit of this disclosure that this weapon/firearm control system provides numerous advantages for public safety, compared to the prior art. It should be understood that the drawings and detailed description herein are to be regarded in an illustrative rather than a restrictive manner, and are not intended to be limiting to the particular forms and examples disclosed. On the contrary, included are any further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments apparent to those of ordinary skill in the art, without departing from the spirit and scope hereof, as defined by the following claims. Thus, it is intended that the following claims be interpreted to embrace all such further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments. 

What is claimed is:
 1. A firearm control system for a firearm authorized for use by a person having a validated identity, the system comprising: a firearm having a frame, barrel, firing mechanism and trigger, the trigger being operatively connected to the firing mechanism such that selective operation of the trigger causes the firing mechanism to operate and fire the firearm; an interlock system for enabling and disabling operation of the firearm, the interlock system being disposed on the frame and including a communications/control module, a trigger module operatively connected to the communication/control module to send and receive signals therebetween, and operatively connected to the trigger to sense attempted operation of the trigger by a user and send signals to the communications/control module, and a firing mechanism module operatively connected to the communication/control module to send and receive signals therebetween, and to the firing mechanism to enable or disable operation of the firing mechanism; wherein the interlock system operates to enable and disable operation of the firearm based on signals sent to, and received from, the communications/control module.
 2. A firearm control system in accordance with claim 1, wherein the communication/control module receives external signals indicative of current validated identity information and, upon receipt of signals from the trigger module, the communication/control module compares the current validated identity information to a predetermined validated identity of the authorized user stored in the interlock system, and sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the validated identities do not match.
 3. A firearm control system in accordance with claim 1, wherein the communication/control module receives external signals indicative of a current geographic location of the firearm and, upon receipt of signals from the trigger module, the communication/control module compares the current geographic location to a list of prohibited locations stored in the interlock system, and the sends responsive signals to the firing mechanism module that disables operation of the firing mechanism if the current geographic location is a prohibited location.
 4. A firearm control system in accordance with claim 1, further comprising: a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user; the BET including a body and a BET communication/control module attached to the body; the BET communication/control module communicating with the communication/control module of the firearm to send signals indicative of current validated identity information.
 5. A firearm control system in accordance with claim 1, further comprising: a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user; the BET including a body and a BET communication/control module attached to the body; the BET communication/control module communicating with the communication/control module of the firearm to send signals indicative of the distance between the BET token and the firearm.
 6. A firearm control system in accordance with claim 1, further comprising: a biometrically-enabled token (“BET”) that is associated with a biometrically validated identity of an authorized user and is configured to be worn or carried by the authorized user; the BET including a body and a BET communication/control module attached to the body; the BET communication/control module communicating with the communication/control module of the firearm to send signals indicative that the BET token was removed from the authorized user. 