RFID Trigger Lock By: Mike Jastrzebski.

Slides:



Advertisements
Similar presentations
BUILDING EMERGENCY ACTION PLAN
Advertisements

Safety Curriculum Project ChildSafe Putting A Lock On Safety! A nationwide program of the National Shooting Sports Foundation and its community partners.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Group 2 : Belle, Fiona, Bryant, Jaki, Jarvis and Shine.
Digital Wallet Alberto Almonte (CPE) Miles Curiotto (CPE) Michael Stross (EE) The new, compact, secure and efficient way to carry all your credit and debit.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Use In Humans Dionne Johnson and Jenna Seagraves COMP38012/06/06.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
PROJECT PROPOSAL Lennie Giannone, Ryan Savino, Carrie Johnston, and Jessica Fernandes.
General Overview Application Uses –Real-Time Location Systems –Inventory Management –Pharmaceutical Tracking –Document Management.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
Design Problems  Limited Market  Too Many Other Devices  No Standard Design Among Devices.
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
FIREARM SAFETY FOR CHILDREN Information and Prevention April 2009.
Radio Frequency Identification (RFID) Presenter: Victoria Raskovich.
Radio Frequency IDentification RFID Technology Presented by Elaine Contant University of Arkansas Libraries – Fayetteville December, 2008.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Ultra Wideband Technology Group 6 Will Culberson Ben Henley.
EMERGENCY VEHICLE ALERT SYSTEM ECE 495C Digital Systems Senior Design Project Proposal Team #3 Spring 2008 January 09, 2008.
ACTUATING SOFT ROBOTIC EXOSKELETONS: THE POTENTIAL AND PRACTICALITY Thomas Hinds and Rachel Round What is Soft Robotics? Therapy and Rehabilitation Applications.
Overview of Crisis Protocols Introduction Ways We’re Trying to Make Campus Safer Transition to New Plan.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Gun Safety, Gun Etiquette, and Gun Storage
What the Top Auto Locksmith Silver Spring MD can Do?
PRODUCT DEVELOPMENT PROCESS By PERUMALSAMY M
Engineering Design. “There is a great satisfaction in building good tools for other people to use.” -Freeman Dyson Biology Engineering “Cells are tiny.
An Innovative, new app for the hearing impaired By Robert F. Lasko III
Iot in the Retail industry
Start the program by pressing “enter”.
Home Visitor Safety Juanita Puga Family Connects
INFORMATION SYSTEM CATEGORIES
Aaker, Kumar, Day Ninth Edition Instructor’s Presentation Slides
Police Department The University of Texas at Dallas Ofc. Steve Finney
Safety Curriculum Project ChildSafe Putting A Lock On Safety!
Physical Material Prerequisite Programs in Small and Very Small Plants
Dronely: A Visual Block Programming Language for the Control of Drones
Presented by: BeeLinda L. Temple CPhT
CONTROL OF HAZARDOUS ENERGIES (LOCKOUT / TAGOUT)
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Designing a Production Plan
Radio Frequency Identification (RFID)
CHAPTER 35 Special Operations.
Marketing Research Aaker, Kumar, Leone and Day Eleventh Edition
Developing Information Systems
RFID Source Tracking Tim Durkin PPD.
Basic Types of Firearms
Hazard Assessment.
Content protection for 4k
How can you fix Kindle critical battery error?
Currency Exchange Rates Paddington | Monex International UK
HOW TO SECURE YOUR KINDLE FIRE E-READER? (WATCH LIVE TO FIX)
Know How to Detect a Bad Car Immobilizer
C4I, Internet of Things and Critical Infrastructure Protection
RFID for Elderly Case Study
Designing a Research Package
e-Commerce: Buying and Selling on the Internet
Firearm Safety and Safe Range Operation
Radio Frequency Identification
WHO DOES IT START WITH Presented by: Tom Dispenza
Date 30 Julai 2018 Time pagi Venue Pejabat HQ PUSH START BUTTON.
Global Marketing.
IT and Society Week 2: Privacy.
NATE Tower Site Hazard Recognition Guide
Cellular Telephone Networks
Principles of Information Technology
Click anywhere to get started…
Presentation transcript:

RFID Trigger Lock By: Mike Jastrzebski

Preliminary Idea This idea would incorporate Radio Frequency Identification (RFID) technology into a locking system for firearms. A firearm could possibly be retrofitted to accommodate some sort of locking mechanism. The mechanism would prevent the weapon from firing unless in the immediate presence of the RFID transmitter. Current technology allows the RFID transmitters to be extremely small. The transmitters are small and safe enough to be implanted into a person’s hand The picture (left) shows an x-ray of a person’s hands after the rather simple implant procedure. This particular person used his implants to access his home and car locks. The procedure is relatively painless and cost effective.

The Locking Mechanism Traditional locking mechanisms rely mostly one simple key locks. These are potentially not secure and dangerous. With RFID, the system of control would be extremely secure and controllable, only the person (or persons) with the implants could fire the weapon. The mechanism could be made in two forms: a general trigger lock and a locking mechanism incorporated into a particularly popular rifle.

The Mechanism Cont. The general trigger lock would be simply powered by a small button cell battery. The incorporated system has many possible integrated power options. One of these would be a kinetic power system, just like in the “shake” flashlights, the rifle would be shaken a few times or simply collect and store power with normal operation. The actual mechanism could use a simple solenoid to lock and unlock the firearm. These solenoids are solid and would most likely out last the life of the firearm.

Target Audience This device could be marketed to many different consumers. These include home gun owners, police officers, and the military. The system could be adapted to meet the particular needs of each and every consumer type / level.

More Military Since all military personnel would be required to be implanted, other uses can be utilized from the tags. RFID implants can store secure encrypted data. This means that conventional dog tags can be incorporated into the implant. Soldiers would be able to use there implants to quickly access certain locations. They would be able to access certain other facilities and/or equipment more effectively. And could be tracked and monitored thoroughly.

Concerns The main concern with early RFID technology was its vulnerability to remote hacking. Current RFID tags are much more secure and now have heavy encryption. The RFID system used would be very small proximity, this means no one out of touching distance of the weapon can even begin to access the information stored on the chip. Each implant is unique and can be made in “read only” models. Of course it is not impossible to access the information, however, it would require an intruder to have lots of time very close to the weapon, which practically speaking would be close to impossible in most situations. A fail safe element can also be somehow incorporated in order to assure both safety and full control for the user.

Prototyping Creating an actual prototype would be fairly simple and cost effective. Most every component would be pre-made, this includes the RFID kit, kinetic power source, and trigger lock or other locking mechanism. The locking mechanism itself may have to be designed and fabricated / machined from scratch. Total cost of a prototype is estimated between 200-300 dollars.

Prototyping Con. If need be, only the trigger mechanism could be displayed and fitted with the RFID system ( to avoided getting in trouble with the school). A mechanism can be pulled from an old rifle or pistol. A trigger mechanism can also be custom made and fitted with the RFID system. Possibly, an Airsoft toy rifle can be gutted and fit with the system.

THE END