Remotely authorizing and disabling weapons
First Claim
Patent Images
1. A method of authorizing a weapon, comprising:
- storing an authorization string at the weapon;
receiving an authorization message at the weapon that includes a first substring obtained from a copy of the authorization string;
comparing the first substring to a second substring obtained from the authorization string stored at the weapon;
authorizing the weapon when the first substring matches the second substring;
de-authorizing and thereby disabling the weapon when the weapon is not re-authorized within a selected time interval;
wherein the received authorization message includes receiving a transmission time of the authorization message, andusing the received transmission time to obtain the second substring from the authorization string stored at the weapon.
0 Assignments
0 Petitions
Accused Products
Abstract
A weapon, a method of authorizing the weapon and weapon security system are disclosed. An authorization string is stored at the weapon. An authorization message may be received at the weapon from an authorization center. A processor at the weapon may obtain a first substring from the authorization message, the first substring being obtained from a copy of the authorization string. The processor compares the first substring to a second substring and authorizes the weapon when the first substring matches the second substring.
-
Citations
18 Claims
-
1. A method of authorizing a weapon, comprising:
-
storing an authorization string at the weapon; receiving an authorization message at the weapon that includes a first substring obtained from a copy of the authorization string; comparing the first substring to a second substring obtained from the authorization string stored at the weapon; authorizing the weapon when the first substring matches the second substring; de-authorizing and thereby disabling the weapon when the weapon is not re-authorized within a selected time interval;
wherein the received authorization message includes receiving a transmission time of the authorization message, andusing the received transmission time to obtain the second substring from the authorization string stored at the weapon. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A weapon, comprising:
-
a memory configured to store an authorization string; a receiver configured to receive a first substring obtained from a copy of the authorization string; and a processor configured to; obtain a second substring from the authorization string stored in memory, compare the first substring to the second substring, authorize the weapon when the first substring matches the second substring; de-authorize and thereby disable the weapon when the weapon is not re-authorized within a selected time interval;
wherein the received authorization message includes receiving a transmission time of the authorization message; anduse the received transmission time to obtain the second substring from the authorization string stored at the weapon. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A weapon security system, comprising:
-
an authorization center that transmits an authorization message that includes a first substring obtained from a copy of an authorization string; and a weapon that includes; a memory configured to store the authorization string; a receiver configured to receive the authorization message; and a processor configured to; obtain the first substring from the received authorization message; obtain a second substring from the authorization string stored in memory, compare the first substring to the second substring, authorize the weapon when the first substring matches the second substring; and de-authorize and thereby disable the weapon when the weapon is not re-authorized within a selected time interval;
wherein the received authorization message includes receiving a transmission time of the authorization message; anduse the received transmission time to obtain the second substring from the authorization string stored at the weapon. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification