SlideShare a Scribd company logo
1 of 11
Presentation
presenter: kartik verma Date:04/06/2021
Biometrics in
GUNS
Triggering guns
Chapter 1
Is it considered tech weapon
Chapter 2
contents
Triggering guns
Chapter 1
Triggered with a biometric ?
Logic
Safety working
logic
The logic behind “smart
guns” is simple — use
technology to ensure that
guns can only be fired by
their owners. The potential
results are powerful: A
toddler can’t accidentally
shoot a friend or family
member. A teen can’t use
the household gun to take
their own life. Even stolen
firearms can’t be used to
commit crimes.
OK, so how does it
work ?
There are two main types
of smart guns: biometric
f i r e a r m s a n d r a d i o -
frequency identification
(RFID) guns. Biometric
g u n s a r e t y p i c a l l y
u n l o c k e d w i t h a
fingerprint. Biofire, a .40
caliber gun that reads the
shooter’s middle print,
can open a gun in 0.5
seconds.
smart tech ?
The Smart Tech Challenges Foundation, an organization dedicated to
the development of gun safety technology, has issued grants to a
number of other solutions. Among them is the iGun, which fires
when an RFID-enabled ring is within 1 centimeter of the gun’s
sensor, and , which uses location tracking technology to prevent
usage in public places like parks, shopping malls or schools.
What is a biometric gun ?
Biometric guns
a r e t y p i c a l l y
unlocked with a
f i n g e r p r i n t .
Biofire, a . 40
caliber gun that
r e a d s t h e
shooter's middle
print, can open a
g u n i n 0 . 5
seconds.
. The owner can
only fire the gun
when it's within
10 inches of an
Armatix watch
c o n n e c t e d b y
short-wave radio
signals.
.
Smart guns have
o n e o r m o r e
s y s t e m s t h a t
allow them to fire
o n l y w h e n
activated by an
authorized user.
Those systems
typically employ
RFID chips
why are smart
guns are
good ? S m a r t
g u n s u s e
tec hn ol o gy to
i d e n t i f y t h e i r
o w n e r s a n d
prevent their use
by anybody else.e.
G U N
Is it considered tech weapon ?
Chapter 2
Is smart weapon considered tech weapons
1
4
2
3
Tech weapons are
g u n s t h a t f i r e
projectiles that are
c a p a b l e o f
penetrating hard
surfaces .
which means they
c a n b e u s e d t o
a t t a c k e n e m i e s
behind cover.
Smart weapons are
g u n s t h a t h a v e
h om in g sy stem s
built into them
meaning that their
p r o j e c t i l e s c a n
f ol l ow en em ies ,
guaranteeing a hit.
Do biometric gun safes work?
A Biometric gun safe is clearly the better choice in
homes where children live or visit.
While a kid can guess your keypad code, they can't
duplicate your fingerprint.
While a kid can guess your keypad code, they can't
duplicate your fingerprint.
Acessable in 0.3seconds
02
Most Reliable
and rechargeable
Triggered locking
mechanism
360 degree
fingerprint
recoginition
How much it actually cost
8000
8000
The smart holster
For revolver
For pistol
THANK YOU!

More Related Content

Similar to Biometric/fingerprint in guns

RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacyShahryar Ali
 
LoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfLoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfInfosectrain3
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
Design and Fabrication of Sentry Gun based on Mechatronics System
Design and Fabrication of Sentry Gun based on Mechatronics SystemDesign and Fabrication of Sentry Gun based on Mechatronics System
Design and Fabrication of Sentry Gun based on Mechatronics Systemijtsrd
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
My best effort
My best effortMy best effort
My best effortsujataray
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
Spy Camera Detector vs.pptx
Spy Camera Detector vs.pptxSpy Camera Detector vs.pptx
Spy Camera Detector vs.pptxBloomlady
 
Spy Camera Detector vs.pdf
Spy Camera Detector vs.pdfSpy Camera Detector vs.pdf
Spy Camera Detector vs.pdfBloomlady
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technologyAbdullah Khosa
 
_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptx_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptxBloomlady
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.docArtechno7
 

Similar to Biometric/fingerprint in guns (20)

RFID security and privacy
RFID security and privacyRFID security and privacy
RFID security and privacy
 
LoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfLoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdf
 
Rfid seminar
Rfid seminarRfid seminar
Rfid seminar
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Design and Fabrication of Sentry Gun based on Mechatronics System
Design and Fabrication of Sentry Gun based on Mechatronics SystemDesign and Fabrication of Sentry Gun based on Mechatronics System
Design and Fabrication of Sentry Gun based on Mechatronics System
 
6 - Barcodes and RFID
6  - Barcodes and RFID6  - Barcodes and RFID
6 - Barcodes and RFID
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
My best effort
My best effortMy best effort
My best effort
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
Spy Camera Detector vs.pptx
Spy Camera Detector vs.pptxSpy Camera Detector vs.pptx
Spy Camera Detector vs.pptx
 
Spy Camera Detector vs.pdf
Spy Camera Detector vs.pdfSpy Camera Detector vs.pdf
Spy Camera Detector vs.pdf
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technology
 
_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptx_The Latest Advancements in Spy Camera Detection Technology.pptx
_The Latest Advancements in Spy Camera Detection Technology.pptx
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Cyber Security Myths
Cyber Security MythsCyber Security Myths
Cyber Security Myths
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.doc
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Biometric/fingerprint in guns

  • 1. Presentation presenter: kartik verma Date:04/06/2021 Biometrics in GUNS
  • 2. Triggering guns Chapter 1 Is it considered tech weapon Chapter 2 contents
  • 4. Triggered with a biometric ? Logic Safety working logic The logic behind “smart guns” is simple — use technology to ensure that guns can only be fired by their owners. The potential results are powerful: A toddler can’t accidentally shoot a friend or family member. A teen can’t use the household gun to take their own life. Even stolen firearms can’t be used to commit crimes. OK, so how does it work ? There are two main types of smart guns: biometric f i r e a r m s a n d r a d i o - frequency identification (RFID) guns. Biometric g u n s a r e t y p i c a l l y u n l o c k e d w i t h a fingerprint. Biofire, a .40 caliber gun that reads the shooter’s middle print, can open a gun in 0.5 seconds. smart tech ? The Smart Tech Challenges Foundation, an organization dedicated to the development of gun safety technology, has issued grants to a number of other solutions. Among them is the iGun, which fires when an RFID-enabled ring is within 1 centimeter of the gun’s sensor, and , which uses location tracking technology to prevent usage in public places like parks, shopping malls or schools.
  • 5. What is a biometric gun ? Biometric guns a r e t y p i c a l l y unlocked with a f i n g e r p r i n t . Biofire, a . 40 caliber gun that r e a d s t h e shooter's middle print, can open a g u n i n 0 . 5 seconds. . The owner can only fire the gun when it's within 10 inches of an Armatix watch c o n n e c t e d b y short-wave radio signals. . Smart guns have o n e o r m o r e s y s t e m s t h a t allow them to fire o n l y w h e n activated by an authorized user. Those systems typically employ RFID chips why are smart guns are good ? S m a r t g u n s u s e tec hn ol o gy to i d e n t i f y t h e i r o w n e r s a n d prevent their use by anybody else.e. G U N
  • 6. Is it considered tech weapon ? Chapter 2
  • 7. Is smart weapon considered tech weapons 1 4 2 3 Tech weapons are g u n s t h a t f i r e projectiles that are c a p a b l e o f penetrating hard surfaces . which means they c a n b e u s e d t o a t t a c k e n e m i e s behind cover. Smart weapons are g u n s t h a t h a v e h om in g sy stem s built into them meaning that their p r o j e c t i l e s c a n f ol l ow en em ies , guaranteeing a hit.
  • 8. Do biometric gun safes work? A Biometric gun safe is clearly the better choice in homes where children live or visit. While a kid can guess your keypad code, they can't duplicate your fingerprint. While a kid can guess your keypad code, they can't duplicate your fingerprint.
  • 9. Acessable in 0.3seconds 02 Most Reliable and rechargeable Triggered locking mechanism 360 degree fingerprint recoginition
  • 10. How much it actually cost 8000 8000 The smart holster For revolver For pistol