Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Big Microsoft 365 price increases coming next year

      Big Microsoft price increases coming next year

      5 December 2025
      Vodacom to take control of Safaricom in R36-billion deal - Shameel Joosub

      Vodacom to take control of Safaricom in R36-billion deal

      4 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
      BYD takes direct aim at Toyota with launch of sub-R500 000 Sealion 5 PHEV

      BYD takes direct aim at Toyota with launch of sub-R500 000 Sealion 5 PHEV

      4 December 2025
      'Get it now': Takealot in new instant deliveries pilot

      ‘Get it now’: Takealot in new instant deliveries pilot

      4 December 2025
    • World
      Amazon and Google launch multi-cloud service for faster connectivity

      Amazon and Google launch multi-cloud service for faster connectivity

      1 December 2025
      Google makes final court plea to stop US breakup

      Google makes final court plea to stop US breakup

      21 November 2025
      Bezos unveils monster rocket: New Glenn 9x4 set to dwarf Saturn V

      Bezos unveils monster rocket: New Glenn 9×4 set to dwarf Saturn V

      21 November 2025
      Tech shares turbocharged by Nvidia's stellar earnings

      Tech shares turbocharged by stellar Nvidia earnings

      20 November 2025
      Config file blamed for Cloudflare meltdown that disrupted the web

      Config file blamed for Cloudflare meltdown that disrupted the web

      19 November 2025
    • In-depth
      Jensen Huang Nvidia

      So, will China really win the AI race?

      14 November 2025
      Valve's Linux console takes aim at Microsoft's gaming empire

      Valve’s Linux console takes aim at Microsoft’s gaming empire

      13 November 2025
      iOCO's extraordinary comeback plan - Rhys Summerton

      iOCO’s extraordinary comeback plan

      28 October 2025
      Why smart glasses keep failing - no, it's not the tech - Mark Zuckerberg

      Why smart glasses keep failing – it’s not the tech

      19 October 2025
      BYD to blanket South Africa with megawatt-scale EV charging network - Stella Li

      BYD to blanket South Africa with megawatt-scale EV charging network

      16 October 2025
    • TCS
      TCS+ | How Cloud on Demand helps partners thrive in the AWS ecosystem - Odwa Ndyaluvane and Xenia Rhode

      TCS+ | How Cloud On Demand helps partners thrive in the AWS ecosystem

      4 December 2025
      TCS | MTN Group CEO Ralph Mupita on competition, AI and the future of mobile

      TCS | Ralph Mupita on competition, AI and the future of mobile

      28 November 2025
      TCS | Dominic Cull on fixing South Africa's ICT policy bottlenecks

      TCS | Dominic Cull on fixing South Africa’s ICT policy bottlenecks

      21 November 2025
      TCS | BMW CEO Peter van Binsbergen on the future of South Africa's automotive industry

      TCS | BMW CEO Peter van Binsbergen on the future of South Africa’s automotive industry

      6 November 2025
      TCS | Why Altron is building an AI factory - Bongani Andy Mabaso

      TCS | Why Altron is building an AI factory in Johannesburg

      28 October 2025
    • Opinion
      Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

      Your data, your hardware: the DIY AI revolution is coming

      20 November 2025
      Zero Carbon Charge founder Joubert Roux

      The energy revolution South Africa can’t afford to miss

      20 November 2025
      It's time for a new approach to government IT spend in South Africa - Richard Firth

      It’s time for a new approach to government IT spend in South Africa

      19 November 2025
      How South Africa's broken Rica system fuels murder and mayhem - Farhad Khan

      How South Africa’s broken Rica system fuels murder and mayhem

      10 November 2025
      South Africa's AI data centre boom risks overloading a fragile grid - Paul Colmer

      South Africa’s AI data centre boom risks overloading a fragile grid

      30 October 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Top » Smart guns edge closer to reality

    Smart guns edge closer to reality

    By The Conversation12 January 2016
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    smart-gun-640
    The Armatix iP1

    Every time a toddler accidentally shoots a friend or family member, a teen kills himself via gunshot or a shooter perpetrates an act of mass violence, public discussion circles back to “smart gun” technology. The concept has roots in a 1995 National Institute of Justice (NIJ) study that recommended a technology-based approach to reduce the incidence of police officers killed in gun-grabs by assailants. More recently, US President Barack Obama’s message on gun violence included specific recommendations on federal actions designed to promote the development and commercialisation of electronic gun-safety systems.

    The term “smart gun” has been embraced by the popular press as a catchall for all forms of electronic personalised safety technology. The idea is to make sure a gun can be fired only by its authorised user. But the different scenarios in which a gun could be inappropriately discharged call for fundamentally different safety systems.

    The metaphor of a common door lock is a useful way to think about the various technological approaches. The key serves as the personal identifier. The pin tumblers that recognise the key inside the lock serve as the authenticator. And the latch serves as the block. All electronic gun safety systems must accomplish all three of these basic functions — identify authorised shooters, authenticate their credentials and then release the block to the firing mechanism.

    How one satisfies those needs is subject to the performance constraints of the application environment and the physical constraints of the weapon itself. These differences create distinct branches on the family tree of personalised weapons technology.

    One group of solutions owes its heritage to the NIJ study focused on protecting police weapons from takeaway during a close quarters struggle. It suggested a token-based proximity sensor using radio frequency identification (RFID). A number of working RFID prototype guns have been demonstrated, beginning with Colt’s 1996 handgun and including Triggersmart, iGun M-2000 and the Armatix iP1.

    In a badge, wristband or ring, a user wears a passive RFID tag, like those embedded in products to prevent shoplifting. It’s the “token” and serves as the key in the front door metaphor. Like a physical key, it can be duplicated or shared. What matters is possession of the token, not the identity of the token holder.

    A wireless RFID reader is built into the gun and serves the role of authenticator. It generates a signal that activates the RFID tag to respond with an embedded code. If there’s a match, the electromechanical components unblock the weapon firing system and the gun functions normally. The response time of these systems is generally dependent on the choice of electromechanical components used in the blocking system (such as servomotors, solenoids, shape memory metals), but are generally less than half a second. By design, the gun can remain active as long as there is a signal link, or in some configurations as long as pressure sensors detect the gun is being held.

    If the tag is too far away from the transmitter to self-activate and respond, then it’s like losing your key to the front door — the gun remains locked down. The Armatix iP1, for example, specifies a range of 15 inches. If you try to spoof the transponder with a signal that does not contain the individual code, it’s like using the wrong key — it may fit the slot but cannot be turned because it does not match the tumblers — and the gun remains locked down.

    The iGun’s RFID-type system is locked in the upper photo. In the inset, a user’s tag (in the form of a ring) is close enough and the weapon is ready to fire, with the firing mechanism no longer blocked
    The iGun’s RFID-type system is locked in the upper photo. In the inset, a user’s tag (in the form of a ring) is close enough and the weapon is ready to fire, with the firing mechanism no longer blocked

    Various designs interfere with the mechanical firing mechanism in different places – from trigger bar to firing pin. There are also different technologies including solenoid actuators, shape memory alloy-based components and even electronic firing systems that serve as the deadbolt to be released upon receiving an authentication system. The details are proprietary to the individual products on the market and reflect design trade-offs in power consumption, free space to accommodate components and response time.

    Proximity of gun to token is not an absolute determinant of rightful possession during a close-quarters struggle. But the technology does offer simplicity of operation, easy weapons exchange across permitted users (that is, partners) and reliably disables a weapon from use if the officer has been overpowered and the duty weapon taken.

    Do I know you?
    The benefits of a token-based system in a street encounter become a liability in the home. The viability of the approach is wholly dependent on the owner securing the token where it cannot be accessed by denied users. But guns used for home protection are more likely to have token and weapon stored together to prevent any delay in the event of an intrusion. And anyone who has both the token and the weapon can fire it.

    A second group of technologies evolved in response to child-safe handgun legislation adopted in New Jersey and Maryland in the US in the early 2000s, designed to prevent unauthorised use of personal firearms stored in the home. Biometric authentication systems eliminate the physical token. Instead, a measurable physical characteristic of any authorised user becomes the key. It can’t be taken without permission, counterfeit or otherwise transferred.

    To date, fingerprints have been the primary attribute used in biometric systems. Kodiak Arms Intelligun and Safe Gun Technology’s retrofit for rifles use fingerprint detection as a primary mode of security. If the fingerprint is the key, then the sensor and pattern matching software are the pin tumblers that perform the authentication function in these guns.

    The most widely used sensor technology relies on capacitance imaging of the fingerprint. The variation in distance between the ridges and grooves of the finger and the sensor plate creates a distribution of electrical charge storage (capacitance) that can be measured in an array of conductor plates in the sensor. Other fingerprint sensors rely on infrared (thermal) imaging, and some use pressure detection to create a digital pattern that is a unique representation of the print.

    Various groups are working on different ways to use fingerprint recognition to authenticate whose hand is on a gun. Kai Kloepfer, CC BY-ND
    Various groups are working on different ways to use fingerprint recognition to authenticate whose hand is on a gun. Kai Kloepfer, CC BY-ND

    The sensor software needs to be trained to store acceptable patterns that may represent different fingers of a single user or various fingers from multiple authorised users. After that, any pattern that doesn’t match within some specified tolerance is rejected. The reliability of the authentication process is influenced by the resolution of the sensor, the extent and orientation of the exposed finger, and physical factors that can interfere with the mapping. For example, moisture on the finger can defeat a capacitive detector, cold fingers can reduce the reliability of thermal imaging, and dirt, paint or gloves can obscure the fingerprint beyond recognition.

    There are other types of biometric security being explored. One prototype sponsored by NIJ adopted vascular biometrics that detect the blood vessel structure below the skin surface. An emerging class of biometrics are dynamic or behavioural and combine some element of individualised physicality amplified by learned patterns of behaviour. For instance, voice identification combines the structure of one’s vocal chords with the breath patterns of speech learned in infancy.

    NJIT prototype with Dynamic Grip Recognition sensors embedded in the handgun grip
    NJIT prototype with Dynamic Grip Recognition sensors embedded in the handgun grip

    Electronic signature authentication captures the speed and pressure of pen on LCD pad (and not the image of the signature) as the signer executes handwriting in a pattern ingrained early in life.

    Over the last 15 years, our research team at the New Jersey Institute of Technology (NJIT) has developed a gun safety system based on a novel behavioural biometric called Dynamic Grip Recognition (DGR). The team demonstrated that changes over time to the pressure pattern created on the grip of a handgun as one counter-braces the force of trigger pull were individual to the user, reproducible and measurable.

    Our prototype detects grip patterns during the first one-tenth of a second of trigger pull and unlocks the weapon with no apparent lag to the shooter. Because DGR works during trigger pull of a properly held weapon, the approach can also reduce accidental firings during mishandling of a loaded weapon.

    Can I trust you?
    Reliability is always a concern raised in discussions of electronic gun safety systems.

    The interior of a firing weapon is not a friendly environment for electronics, but there is now a sufficient history of ruggedised circuitry that failure rates of the underlying electronic hardware are orders of magnitude less than the predicted failure rates of the mechanical weapon (somewhere between one in 1 000 and one in 10 000 depending on the precision and quality of the weapon).

    Power is clearly a concern here, too. But advances in microprocessor technology and battery storage that have been driven by smartphones and portable electronics remove this issue as a showstopper. Motion detection and wake-up software can reduce battery drain during storage. Integrating the power supply to the ammunition clip and even charging by mechanical cycling are all ways to address power loss as a mode of failure.

    In biometric systems, there is another element to consider: failure of the identification algorithm. Those are false negatives in which a rightful user is not recognised, or false positives in which an impostor is wrongly authenticated. The recognition rates for fingerprint detectors have been claimed to be as high as 99,99% (one in 10 000 failure rate).

    As the array of sensor technologies grows, one might expect a multisensor or multispectral approach to be the ultimate choice for biometric-based systems. These have the advantage of multiplying reliability rates when independent measures are used. For example, a fingerprint sensor with a one-in-10 000 failure rate, coupled with a dynamic grip recognition with a failure rate of one in 1 000, would produce a combined reliability of 1 in 10 000 x 1 000 or one in 10 000 000.

    The author describes personalised weapons research at NJIT:

    Will we ever be able to buy one?
    Throughout the 20-year-long discussion of “smart guns”, the topic has been a lightning rod for debate between pro- and anti-gun lobbies. But too often there isn’t substantive knowledge of the underlying technologies, their appropriate use and their design limitations.

    Personalised weapons technology can make a contribution to reducing death and injury from accidental or unauthorised weapons use. It is not a panacea — the technology can’t stop shootings like Virginia Tech, Aurora or Sandy Hook in the US, where lawfully purchase weapons were used. But it can be an option for gun buyers to ensure their weapons never fall into the wrong hands.

    The existing platforms show that smart guns are not science fiction and could be a commercial reality much sooner than later. A recent survey by the NIJ identified 13 different personalised weapon systems, at least three of which were deemed to be in commercial preproduction. Obama’s initiative could be an important step to accelerate development and promote private sector investment necessary to mature these technologies to the point of reliability and affordability that will spur consumer adoption.The Conversation

    • Donald Sebastian is professor of chemical, biological and pharmaceutical engineering, New Jersey Institute of Technology
    • This article was originally published on The Conversation


    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleEOH rises after voluntary update
    Next Article Why Uber’s surge pricing is naive economics

    Related Posts

    Big Microsoft 365 price increases coming next year

    Big Microsoft price increases coming next year

    5 December 2025
    AI is not a technology problem - iqbusiness

    AI is not a technology problem – iqbusiness

    5 December 2025
    Vodacom to take control of Safaricom in R36-billion deal - Shameel Joosub

    Vodacom to take control of Safaricom in R36-billion deal

    4 December 2025
    Company News
    AI is not a technology problem - iqbusiness

    AI is not a technology problem – iqbusiness

    5 December 2025
    Telcos are sitting on a data gold mine - but few know what do with it - Phillip du Plessis

    Telcos are sitting on a data gold mine – but few know what do with it

    4 December 2025
    Unlock smarter computing with your surface Copilot+ PC

    Unlock smarter computing with your Surface Copilot+ PC

    4 December 2025
    Opinion
    Your data, your hardware: the DIY AI revolution is coming - Duncan McLeod

    Your data, your hardware: the DIY AI revolution is coming

    20 November 2025
    Zero Carbon Charge founder Joubert Roux

    The energy revolution South Africa can’t afford to miss

    20 November 2025
    It's time for a new approach to government IT spend in South Africa - Richard Firth

    It’s time for a new approach to government IT spend in South Africa

    19 November 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Big Microsoft 365 price increases coming next year

    Big Microsoft price increases coming next year

    5 December 2025
    AI is not a technology problem - iqbusiness

    AI is not a technology problem – iqbusiness

    5 December 2025
    Vodacom to take control of Safaricom in R36-billion deal - Shameel Joosub

    Vodacom to take control of Safaricom in R36-billion deal

    4 December 2025
    Black Friday goes digital in South Africa as online spending surges to record high

    Black Friday goes digital in South Africa as online spending surges to record high

    4 December 2025
    © 2009 - 2025 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}