Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      MultiChoice scraps annual DStv price hikes for 2026 - David Mignot

      MultiChoice scraps annual DStv price hike

      20 February 2026
      What Gen Z really thinks about the tech world it inherited - Tinashe Mazodze

      What Gen Z really thinks about the tech world it inherited

      20 February 2026
      Showmax 'can't continue' in its current form

      Showmax ‘can’t continue’ in its current form

      20 February 2026
      Free Market Foundation slams treasury's proposed gambling tax

      Free Market Foundation slams treasury’s proposed gambling tax

      20 February 2026
      South Africa's dynamic spectrum breakthrough - Paul Colmer

      South Africa’s dynamic spectrum breakthrough

      20 February 2026
    • World
      Prominent Southern African journalist targeted with Predator spyware

      Prominent Southern African journalist targeted with Predator spyware

      18 February 2026
      More drama in Warner Bros tug of war

      More drama in Warner Bros tug of war

      17 February 2026
      Russia bans WhatsApp

      Russia bans WhatsApp

      12 February 2026
      EU regulators take aim at WhatsApp

      EU regulators take aim at WhatsApp

      9 February 2026
      Musk hits brakes on Mars mission

      Musk hits brakes on Mars mission

      9 February 2026
    • In-depth
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
      TechCentral's South African Newsmakers of 2025

      TechCentral’s South African Newsmakers of 2025

      18 December 2025
      Black Friday goes digital in South Africa as online spending surges to record high

      Black Friday goes digital in South Africa as online spending surges to record high

      4 December 2025
    • TCS
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E4: ‘We drive an electric Uber’

      10 February 2026
      TCS+ | How Cloud On Demand is helping SA businesses succeed in the cloud - Xhenia Rhode, Dion Kalicharan

      TCS+ | Cloud On Demand and Consnet: inside a real-world AWS partner success story

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E3: ‘BYD’s Corolla Cross challenger’

      30 January 2026
      Watts & Wheels S1E4: 'We drive an electric Uber'

      Watts & Wheels S1E2: ‘China attacks, BMW digs in, Toyota’s sublime supercar’

      23 January 2026

      TCS+ | Why cybersecurity is becoming a competitive advantage for SA businesses

      20 January 2026
    • Opinion
      A million reasons monopolies don't work - Duncan McLeod

      A million reasons monopolies don’t work

      10 February 2026
      The author, Business Leadership South Africa CEO Busi Mavuso

      Eskom unbundling U-turn threatens to undo hard-won electricity gains

      9 February 2026
      South Africa's skills advantage is being overlooked at home - Richard Firth

      South Africa’s skills advantage is being overlooked at home

      29 January 2026
      Why Elon Musk's Starlink is a 'hard no' for me - Songezo Zibi

      Why Elon Musk’s Starlink is a ‘hard no’ for me

      26 January 2026
      A million reasons monopolies don't work - Duncan McLeod

      South Africa’s new fibre broadband battle

      20 January 2026
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Top » Smart guns edge closer to reality

    Smart guns edge closer to reality

    By The Conversation12 January 2016
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp
    smart-gun-640
    The Armatix iP1

    Every time a toddler accidentally shoots a friend or family member, a teen kills himself via gunshot or a shooter perpetrates an act of mass violence, public discussion circles back to “smart gun” technology. The concept has roots in a 1995 National Institute of Justice (NIJ) study that recommended a technology-based approach to reduce the incidence of police officers killed in gun-grabs by assailants. More recently, US President Barack Obama’s message on gun violence included specific recommendations on federal actions designed to promote the development and commercialisation of electronic gun-safety systems.

    The term “smart gun” has been embraced by the popular press as a catchall for all forms of electronic personalised safety technology. The idea is to make sure a gun can be fired only by its authorised user. But the different scenarios in which a gun could be inappropriately discharged call for fundamentally different safety systems.

    The metaphor of a common door lock is a useful way to think about the various technological approaches. The key serves as the personal identifier. The pin tumblers that recognise the key inside the lock serve as the authenticator. And the latch serves as the block. All electronic gun safety systems must accomplish all three of these basic functions — identify authorised shooters, authenticate their credentials and then release the block to the firing mechanism.

    How one satisfies those needs is subject to the performance constraints of the application environment and the physical constraints of the weapon itself. These differences create distinct branches on the family tree of personalised weapons technology.

    One group of solutions owes its heritage to the NIJ study focused on protecting police weapons from takeaway during a close quarters struggle. It suggested a token-based proximity sensor using radio frequency identification (RFID). A number of working RFID prototype guns have been demonstrated, beginning with Colt’s 1996 handgun and including Triggersmart, iGun M-2000 and the Armatix iP1.

    In a badge, wristband or ring, a user wears a passive RFID tag, like those embedded in products to prevent shoplifting. It’s the “token” and serves as the key in the front door metaphor. Like a physical key, it can be duplicated or shared. What matters is possession of the token, not the identity of the token holder.

    A wireless RFID reader is built into the gun and serves the role of authenticator. It generates a signal that activates the RFID tag to respond with an embedded code. If there’s a match, the electromechanical components unblock the weapon firing system and the gun functions normally. The response time of these systems is generally dependent on the choice of electromechanical components used in the blocking system (such as servomotors, solenoids, shape memory metals), but are generally less than half a second. By design, the gun can remain active as long as there is a signal link, or in some configurations as long as pressure sensors detect the gun is being held.

    If the tag is too far away from the transmitter to self-activate and respond, then it’s like losing your key to the front door — the gun remains locked down. The Armatix iP1, for example, specifies a range of 15 inches. If you try to spoof the transponder with a signal that does not contain the individual code, it’s like using the wrong key — it may fit the slot but cannot be turned because it does not match the tumblers — and the gun remains locked down.

    The iGun’s RFID-type system is locked in the upper photo. In the inset, a user’s tag (in the form of a ring) is close enough and the weapon is ready to fire, with the firing mechanism no longer blocked
    The iGun’s RFID-type system is locked in the upper photo. In the inset, a user’s tag (in the form of a ring) is close enough and the weapon is ready to fire, with the firing mechanism no longer blocked

    Various designs interfere with the mechanical firing mechanism in different places – from trigger bar to firing pin. There are also different technologies including solenoid actuators, shape memory alloy-based components and even electronic firing systems that serve as the deadbolt to be released upon receiving an authentication system. The details are proprietary to the individual products on the market and reflect design trade-offs in power consumption, free space to accommodate components and response time.

    Proximity of gun to token is not an absolute determinant of rightful possession during a close-quarters struggle. But the technology does offer simplicity of operation, easy weapons exchange across permitted users (that is, partners) and reliably disables a weapon from use if the officer has been overpowered and the duty weapon taken.

    Do I know you?
    The benefits of a token-based system in a street encounter become a liability in the home. The viability of the approach is wholly dependent on the owner securing the token where it cannot be accessed by denied users. But guns used for home protection are more likely to have token and weapon stored together to prevent any delay in the event of an intrusion. And anyone who has both the token and the weapon can fire it.

    A second group of technologies evolved in response to child-safe handgun legislation adopted in New Jersey and Maryland in the US in the early 2000s, designed to prevent unauthorised use of personal firearms stored in the home. Biometric authentication systems eliminate the physical token. Instead, a measurable physical characteristic of any authorised user becomes the key. It can’t be taken without permission, counterfeit or otherwise transferred.

    To date, fingerprints have been the primary attribute used in biometric systems. Kodiak Arms Intelligun and Safe Gun Technology’s retrofit for rifles use fingerprint detection as a primary mode of security. If the fingerprint is the key, then the sensor and pattern matching software are the pin tumblers that perform the authentication function in these guns.

    The most widely used sensor technology relies on capacitance imaging of the fingerprint. The variation in distance between the ridges and grooves of the finger and the sensor plate creates a distribution of electrical charge storage (capacitance) that can be measured in an array of conductor plates in the sensor. Other fingerprint sensors rely on infrared (thermal) imaging, and some use pressure detection to create a digital pattern that is a unique representation of the print.

    Various groups are working on different ways to use fingerprint recognition to authenticate whose hand is on a gun. Kai Kloepfer, CC BY-ND
    Various groups are working on different ways to use fingerprint recognition to authenticate whose hand is on a gun. Kai Kloepfer, CC BY-ND

    The sensor software needs to be trained to store acceptable patterns that may represent different fingers of a single user or various fingers from multiple authorised users. After that, any pattern that doesn’t match within some specified tolerance is rejected. The reliability of the authentication process is influenced by the resolution of the sensor, the extent and orientation of the exposed finger, and physical factors that can interfere with the mapping. For example, moisture on the finger can defeat a capacitive detector, cold fingers can reduce the reliability of thermal imaging, and dirt, paint or gloves can obscure the fingerprint beyond recognition.

    There are other types of biometric security being explored. One prototype sponsored by NIJ adopted vascular biometrics that detect the blood vessel structure below the skin surface. An emerging class of biometrics are dynamic or behavioural and combine some element of individualised physicality amplified by learned patterns of behaviour. For instance, voice identification combines the structure of one’s vocal chords with the breath patterns of speech learned in infancy.

    NJIT prototype with Dynamic Grip Recognition sensors embedded in the handgun grip
    NJIT prototype with Dynamic Grip Recognition sensors embedded in the handgun grip

    Electronic signature authentication captures the speed and pressure of pen on LCD pad (and not the image of the signature) as the signer executes handwriting in a pattern ingrained early in life.

    Over the last 15 years, our research team at the New Jersey Institute of Technology (NJIT) has developed a gun safety system based on a novel behavioural biometric called Dynamic Grip Recognition (DGR). The team demonstrated that changes over time to the pressure pattern created on the grip of a handgun as one counter-braces the force of trigger pull were individual to the user, reproducible and measurable.

    Our prototype detects grip patterns during the first one-tenth of a second of trigger pull and unlocks the weapon with no apparent lag to the shooter. Because DGR works during trigger pull of a properly held weapon, the approach can also reduce accidental firings during mishandling of a loaded weapon.

    Can I trust you?
    Reliability is always a concern raised in discussions of electronic gun safety systems.

    The interior of a firing weapon is not a friendly environment for electronics, but there is now a sufficient history of ruggedised circuitry that failure rates of the underlying electronic hardware are orders of magnitude less than the predicted failure rates of the mechanical weapon (somewhere between one in 1 000 and one in 10 000 depending on the precision and quality of the weapon).

    Power is clearly a concern here, too. But advances in microprocessor technology and battery storage that have been driven by smartphones and portable electronics remove this issue as a showstopper. Motion detection and wake-up software can reduce battery drain during storage. Integrating the power supply to the ammunition clip and even charging by mechanical cycling are all ways to address power loss as a mode of failure.

    In biometric systems, there is another element to consider: failure of the identification algorithm. Those are false negatives in which a rightful user is not recognised, or false positives in which an impostor is wrongly authenticated. The recognition rates for fingerprint detectors have been claimed to be as high as 99,99% (one in 10 000 failure rate).

    As the array of sensor technologies grows, one might expect a multisensor or multispectral approach to be the ultimate choice for biometric-based systems. These have the advantage of multiplying reliability rates when independent measures are used. For example, a fingerprint sensor with a one-in-10 000 failure rate, coupled with a dynamic grip recognition with a failure rate of one in 1 000, would produce a combined reliability of 1 in 10 000 x 1 000 or one in 10 000 000.

    The author describes personalised weapons research at NJIT:

    Will we ever be able to buy one?
    Throughout the 20-year-long discussion of “smart guns”, the topic has been a lightning rod for debate between pro- and anti-gun lobbies. But too often there isn’t substantive knowledge of the underlying technologies, their appropriate use and their design limitations.

    Personalised weapons technology can make a contribution to reducing death and injury from accidental or unauthorised weapons use. It is not a panacea — the technology can’t stop shootings like Virginia Tech, Aurora or Sandy Hook in the US, where lawfully purchase weapons were used. But it can be an option for gun buyers to ensure their weapons never fall into the wrong hands.

    The existing platforms show that smart guns are not science fiction and could be a commercial reality much sooner than later. A recent survey by the NIJ identified 13 different personalised weapon systems, at least three of which were deemed to be in commercial preproduction. Obama’s initiative could be an important step to accelerate development and promote private sector investment necessary to mature these technologies to the point of reliability and affordability that will spur consumer adoption.The Conversation

    • Donald Sebastian is professor of chemical, biological and pharmaceutical engineering, New Jersey Institute of Technology
    • This article was originally published on The Conversation
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleEOH rises after voluntary update
    Next Article Why Uber’s surge pricing is naive economics

    Related Posts

    MultiChoice scraps annual DStv price hikes for 2026 - David Mignot

    MultiChoice scraps annual DStv price hike

    20 February 2026
    What Gen Z really thinks about the tech world it inherited - Tinashe Mazodze

    What Gen Z really thinks about the tech world it inherited

    20 February 2026
    Showmax 'can't continue' in its current form

    Showmax ‘can’t continue’ in its current form

    20 February 2026
    Company News
    Service is everyone's problem now - and that's exactly why the Atlassian Service Collection matters

    Service is everyone’s problem now – why the Atlassian Service Collection matters

    20 February 2026
    Customers have new expectations. Is your CX ready? 1Stream

    Customers have new expectations. Is your CX ready?

    19 February 2026
    South Africa's cybersecurity challenge is not a tool problem - Nicholas Applewhite, Trinexia South Africa

    South Africa’s cybersecurity challenge is not a tool problem

    19 February 2026
    Opinion
    A million reasons monopolies don't work - Duncan McLeod

    A million reasons monopolies don’t work

    10 February 2026
    The author, Business Leadership South Africa CEO Busi Mavuso

    Eskom unbundling U-turn threatens to undo hard-won electricity gains

    9 February 2026
    South Africa's skills advantage is being overlooked at home - Richard Firth

    South Africa’s skills advantage is being overlooked at home

    29 January 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    MultiChoice scraps annual DStv price hikes for 2026 - David Mignot

    MultiChoice scraps annual DStv price hike

    20 February 2026
    What Gen Z really thinks about the tech world it inherited - Tinashe Mazodze

    What Gen Z really thinks about the tech world it inherited

    20 February 2026
    Showmax 'can't continue' in its current form

    Showmax ‘can’t continue’ in its current form

    20 February 2026
    Free Market Foundation slams treasury's proposed gambling tax

    Free Market Foundation slams treasury’s proposed gambling tax

    20 February 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}