SlideShare une entreprise Scribd logo
1  sur  16
Department of Electrical & Electronics Engineering
Topic:- MICROCONTROLLER BASED WEAPON
              AUTHENTICATION
         Guided by:- Smt. Rashmi Pawar
                 Presented by:-
                  Amruta Dixit
          University NO:- 2BL08EE004
1)   Abstract
2)   Introduction
3)   General working principle
4)   Existing authentication tech
5)    Drawbacks
6)   Conclusion
7)   Bibliography
 Today  our world is facing one of the big threats of
 terrorism. A very recent attack on our country which
 can never be forgettable is 26/11 attack on Mumbai.
 Terrorists armed with deadly weapons such as AK-
 47, grenades etc attacked the mob killing hundreds.
 These terrorists were using weapons from falling into
 wrong hands & strengthen our defense system, many
 engineers & technologists have come up with an idea
 to authenticate weapons by providing acess of the
 weapon to valid user.
 Terrorists  used weapons which are smuggled
  illegally. Hence stopping weapons from falling into
  the wrong hands is a major problem for law &
  enforcement agencies.
 To protect these weapons new technique is evolved
  i.e. weapon authentication.
 Weapon is a tool used to destroy the enemy or used
  for self defense.
 Authentication gives the meaning of authorization.
 Weapon Authentication is summarized as a technique
  used for authorization of weapon.
 Terrorists& underworld criminals use stolen
  weapons which are smuggled & used illegally.
 People who own guns for their personal use may face
  problems as Kids at home unknowingly may make
  childish use of guns.
 Many times during fight criminals may steal
  Policeman’s gun & use them illegally.
 These problems ask us to think about developing
  safety & security mechanism for fire arms so that
  only authorized users can use the weapon.
 Here  the authentication can be done using RFID tag
  & reader.
 Licensed user will be provided with a tag with
  specific user ID.
 When weapon is set to validation RFID reader reads
  RFID tag.
 RFID reader sends the read data to microcontroller
  chip where authorization of user is checked.
 If a person is authorized the microcontroller unlocks
  the gun by instructing magnetic locks.
 Here  authorization of user can be checked by using
  finger print scanner.
 Finger print of user is scanned by finger print
  scanner.
 Scanner sends the data to microcontroller chip where
  authorization of user is checked.
 If a person is authorized the microcontroller unlocks
  the gun by instructing magnetic locks.
a)   The O’dwyer’s VLE smart gun
    Electronically fired gun & launcher design.
    Multiple barrels with multiple rounds stacked in
     each barrel.
    It allows user to select b/w different types of round.
    No mechanical parts involved.
    Validates the exact finger print of the user.
 It is a new computer chip promises to keep police
  guns away from firing if they fall into wrong hands.
 It uses RFID technology.
 This tiny chip is implanted b/w the shoulder & elbow
  area of user’s hand.
 Chip needs no battery or power source.
 Reloading  mechanism is tedious for VLE guns.
 Scanning device could malfunction.
 Veri chip may get lost or may get smashed during
  fight.
 The system can be hacked & reprogrammed.
 Weapon usage cannot be traced.
 In today’s world technology has advanced to great
  extent.
 Many concept which were impractical to hear have
  now become reality.
 In this modern world developing smart weapons
  would be a hope for better future.
 In future illegal training of weapons may come to an
  end.
 Developing smart weapons will also help armies &
  federal bodies in fighting crimes in better ways.
 www.popularmechanics.com
 www.sciencecentral.com
 www.popsci.com
 www.wikipedia.org
 www.militaryphotos.net

Contenu connexe

En vedette

Painel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperiencePainel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperienceUKinBrazilNetwork
 
Tsunami detection system
Tsunami detection systemTsunami detection system
Tsunami detection systemsrinithiv
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsAbhishek Mishra
 
ELectricity from Ocean Waves
ELectricity from Ocean WavesELectricity from Ocean Waves
ELectricity from Ocean WavesJeffrey Funk
 
Advanced softwares used in civil engineering
Advanced softwares used in civil  engineeringAdvanced softwares used in civil  engineering
Advanced softwares used in civil engineeringVinaykumar Koli
 
Managing Earthquakes
Managing EarthquakesManaging Earthquakes
Managing Earthquakespeishi huang
 
Civil engineering powerpoint
Civil engineering powerpointCivil engineering powerpoint
Civil engineering powerpointchrisminer01
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101Bud Caddell
 

En vedette (9)

Painel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperiencePainel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy Experience
 
Tsunami detection system
Tsunami detection systemTsunami detection system
Tsunami detection system
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
ELectricity from Ocean Waves
ELectricity from Ocean WavesELectricity from Ocean Waves
ELectricity from Ocean Waves
 
Advanced softwares used in civil engineering
Advanced softwares used in civil  engineeringAdvanced softwares used in civil  engineering
Advanced softwares used in civil engineering
 
Managing Earthquakes
Managing EarthquakesManaging Earthquakes
Managing Earthquakes
 
Civil Engineering
Civil EngineeringCivil Engineering
Civil Engineering
 
Civil engineering powerpoint
Civil engineering powerpointCivil engineering powerpoint
Civil engineering powerpoint
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101
 

Similaire à weapon authentication

Biometric/fingerprint in guns
Biometric/fingerprint in gunsBiometric/fingerprint in guns
Biometric/fingerprint in gunsKartik Verma
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national securityMUTHU LAKSHMI
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxVaibhavYadav297587
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxNarangYadav
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
3d pass words
3d pass words3d pass words
3d pass wordsmkanth
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 

Similaire à weapon authentication (20)

Biometric/fingerprint in guns
Biometric/fingerprint in gunsBiometric/fingerprint in guns
Biometric/fingerprint in guns
 
journal
journaljournal
journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
D0351022026
D0351022026D0351022026
D0351022026
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
3d pass words
3d pass words3d pass words
3d pass words
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 

Dernier

The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 

Dernier (20)

The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 

weapon authentication

  • 1. Department of Electrical & Electronics Engineering Topic:- MICROCONTROLLER BASED WEAPON AUTHENTICATION Guided by:- Smt. Rashmi Pawar Presented by:- Amruta Dixit University NO:- 2BL08EE004
  • 2. 1) Abstract 2) Introduction 3) General working principle 4) Existing authentication tech 5) Drawbacks 6) Conclusion 7) Bibliography
  • 3.  Today our world is facing one of the big threats of terrorism. A very recent attack on our country which can never be forgettable is 26/11 attack on Mumbai. Terrorists armed with deadly weapons such as AK- 47, grenades etc attacked the mob killing hundreds. These terrorists were using weapons from falling into wrong hands & strengthen our defense system, many engineers & technologists have come up with an idea to authenticate weapons by providing acess of the weapon to valid user.
  • 4.  Terrorists used weapons which are smuggled illegally. Hence stopping weapons from falling into the wrong hands is a major problem for law & enforcement agencies.  To protect these weapons new technique is evolved i.e. weapon authentication.  Weapon is a tool used to destroy the enemy or used for self defense.  Authentication gives the meaning of authorization.  Weapon Authentication is summarized as a technique used for authorization of weapon.
  • 5.  Terrorists& underworld criminals use stolen weapons which are smuggled & used illegally.  People who own guns for their personal use may face problems as Kids at home unknowingly may make childish use of guns.  Many times during fight criminals may steal Policeman’s gun & use them illegally.  These problems ask us to think about developing safety & security mechanism for fire arms so that only authorized users can use the weapon.
  • 6.
  • 7.  Here the authentication can be done using RFID tag & reader.  Licensed user will be provided with a tag with specific user ID.  When weapon is set to validation RFID reader reads RFID tag.  RFID reader sends the read data to microcontroller chip where authorization of user is checked.  If a person is authorized the microcontroller unlocks the gun by instructing magnetic locks.
  • 8.
  • 9.  Here authorization of user can be checked by using finger print scanner.  Finger print of user is scanned by finger print scanner.  Scanner sends the data to microcontroller chip where authorization of user is checked.  If a person is authorized the microcontroller unlocks the gun by instructing magnetic locks.
  • 10. a) The O’dwyer’s VLE smart gun  Electronically fired gun & launcher design.  Multiple barrels with multiple rounds stacked in each barrel.  It allows user to select b/w different types of round.  No mechanical parts involved.  Validates the exact finger print of the user.
  • 11.
  • 12.  It is a new computer chip promises to keep police guns away from firing if they fall into wrong hands.  It uses RFID technology.  This tiny chip is implanted b/w the shoulder & elbow area of user’s hand.  Chip needs no battery or power source.
  • 13.
  • 14.  Reloading mechanism is tedious for VLE guns.  Scanning device could malfunction.  Veri chip may get lost or may get smashed during fight.  The system can be hacked & reprogrammed.  Weapon usage cannot be traced.
  • 15.  In today’s world technology has advanced to great extent.  Many concept which were impractical to hear have now become reality.  In this modern world developing smart weapons would be a hope for better future.  In future illegal training of weapons may come to an end.  Developing smart weapons will also help armies & federal bodies in fighting crimes in better ways.
  • 16.  www.popularmechanics.com  www.sciencecentral.com  www.popsci.com  www.wikipedia.org  www.militaryphotos.net