Abstract:
A device, system and method for communicating between devices using two protocols is provided. A request is received from a first device to communicate with a second device. A dedicated client operates according to a first protocol. A call server is operated according to a second protocol. An identifier is provided to the second device for requesting a web application for conducting a call via the call server, the identifier associated with the first and second device. A request, including the identifier is received and the web application is provided to the second device. A first call is set up between the dedicated client and a respective dedicated client. A second call is set up between the call server and the web application at the second device. The first call and the second call are connected to conduct an end-to-end call between the first and second device.
Abstract:
A method and device for dispatching data carrier devices is provided. The device comprises: a communication interface; and a controller. The controller is configured to: receive, using the communication interface, an incident report including a location of an associated incident; determine from the incident report: that the location has limited wireless coverage; and information that is to be transported to the location of the associated incident; identify a data carrier device that is capable of transporting the information to the location and is one or more of: presently storing at least a portion of the information; and capable of downloading any portion of the information that is not presently stored at the data carrier device; and transmit, using the communication interface, a dispatch command to the data carrier device to travel to the location; and an indication of the information to be transported to the location.
Abstract:
In response to detecting an incident at a building, a risk assessment for the building is performed. The risk assessment identifies dynamic security constraints for different locations at the building. A set of behavioral rules for controlling a sensor system at the building is updated based on the risk assessment to obtain an updated set of behavioral rules. The sensor system operating under the updated set of behavioral rules is referenced to detect a visitor at a location of the building during the incident. The location of the visitor is correlated to the risk assessment to determine a specific information security risk posed by the visitor. A recommended follow-up action is generated based on the specific information security risk.
Abstract:
A system for managing incidents includes an electronic display, an electronic processor coupled to the electronic display, and memory coupled to the electronic processor and storing instructions. The instructions, when executed by the electronic processor, cause the system to display an incident card on the electronic display, display first incident information on a front side of the incident card, receive a first user input indicating to flip to a back side of the incident card, determine user focus information, generate second incident information based on the user focus information, and display a back side of the card responsive to receiving the first user input. The back side includes the second incident information.
Abstract:
A device, system and method for controlling a passage barrier mechanism is provided. While failing to detect, via a biometric imaging system in communication with a passage barrier mechanism, unauthorized users in a first area of interest of the biometric imaging system, a device: maintains the passage barrier mechanism in a multiple entry state in which multiple users at a time authenticate, via the biometric imaging system, and enter therethrough. Responsive to detecting, via the biometric imaging system, an unauthorized user in the first area of interest, the device: transitions the passage barrier mechanism from the multiple entry state to a single entry state in which only a single user at a time authenticates, via the biometric imaging system, and enters therethrough; and changes a biometric authentication range of the biometric imaging system from the first area of interest to a smaller second area of interest.
Abstract:
One example device includes an electronic processor configured identify, based on an incident type and a role of an object associated with a public safety incident, an uncompleted task that is to be performed by a public safety officer and that is associated with the object associated with the public safety incident. The electronic processor may be configured to identify first data included in a captured data file associated with the public safety incident that was generated at least partially by monitoring the object. The electronic processor may be configured to determine a time period within the captured data file during which the first data is identified to be present, and display an indication of the uncompleted task and at least one of the time period within the captured data file, the first data, and a user-selectable link to allow a user to consume the first data.
Abstract:
A device, system and method for interoperability between digital evidence management systems (DEMS) is provided. A DEMS proxy computing device received, from a requesting device, a search string requesting digital evidence. The proxy provides, to a plurality of separate DEMS devices maintained by separate public safety agencies: corresponding search strings; and identification information identifying one or more of: a public safety role of a user of the requesting device, and a public safety agency membership of the user. The proxy receives, from at least a particular DEMS device, of the plurality of separate DEMS devices, a digital evidence record based on the search string, the digital evidence record describing a piece of digital evidence managed by the particular DEMS device, and including chain-of-custody information. The proxy provides, to the requesting device, the digital evidence record and the chain-of-custody information.
Abstract:
A policy determination function (PDF) makes policy and charging control decisions based on radio spectrum blocks. More particularly, the PDF: receives radio spectrum block data via an interface; and determines, using the radio spectrum block data, a first radio spectrum block for use during a session for a subscriber, wherein the first radio spectrum block is one of a plurality of radio spectrum blocks, and wherein the subscriber has a unique set of policy and charging control (PCC) rules corresponding to each of the radio spectrum blocks in the plurality. The PDF further selects and provides to a policy enforcement function the set of PCC rules for the subscriber corresponding to the first radio spectrum block, for applying to communications with the subscriber during the session.
Abstract:
A method and dispatch controller for assigning roles to responder units in a suspect pursuit. The method and controller include determining that the suspect pursuit is active and identifying a first responder unit as a pursuit unit to pursue the suspect. In response to a reevaluation trigger, the method and dispatch controller determine to reevaluate assignment of the pursuit unit. The reevaluation may occur, for example, when the pursuit unit is blocked by traffic or otherwise is separated from the suspect. Characteristic data is received regarding the responder units in response to the reevaluation trigger. The characteristic data is then evaluated to determine a suitability level of each of the responder units to be the pursuit unit. When the second responder unit has a higher suitability level than the first responder unit, the second responder unit is substituted as the pursuit unit.
Abstract:
Disclosed herein are methods and systems for allocating resources from component carriers to a public-safety mobile radio. An embodiment takes the form of a process that is carried out by carried out by a Long-Term Evolution (LTE) Evolved Node B (eNodeB). The eNodeB makes a first determination to allocate resources to a given mobile radio. The eNodeB makes a second determination that the given mobile radio is a public-safety mobile radio. In response to making the first and second determinations, the eNodeB selects, based on one or more public-safety-communication criteria, a component carrier from among a plurality of component carriers managed by the eNodeB. The eNodeB allocates resources on the selected eNodeB component carrier to the given mobile radio.