Abstract:
A method and apparatus are provided, for accessing a data-capture device in a different domain, by public safety wireless communications equipment, for the purpose of obtaining information at an incident. A dispatch controller of a public safety wireless communications system receives an access token from a server of a non-public-safety network, when an incident occurs. The token allows access to a data-capture device, and is associated with the incident. The dispatch controller sends the token to the data-capture device, receives a data stream, and forwards the data stream to a public safety wireless communication device. The public safety wireless communication device may itself discover and access the data-capture device, and may receive the data stream directly from the data-capture device. The public safety wireless communication device may forward the data stream and/or the access token to other public safety wireless communication devices.
Abstract:
A method and apparatus are provided, for accessing a data-capture device in a different domain, by public safety wireless communications equipment, for the purpose of obtaining information at an incident. A dispatch controller of a public safety wireless communications system receives an access token from a server of a non-public-safety network, when an incident occurs. The token allows access to a data-capture device, and is associated with the incident. The dispatch controller sends the token to the data-capture device, receives a data stream, and forwards the data stream to a public safety wireless communication device. The public safety wireless communication device may itself discover and access the data-capture device, and may receive the data stream directly from the data-capture device. The public safety wireless communication device may forward the data stream and/or the access token to other public safety wireless communication devices.
Abstract:
Technical methods, devices, and systems disclosed herein provide a predictive case-solvability score service. The predictive case-solvability score service generates case solvability scores for cases, detects events that signal those scores should be updated, updates a machine-learning model over time to ensure current trends in recent data are reflected, and identifies specific actions to recommend for increasing those scores. Furthermore, the predictive case-solvability score service provides an interface that allows users to perceive trends in case-solvability scores over time and to execute some of the specific recommended actions.
Abstract:
A method and apparatus for detecting that a stun gun has been deployed is provided herein. During operation a periodic nature of a stun-gun voltage will be utilized to determine if the stun-gun has been fired. More specifically, an electric/magnetic field (EMF) and/or a sound will be analyzed to determine if the periodic nature of the EMF and/or sound matches that of a stun gun. If so, a command center will be notified of the event. In order to increase the accuracy of any stun-gun detect, a gun-draw sensor may be used in combination with the above technique.
Abstract:
A device, system and method for managing access authorization is provided. A request to alter access authorization of one or more devices assigned to a user is received at a computing device. The computing device determines at least one contextual condition associated with at least one of the one or more devices. The computing device determines, based on the at least one contextual condition, a subset of the one or more devices for which the access authorization is to be altered to include at least one other user. The computing device alters the access authorization of the subset of the one or more devices to include the at least one other user, such that the at least one other user is granted access to the subset of the one or more devices.
Abstract:
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key derived on a fixed system for the deployable system based on an existing key stored on a database of the fixed system, wherein the existing key is used to authenticate a communication device. The deployable system stores the derived key. Subsequent to the storing, the deployable system is activated to provide communication resources to communication devices disconnected from the fixed system. The activated deployable system is not connected to the fixed system. The activated deployable system receives an authentication request from the communication device requesting connection to the deployable system; generates authentication vectors using the at least one derived deployable key; and authenticates an authentication response received from the communication device using the authentication vectors.
Abstract:
A method and apparatus for forwarding detected environmental conditions are provided herein. During operation, sensors will continuously sample an environment surrounding a public-safety officer. The sensors are preferably body-worn sensors, but could be vehicle or incident area sensors as well. The sensors continuously monitor and report any detected condition to a hub (which could be body-worn) as a local status alert message. Once the hub receives a detected condition within a local status alert, the hub will make a determination if a dispatch center needs to be notified of the detected condition. The notification of the condition is transmitted to the dispatch center as a global status alert, which may simply comprise a forwarded local status alert.