Abstract:
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key derived on a fixed system for the deployable system based on an existing key stored on a database of the fixed system, wherein the existing key is used to authenticate a communication device. The deployable system stores the derived key. Subsequent to the storing, the deployable system is activated to provide communication resources to communication devices disconnected from the fixed system. The activated deployable system is not connected to the fixed system. The activated deployable system receives an authentication request from the communication device requesting connection to the deployable system; generates authentication vectors using the at least one derived deployable key; and authenticates an authentication response received from the communication device using the authentication vectors.
Abstract:
A method and a profile manager for managing user and device profiles for response to one or more incidents include monitoring inputs related to one or more networks, a plurality of devices, and the one or more incidents; determining application requirements and profile configurations for the plurality of devices based on the inputs from the one or more networks and the one or more incidents; and for each of the plurality of devices, providing applications based on the application requirements if required and providing the profile configurations for operation on the one or more networks during the one or more incidents.
Abstract:
A method and apparatus are provided, for accessing a data-capture device in a different domain, by public safety wireless communications equipment, for the purpose of obtaining information at an incident. A dispatch controller of a public safety wireless communications system receives an access token from a server of a non-public-safety network, when an incident occurs. The token allows access to a data-capture device, and is associated with the incident. The dispatch controller sends the token to the data-capture device, receives a data stream, and forwards the data stream to a public safety wireless communication device. The public safety wireless communication device may itself discover and access the data-capture device, and may receive the data stream directly from the data-capture device. The public safety wireless communication device may forward the data stream and/or the access token to other public safety wireless communication devices.
Abstract:
The present disclosure provides systems and methods for determining priority discrepancies between audio data and records data. In one example, the system includes an electronic computing device. The electronic computing device compares audio data associated with a public safety incident to records data associated with the public safety incident, determines discrepancies between the audio data and the records data, and determines an organization and a type associated with the public safety incident. The electronic computing device also determines, based on the organization and the type, priority discrepancies included in the discrepancies and generates a geographical map that includes the priority discrepancies and that is configured for display on a display device.
Abstract:
One example device includes an electronic processor configured identify, based on an incident type and a role of an object associated with a public safety incident, an uncompleted task that is to be performed by a public safety officer and that is associated with the object associated with the public safety incident. The electronic processor may be configured to identify first data included in a captured data file associated with the public safety incident that was generated at least partially by monitoring the object. The electronic processor may be configured to determine a time period within the captured data file during which the first data is identified to be present, and display an indication of the uncompleted task and at least one of the time period within the captured data file, the first data, and a user-selectable link to allow a user to consume the first data.
Abstract:
A computer apparatus, such as a validator node, for validating incident-related data records in a distributed electronic ledger is configured to receive a request from an agent to add a proposed incident-related data record associated with an incident to the distributed electronic ledger. In response to the proposed incident-related data record, the computer apparatus determines, from the distributed electronic ledger, one or more attributes of the agent or incident. The computer apparatus determines whether the proposed incident-related data record satisfies validation criteria based at least partially on the one or more attributes of the agent or incident. Once validated, the computer apparatus may then append the proposed incident-related data record to the distributed electronic ledger. Alternatively, the proposed incident-related data record may be appended regardless of validity, but an indication of validity may be appended if the proposed incident-related data record is validated.
Abstract:
Systems and methods for transmitting near real-time geographic mass messaging requests. One example method includes receiving a geographic mass messaging request via a transceiver, the geographic mass messaging request including a message, a geographic reference, and a requesting agency identifier, and having at least one request characteristic. The method includes assigning, with an electronic processor, a priority to the geographic mass messaging request based on an electronically stored alerting authority policy and at least one selected from the group consisting of the requesting agency identifier, the geographic reference, and the at least one request characteristic. The method includes, responsive to determining that the priority does not meet a priority threshold, transmitting one of a request denied message and a request modification proposal via the transceiver to the requesting agency.
Abstract:
A device, system and method for duplicate call handling at a public-safety answering point (PSAP) device is provided. The PSAP device: routes a call from a caller to a call-taker, the call associated with an incident; receives, via an input device of the call-taker, information related to the incident to populate a record associated with the call; prior to the record being complete, receives, via the input device, input to handover the call to an information collection application, the input indicative of the call being a duplicate call; determines, via the information collection application, remaining information to be collected based on one or more of: a duplicate call policy and the information already received; receives, via the information collection application to verbally communicating with the caller on the call, at least a portion of the remaining information to continue to populate the record; and ends the call.
Abstract:
Systems and methods for sharing on-scene camera intelligence, available at crime center computing devices, with call handling and CAD computing devices. One example call handling computing device includes an electronic processor configured to receive a call from a remote caller and caller location information. The electronic processor is further configured to transmit, to a crime center computing device, a camera availability request including the caller location information. The electronic processor is also configured to receive, from the crime center computing device, an indication of available cameras substantially at the location of the remote caller and status information for the available cameras. The electronic processor is further configured to provide a call handling user with the status information. The electronic processor is also configured to receive, from the crime center computing device, at least one of video intelligence derived from the available cameras or video feeds from the available cameras.
Abstract:
Recommending public safety resource allocation. An electronic computing device includes a network interface configured to receive a data feed from a network-connectable device. The data feed includes information related to a public safety incident. The electronic computing device further includes an electronic processor configured to determine an incident type of the public safety incident based on the information included in the data feed. The electronic processor is further configured to determine a trust score for the data feed as a function of one or more public safety parameters associated with the network-connectable device. The electronic processor is further configured to identify a public safety resource to respond to the public safety incident based on the trust score, the information included in the data feed, and the incident type. The electronic processor is further configured to provide a recommendation that the public safety resource respond to the public safety incident.