Abstract:
Disclosed herein are methods and systems for allocating resources from component carriers to a public-safety mobile radio. An embodiment takes the form of a process that is carried out by carried out by a Long-Term Evolution (LTE) Evolved Node B (eNodeB). The eNodeB makes a first determination to allocate resources to a given mobile radio. The eNodeB makes a second determination that the given mobile radio is a public-safety mobile radio. In response to making the first and second determinations, the eNodeB selects, based on one or more public-safety-communication criteria, a component carrier from among a plurality of component carriers managed by the eNodeB. The eNodeB allocates resources on the selected eNodeB component carrier to the given mobile radio.
Abstract:
Primary and/or secondary communication groups can be assigned to users with communication devices arranged in a hierarchy (FIG. 4). A set of humans are assigned to a role in a role-based hierarchy. A communication device (404) is assigned to the set of humans for communication over a network. One or more secondary communication groups are determined for the communication device (120). The one or more determined secondary communication groups are primary communication groups of other devices used by one or more other humans assigned roles in the role-based hierarchy. Secondary communication group settings are programmed for the communication device (124), where the group settings are consistent with the determined secondary communication groups.
Abstract:
A context-based method, a server implementing a group management function, and a mobile device predicate content delivery between mobile devices based on context. The context can include sensed events at one mobile device such as, without limitation, motion, prone positions, stress, injury, and the like. The context triggered update systems and methods can operate between two mobile devices where a determination of the context on a first mobile device formulates an update to a second mobile device with the update presented to the second mobile device based on the context. That is, the context from the first mobile device is used to formulate an update and an optimal delivery method to the second mobile device.
Abstract:
Analytic and tracking systems and methods are described that use over-the-air identifiers (OTAIs) of mobile devices for tracking, dispatch, identification, etc. In particular, the analytic and tracking systems and methods can include various OTAI sensors that are communicatively coupled to a server and with one another. The OTAI sensors are configured to identify proximate mobile devices concurrent with at least one additional piece of information. The analytic and tracking systems and methods can process identified mobile devices and the additional pieces of information for a plurality of applications.
Abstract:
Techniques to support human-machine interactions for public safety annotations are provided. Live streamed media that includes at least one of audio and video is received. The live streamed media is replicated. The replicated live streamed media is sent to at least two of an artificial intelligence bot and a human for annotation. A conflict between the annotations is detected. The conflict is resolved via an agency selected annotation conflict resolution policy.
Abstract:
A method and apparatus for task-based allocation of services at an incident scene include determining assignments for a plurality of users at the incident scene, each of the plurality of users comprising a mobile device; identifying a group of the plurality of users performing a similar function near one another or at a same area; determining if the group is likely to be separated from a wireless local area network at the incident scene; and, in response to determining that the group is likely to be separated from the local area network, allocating service instances on at least one mobile device associated with the group.
Abstract:
A first mobile station operating on a first network according to a first network protocol receives a proxy request for access to a network resource, by from a second mobile station operating on a second network according to a second network protocol. The proxy request is received according to a third network protocol. The first mobile station determines a priority of the proxy request; accepts or denies the proxy request based on the determined priority of the proxy request; allocates resources to the proxy request, if the proxy request is accepted; and serves as a proxy mobile station for the second mobile station to access the network resource.
Abstract:
A system includes: a packet processing function and a packet modification function. The packet processing function receives a packet generated by a sending application function and destined for a receiving application function. The packet includes first identifier information, and the packet processing function adds second identifier information thereto. The packet modification function: receives the packet; alters it in a way that prevents use of the first identifier information by a 3GPP conforming service data flow detection process to map the packet to a first service data flow for the sending application function; and provides the packet to a packet routing function with the second identifier information positioned in the packet to enable the packet routing function to use the second identifier information in the 3GPP conforming service data flow detection process to map the packet to the first service data flow and to a bearer for transporting the packet.