Abstract:
A method for public safety answering point to emergency operations center communications is provided. The method may comprise monitoring incidents at a public safety answering point (PSAP) to determine how many incidents are emergency operations center (EOC) affecting incidents. The method may further comprise determining a PSAP status, the status based in part on the EOC affecting incidents. The method may further comprise sending the PSAP status to an EOC, wherein the EOC determines if a response will be initiated, based, in part, on the PSAP status. The method may further comprise receiving an indication from the EOC that the response will be initiated. The method may further comprise altering a PSAP operations based on the EOC initiating the response.
Abstract:
A computer apparatus, such as a validator node, for validating incident-related data records in a distributed electronic ledger is configured to receive a request from an agent to add a proposed incident-related data record associated with an incident to the distributed electronic ledger. In response to the proposed incident-related data record, the computer apparatus determines, from the distributed electronic ledger, one or more attributes of the agent or incident. The computer apparatus determines whether the proposed incident-related data record satisfies validation criteria based at least partially on the one or more attributes of the agent or incident. Once validated, the computer apparatus may then append the proposed incident-related data record to the distributed electronic ledger. Alternatively, the proposed incident-related data record may be appended regardless of validity, but an indication of validity may be appended if the proposed incident-related data record is validated.
Abstract:
Methods and systems for a collaborative work environment. One system includes a monitoring computer communicatively coupled to a first computer-aided workstation and a second computer-aided workstation. The monitoring computer includes an electronic processor configured to receive, from the first computer-aided workstation, a first datastream associated with a first incident, receive, from the second computer-aided workstation, a second datastream associated with at least one selected from the group consisting of a second incident and a user of the second computer-aided workstation, and analyze each of the first datastream and the second datastream to determine a collaboration recommendation. The electronic processor is further configured to transmit, to the first computer-aided workstation, a first request to participate in a collaborative work session and, to the second computer-aided workstation, a second request to participate in the collaborative work session in response to determining the collaboration recommendation.
Abstract:
A method and apparatus for detecting that a stun gun has been deployed is provided herein. During operation a periodic nature of a stun-gun voltage will be utilized to determine if the stun-gun has been fired. More specifically, an electric/magnetic field (EMF) and/or a sound will be analyzed to determine if the periodic nature of the EMF and/or sound matches that of a stun gun. If so, a command center will be notified of the event. In order to increase the accuracy of any stun-gun detect, a gun-draw sensor may be used in combination with the above technique.
Abstract:
An electronic processor is configured to determine sensor data reliability at an incident scene for real-time and post-incident processing. The electronic processor receives primary sensor data from a primary data source, retrieves secondary data associated with the primary sensor data, calculates a reliability index for the primary sensor data using the secondary data; compares the reliability index to a threshold and one of executes a particular action and applies a particular policy as a function of the comparison.
Abstract:
A method and apparatus are provided, for accessing a data-capture device in a different domain, by public safety wireless communications equipment, for the purpose of obtaining information at an incident. A dispatch controller of a public safety wireless communications system receives an access token from a server of a non-public-safety network, when an incident occurs. The token allows access to a data-capture device, and is associated with the incident. The dispatch controller sends the token to the data-capture device, receives a data stream, and forwards the data stream to a public safety wireless communication device. The public safety wireless communication device may itself discover and access the data-capture device, and may receive the data stream directly from the data-capture device. The public safety wireless communication device may forward the data stream and/or the access token to other public safety wireless communication devices.
Abstract:
A first mobile station operating on a first network according to a first network protocol receives a proxy request for access to a network resource, by from a second mobile station operating on a second network according to a second network protocol. The proxy request is received according to a third network protocol. The first mobile station determines a priority of the proxy request; accepts or denies the proxy request based on the determined priority of the proxy request; allocates resources to the proxy request, if the proxy request is accepted; and serves as a proxy mobile station for the second mobile station to access the network resource.
Abstract:
The same priority is applied to all resources assigned to an incident. A first dispatch system in a first network assigns a network resource in the first network to an incident that occurred in a first jurisdiction. The first dispatch system requests a mutual aid resource from a second dispatch system in a second network subsequent to identifying a resource gap in the first network. The first dispatch system obtains the mutual aid resource from the second dispatch system. A first policy component in the first network receives, from at least one of a first prioritization service in the first network and the at least one second network, at least one of an incident information or a mutual aid information. The first policy component correlates the mutual aid resource with obtained incident information and assigns a same priority to the network resource and the mutual aid resource.
Abstract:
A first mobile station operating on a first network according to a first network protocol receives a proxy request for access to a network resource, by from a second mobile station operating on a second network according to a second network protocol. The proxy request is received according to a third network protocol. The first mobile station determines a priority of the proxy request; accepts or denies the proxy request based on the determined priority of the proxy request; allocates resources to the proxy request, if the proxy request is accepted; and serves as a proxy mobile station for the second mobile station to access the network resource.