Abstract:
The present disclosure provides systems, methods, and apparatuses for a predictive response-generation service to facilitate timely compliance with information-disclosure laws. When an event associated with an electronic data collection is detected, a set of features is extracted for the electronic data collection. The features are input into a machine-learning model to generate a request-prediction score. If the probability of receiving a request for data in the electronic data collection meets a threshold, a redaction operation specified by a redaction policy is executed on the electronic data collection to generate a modified electronic data collection. The modified electronic data collection, which is a redacted version of the electronic data collection, is transmitted to a digital response repository.
Abstract:
A method for public safety answering point to emergency operations center communications is provided. The method may comprise monitoring incidents at a public safety answering point (PSAP) to determine how many incidents are emergency operations center (EOC) affecting incidents. The method may further comprise determining a PSAP status, the status based in part on the EOC affecting incidents. The method may further comprise sending the PSAP status to an EOC, wherein the EOC determines if a response will be initiated, based, in part, on the PSAP status. The method may further comprise receiving an indication from the EOC that the response will be initiated. The method may further comprise altering a PSAP operations based on the EOC initiating the response.
Abstract:
A method for registering an Internet of Things (IoT) device to an incident IoT ledger system is provided. An IoT device is installed at a location. At least one feature of the IoT device is prevented from functioning the IoT device is registered with an incident IoT ledger system. Upon registering incident-relevant attributes associated with the IoT device and the location of the IoT device with an incident IoT ledger system, full functioning of the IoT device is enabled after successful registration with the incident IoT ledger system.
Abstract:
A computer apparatus, such as a validator node, for validating incident-related data records in a distributed electronic ledger is configured to receive a request from an agent to add a proposed incident-related data record associated with an incident to the distributed electronic ledger. In response to the proposed incident-related data record, the computer apparatus determines, from the distributed electronic ledger, one or more attributes of the agent or incident. The computer apparatus determines whether the proposed incident-related data record satisfies validation criteria based at least partially on the one or more attributes of the agent or incident. Once validated, the computer apparatus may then append the proposed incident-related data record to the distributed electronic ledger. Alternatively, the proposed incident-related data record may be appended regardless of validity, but an indication of validity may be appended if the proposed incident-related data record is validated.
Abstract:
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key derived on a fixed system for the deployable system based on an existing key stored on a database of the fixed system, wherein the existing key is used to authenticate a communication device. The deployable system stores the derived key. Subsequent to the storing, the deployable system is activated to provide communication resources to communication devices disconnected from the fixed system. The activated deployable system is not connected to the fixed system. The activated deployable system receives an authentication request from the communication device requesting connection to the deployable system; generates authentication vectors using the at least one derived deployable key; and authenticates an authentication response received from the communication device using the authentication vectors.
Abstract:
A method and a profile manager for managing user and device profiles for response to one or more incidents include monitoring inputs related to one or more networks, a plurality of devices, and the one or more incidents; determining application requirements and profile configurations for the plurality of devices based on the inputs from the one or more networks and the one or more incidents; and for each of the plurality of devices, providing applications based on the application requirements if required and providing the profile configurations for operation on the one or more networks during the one or more incidents
Abstract:
The same priority is applied to all resources assigned to an incident. A first dispatch system in a first network assigns a network resource in the first network to an incident that occurred in a first jurisdiction. The first dispatch system requests a mutual aid resource from a second dispatch system in a second network subsequent to identifying a resource gap in the first network. The first dispatch system obtains the mutual aid resource from the second dispatch system. A first policy component in the first network receives, from at least one of a first prioritization service in the first network and the at least one second network, at least one of an incident information or a mutual aid information. The first policy component correlates the mutual aid resource with obtained incident information and assigns a same priority to the network resource and the mutual aid resource.
Abstract:
Techniques to support human-machine interactions for public safety annotations are provided. Live streamed media that includes at least one of audio and video is received. The live streamed media is replicated. The replicated live streamed media is sent to at least two of an artificial intelligence bot and a human for annotation. A conflict between the annotations is detected. The conflict is resolved via an agency selected annotation conflict resolution policy.
Abstract:
An apparatus, system and method for wirelessly charging are provided within a vehicular environment. The wireless charging system (500) comprises a seatbelt receptacle (102) containing a transmit coil (104) integrated therein for transmitting a charging signal to a battery or powering a battery operated device. A repeater coil (506) may be wirelessly coupled to the transmit coil (104) via the seatbelt's buckle, as a buckle repeater coil (206) or a retrofit cover repeater coil (308). Additional repeater coils (514, 524) may be added to a shoulder strap (510), lap strap (520), or other portions of the seat belt harness for additional charging points. The additional repeater coils (514, 524) are slideable to adjust for different body sizes. One or more portable devices having receive coils can be charged or powered wirelessly from the transmit coil (104) in the seatbelt receptacle (102), the repeater coil (506) of the seatbelt buckle or cover, and/or the additional adjustable strap repeater coils (514, 524).
Abstract:
A first mobile station operating on a first network according to a first network protocol receives a proxy request for access to a network resource, by from a second mobile station operating on a second network according to a second network protocol. The proxy request is received according to a third network protocol. The first mobile station determines a priority of the proxy request; accepts or denies the proxy request based on the determined priority of the proxy request; allocates resources to the proxy request, if the proxy request is accepted; and serves as a proxy mobile station for the second mobile station to access the network resource.