Abstract:
Analytic and tracking systems and methods are described that use over-the-air identifiers (OTAIs) of mobile devices for tracking, dispatch, identification, etc. In particular, the analytic and tracking systems and methods can include various OTAI sensors that are communicatively coupled to a server and with one another. The OTAI sensors are configured to identify proximate mobile devices concurrent with at least one additional piece of information. The analytic and tracking systems and methods can process identified mobile devices and the additional pieces of information for a plurality of applications.
Abstract:
A process for maintaining geofence definitions associated with criminal organizations includes maintaining, at an electronic computing device, a stored first geofence definition defining a geographic area associated with a first criminal organization. The computing device receives audio and/or video streams from devices located outside of and/or inside of a boundary of the first geofence definition, and detects, via the one or more audio and/or video streams, a pattern-of-conduct of one or more individuals associated with the first criminal organization or associated with another criminal organization known to have an adversarial relationship with the first criminal organization. Responsive to detecting the pattern-of-conduct the computing device expands or contracts a boundary of the first geofence definition to create an updated first geofence definition associated with the first criminal organization and provides the updated first geofence definition to one or more target devices for display or further electronic processing.
Abstract:
A method and apparatus for forwarding detected environmental conditions are provided herein. During operation, sensors will continuously sample an environment surrounding a public-safety officer. The sensors are preferably body-worn sensors, but could be vehicle or incident area sensors as well. The sensors continuously monitor and report any detected condition to a hub (which could be body-worn) as a local status alert message. Once the hub receives a detected condition within a local status alert, the hub will make a determination if a dispatch center needs to be notified of the detected condition. The notification of the condition is transmitted to the dispatch center as a global status alert, which may simply comprise a forwarded local status alert.
Abstract:
Techniques to support human-machine interactions for public safety annotations are provided. Live streamed media that includes at least one of audio and video is received. The live streamed media is replicated. The replicated live streamed media is sent to at least two of an artificial intelligence bot and a human for annotation. A conflict between the annotations is detected. The conflict is resolved via an agency selected annotation conflict resolution policy.
Abstract:
A process for electronically detecting a criminal organization out-of-boundary condition includes first maintaining a stored first geofence definition defining a geographic area associated with a first criminal organization. One or more audio and/or video streams or RF identifiers from recording devices located outside of the first geofence definition are received. An out-of-boundary condition is then detected in the streams or identifiers in which an individual determined to be associated with the first criminal organization is detected outside of the first geofence definition. Responsive to detecting the out-of-boundary condition, causing an electronic notification of the out-of-boundary condition to be one of output and transmitted to another computing device notifying the another computing device of the out-of-boundary condition.
Abstract:
Disclosed herein are methods and systems for presenting prioritized incident content. One embodiment takes the form of a method that includes receiving one or more status alerts from one or more public-safety devices associated with one or more public-safety responders. The method also includes correlating one or more of the received status alerts with one or more media sessions involving one or more of the public-safety responders. The method also includes prioritizing one or more of the media sessions based on prioritization criteria that includes the one or more status alerts correlated with those media sessions. The method also includes presenting one or more of the prioritized media sessions in a chronological view on respective user interfaces of one or more public-safety communication devices.
Abstract:
A first mobile station operating on a first network according to a first network protocol receives a proxy request for access to a network resource, by from a second mobile station operating on a second network according to a second network protocol. The proxy request is received according to a third network protocol. The first mobile station determines a priority of the proxy request; accepts or denies the proxy request based on the determined priority of the proxy request; allocates resources to the proxy request, if the proxy request is accepted; and serves as a proxy mobile station for the second mobile station to access the network resource.
Abstract:
A system includes: a packet processing function and a packet modification function. The packet processing function receives a packet generated by a sending application function and destined for a receiving application function. The packet includes first identifier information, and the packet processing function adds second identifier information thereto. The packet modification function: receives the packet; alters it in a way that prevents use of the first identifier information by a 3GPP conforming service data flow detection process to map the packet to a first service data flow for the sending application function; and provides the packet to a packet routing function with the second identifier information positioned in the packet to enable the packet routing function to use the second identifier information in the 3GPP conforming service data flow detection process to map the packet to the first service data flow and to a bearer for transporting the packet.
Abstract:
A first mobile station operating on a first network according to a first network protocol receives a proxy request for access to a network resource, by from a second mobile station operating on a second network according to a second network protocol. The proxy request is received according to a third network protocol. The first mobile station determines a priority of the proxy request; accepts or denies the proxy request based on the determined priority of the proxy request; allocates resources to the proxy request, if the proxy request is accepted; and serves as a proxy mobile station for the second mobile station to access the network resource.