A process for detecting people in video data using non-visual sensor data. An electronic computing device obtains video data captured by a camera during a time period and analyzes the video data with a video analytics engine to detect a number of persons visible in a field of view (FOV) depicted by the video data. The electronic computing device obtains non-visual sensor data that was captured by a non-visual sensor associated with the FOV during the time period and detects a feature in the non-visual sensor data that indicates that an additional person not detected with the video analytics engine was likely present in the FOV depicted by the video data during the time period. The electronic computing device provides an electronic notification indicating that an additional person not detected with the video analytics engine was likely present in the FOV depicted by the video data during the time period.
G06V 10/26 - Segmentation of patterns in the image field; Cutting or merging of image elements to establish the pattern region, e.g. clustering-based techniques; Detection of occlusion
2.
SYSTEM AND METHOD FOR DETECTING AND TRACKING A STATUS OF AN OBJECT RELEVANT TO AN INCIDENT
Techniques for detecting and tracking a status of an object relevant to an incident are provided. A virtual partner associated with a first responder detects at least one object that is relevant to an incident to which the responder is responding. The virtual partner requests that a smart building controller track a status of the at least one object. It is determined that the at least one object is currently needed. An indication is received from the smart building controller when the at least one object is currently needed, indicating the status of the at least one object.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
H04W 4/029 - Location-based management or tracking services
3.
DEVICE, SYSTEM, AND METHOD FOR PROVISIONING FIREWALL ENGINES
A device, system and method for provisioning firewall engines is provided. A device, in an observation mode: implements, for a given zone, an application and a firewall engine in an observation mode by: implementing predefined firewall rules that define allowed network traffic and/or denied network traffic for the application; maintaining a log of network traffic events that meet or do not meet the predefined firewall rules, the log including source and destination network identifiers for the network traffic events; grouping the network traffic events into groups based on the source and destination network identifiers; generating new firewall rules based on the groups; and accepting or denying respective new firewall rules. The device, after the observation mode is implemented, switches the application and the firewall engine to a maintain mode by: stopping implementing the predefined firewall rules; and implementing accepted new firewall rules for the application.
A process for detecting people in video data using non-visual sensor data. An electronic computing device obtains video data captured by a camera during a time period and analyzes the video data with a video analytics engine to detect a number of persons visible in a field of view (FOV) depicted by the video data. The electronic computing device obtains non-visual sensor data that was captured by a non-visual sensor associated with the FOV during the time period and detects a feature in the non-visual sensor data that indicates that an additional person not detected with the video analytics engine was likely present in the FOV depicted by the video data during the time period. The electronic computing device provides an electronic notification indicating that an additional person not detected with the video analytics engine was likely present in the FOV depicted by the video data during the time period.
A mounting apparatus and system for a portable communication device is disclosed. The apparatus includes a mounting plate configured to be attached to a planar surface. The mounting plate has elastically bendable arms adapted to engage around peripheral portions of a portable communication device and to secure the device with the mounting plate. The device has a front-facing PTT button that is configured to transmit a non-voice based signal notification when the PTT button is depressed and when the device is secured to the mounting plate. The apparatus includes a modular electronic accessory that aligns with top or bottom surfaces of the device when the device is secured with the mounting plate. The accessory may include a speaker microphone or camera. When the PTT button is pressed, a bidirectional audio-only call, an audio-video call, or an access control function is established depending on the type of accessory that is aligned with the portable communication device.
A portable communication device includes a housing and a push-to-talk button. The push-to-talk (PTT) button is disposed on the front surface of the housing and further occupies a substantial portion of the front surface of the housing. The portable communication device also includes a light emitting diode (LED) stripe that is disposed on the PTT button. The LED stripe is placed on a flexible cable to allow the LED stripe and the PTT button to be moved together when any portion of the front surface of the housing containing the LED stripe and the PTT button is activated. The PTT button is configured to activate transmission of a PTT signal on a talk group channel when the PTT is activated.
H04W 4/10 - Push-to-talk [PTT] or push-on-call services
G08B 5/36 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission using visible light sources
A portable communication device includes a housing and a push-to-talk button. The push-to-talk (PTT) button is disposed on the front surface of the housing and further occupies a substantial portion of the front surface of the housing. The portable communication device also includes a light emitting diode (LED) stripe that is disposed on the PTT button. The LED stripe is placed on a flexible cable to allow the LED stripe and the PTT button to be moved together when any portion of the front surface of the housing containing the LED stripe and the PTT button is activated. The PTT button is configured to activate transmission of a PTT signal on a talk group channel when the PTT is activated.
H04M 1/23 - Construction or mounting of dials or of equivalent devices; Means for facilitating the use thereof
H04W 4/10 - Push-to-talk [PTT] or push-on-call services
G06F 1/16 - Constructional details or arrangements
H04L 65/4061 - Push-to services, e.g. push-to-talk or push-to-video
H04M 1/60 - Substation equipment, e.g. for use by subscribers including speech amplifiers
H04M 1/72424 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with manual activation of emergency-service functions
8.
A MOUNTING APPARATUS AND SYSTEM FOR A PORTABLE COMMUNICATION DEVICE
A mounting apparatus and system for a portable communication device is disclosed. The apparatus includes a mounting plate configured to be attached to a planar surface. The mounting plate has elastically bendable arms adapted to engage around peripheral portions of a portable communication device and to secure the device with the mounting plate. The device has a front-facing PTT button that is configured to transmit a non-voice based signal notification when the PTT button is depressed and when the device is secured to the mounting plate. The apparatus includes a modular electronic accessory that aligns with top or bottom surfaces of the device when the device is secured with the mounting plate. The accessory may include a speaker microphone or camera. When the PTT button is pressed, a bidirectional audio-only call, an audio-video call, or an access control function is established depending on the type of accessory that is aligned with the portable communication device.
H04M 1/72409 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
H04M 1/02 - Constructional features of telephone sets
H04M 1/23 - Construction or mounting of dials or of equivalent devices; Means for facilitating the use thereof
H04M 1/72424 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with manual activation of emergency-service functions
G06F 1/16 - Constructional details or arrangements
9.
SELECTING AUTHENTICATION METHOD BASED ON USER CONSTRAINTS
Methods and systems for authenticating a user. One system includes a camera and an authentication computer. The authentication computer is configured to receive an image of a user captured by the camera, determine, based on the image, a constraint of the user impacting an availability of a part of the user's body for use in authenticating the user, and determine, based on the constraint of the user, an action to be performed by the user. The authentication computer is also configured to transmit data to a user device worn by the user, the data usable by the user device to output instructions to the user to perform the action, and, in response to detecting the action performed by the user, authenticating the user to use a resource.
Techniques for heightened video redaction based on audio are provided. A first level of redaction is applied to an individual captured in a video recording. Audio signatures in the video recording associated with the individual captured in the video recording are identified. It is determined that that the audio signatures, in a context of the video recording, will increase a likelihood of personally identifying the individual captured in the video recording. A second level of redaction is applied to the individual captured in the video recording when it is determined that the likelihood of personally identifying the individual captured in the video recording has increased.
H04N 21/454 - Content filtering, e.g. blocking advertisements
G10L 15/02 - Feature extraction for speech recognition; Selection of recognition unit
G10L 25/57 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for processing of video signals
11.
SYSTEM AND METHOD FOR HEIGHTENED VIDEO REDACTION BASED ON AUDIO DATA
Techniques for heightened video redaction based on audio are provided. A first level of redaction is applied to an individual captured in a video recording. Audio signatures in the video recording associated with the individual captured in the video recording are identified. It is determined that that the audio signatures, in a context of the video recording, will increase a likelihood of personally identifying the individual captured in the video recording. A second level of redaction is applied to the individual captured in the video recording when it is determined that the likelihood of personally identifying the individual captured in the video recording has increased.
H04N 21/439 - Processing of audio elementary streams
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to MPEG-4 scene graphs
H04N 21/4402 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
12.
SYSTEM AND METHOD FOR REDACTION BASED ON GROUP ASSOCIATION
A system and method for redaction based on group association is disclosed. The method includes carrying out an analysis that includes coming to a determination that, notwithstanding at least some features of a plurality of group-associated objects are being concealed, a visible association between the objects in combination with size and shape definitions for corresponding redactions of the group-associated objects is such that an identity deducibility condition is either met or is not met.
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to MPEG-4 scene graphs
H04N 21/4545 - Input to filtering algorithms, e.g. filtering a region of the image
A device, system and method for managing talkgroups is provided. A computing device determines that a communication device is communicating with a talkgroup via a first communication network, the talkgroup dominated by other communication devices communicating on one or more second communication networks different from the first communication network. The computing device determines a level of activity of the communication device in the talkgroup via the first communication network. When the level of activity meets a threshold condition, the computing device: requests a confirmation from the communication device to cease communication with the talkgroup; and when the confirmation is received, drops the communication device from the talkgroup.
A device, system and method for transferring calls to public-safety answering points is provided. A call routing devices receives, from a plurality of public-safety answering points (PSAPs), status data indicating respective states of the plurality of PSAPs. The call routing device receives a call to be routed to a first PSAP of the plurality of PSAPs. The call routing device generates a list of other PSAPs, of the plurality of PSAPs, prioritized according to the status data. The call routing device routes the call to the first PSAP, the call routed with the list. The call routing device receives, from the first PSAP, an indication to transfer the call to a second PSAP selected from the list. The call routing device transfers the call to the second PSAP.
Device (105) configurations for a machine-learned model (50). A device analytics system (100) includes an electronic processor configured to determine, for a machine-learned model (50) configured to detect a plurality of features, a prioritization ranking for a plurality of input parameters provided to the machine-learned model (50) and receive, for each device (105), a confidence value for each feature included in the plurality of features. The electronic processor is configured to determine, for each device (105) included in the plurality of devices (105), a performance value for each feature included in the plurality of features based on the prioritization ranking for the plurality of input parameters and the confidence value for each feature for the respective device (105). The electronic processor is configured to select, based on the performance value for each device (105) included in the plurality of devices (105) for a feature, a device (105) configuration for the machine-learned model (50), and implement the selected device (105) configuration.
Techniques for prioritizing similarities and differences during responses to incidents based on incident context are provided. Video and audio of an initial response to a first incident at an incident location is monitored. A context for the initial response is created. Video and audio of a subsequent response to a second incident at the incident location is monitored. The video and audio of the initial response and the subsequent response is compared. A machine learning model prioritizes the similarities and differences between the video and audio based on the context. The similarities and differences between the video and audio are provided to a subsequent responder based on the prioritization.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
21.
DEVICE, SYSTEM, AND METHOD FOR TRANSFERRING CALLS TO PUBLIC-SAFETY ANSWERING POINTS
A device, system and method for transferring calls to public-safety answering points is provided. A call routing devices receives, from a plurality of public-safety answering points (PSAPs), status data indicating respective states of the plurality of PSAPs. The call routing device receives a call to be routed to a first PSAP of the plurality of PSAPs. The call routing device generates a list of other PSAPs, of the plurality of PSAPs, prioritized according to the status data. The call routing device routes the call to the first PSAP, the call routed with the list. The call routing device receives, from the first PSAP, an indication to transfer the call to a second PSAP selected from the list. The call routing device transfers the call to the second PSAP.
H04M 3/58 - Arrangements for transferring received calls from one subscriber to another; Arrangements affording interim conversations between either the calling or the called party and a third party
One aspect provides a video surveillance system including a video camera configured to capture a video and a video redactor in communication with the video camera and including an electronic processor. The electronic processor is configured to retrieve the video from the video camera, identify an object to be redacted from the video, and redact the object from the video. The electronic processor is further configured to identify a first reflective surface appearing in the video, redact the first reflective surface from the video, and output a modified video in which the object and the first reflective surface have been redacted.
A video security system configured for simplified cluster join is disclosed. The video security system includes a video management server device that internally includes at least one non-volatile storage medium initially storing incomplete portions of first and second computer readable instructions that entirely define server components that provide first and second operational supports for first and second video cameras. The video management server device is configured to communicate with the first and second video cameras over at least one local area network path. The video management server device is also configured to communicate with a package sourcing entity to transmit information about the incomplete portions to the package sourcing entity. The video management server device is also configured to automatically receive, from the package sourcing entity, an upgrade package that is tailored to include remainder portions of the first and second computer readable instructions without the incomplete portions
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
H04N 21/241 - Operating system [OS] processes, e.g. server setup
H04N 21/63 - Control signaling between client, server and network components; Network processes for video distribution between server and clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
24.
DEVICE AND METHOD FOR MACHINE-LEARNING BASED NOISE SUPPRESSION
A device, system, and method for machine-learning based noise suppression is provided. The device (and/or system) comprises a microphone, an output device, a noise suppression engine and a machine-learning noise suppression engine. The machine-learning noise suppression engine receives audio data from the noise suppression engine or the microphone, applies machine learning algorithms to the audio data to generate machine-learning based noise suppression parameters, and provides the parameters to the noise suppression engine. The noise suppression engine receives the audio data from the microphone and, prior to receiving the parameters, applies non-machine-learning based noise suppression to the audio data to generate noise-suppressed audio data, and provides the noise-suppressed audio data to the output device. However, after receiving the parameters, the noise suppression engine applies the parameters to the noise-suppressed audio data to generate updated noise-suppressed audio data, and provides the updated noise-suppressed audio data to the output device.
G10L 25/30 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the analysis technique using neural networks
G10L 21/0216 - Noise filtering characterised by the method used for estimating noise
G06N 3/04 - Architecture, e.g. interconnection topology
An access-control mechanism, wireless device, and method for controlling the access-control mechanism and wireless device is provided herein. During operation the wireless device will create a "group" of devices that will be allowed to enter through a passage barrier without authentication. When authenticating with the access-control mechanism, the wireless device will prove the access-control mechanism with a list of credentials (e.g., identification information) for each device within the group. The access-control mechanism will then determine if every device on the list is allowed entry. If so, non-authenticated entry for a number of devices/people through the passage barrier will be allowed. The number of non-authenticated devices/people allowed to enter will be equal to a number of devices that are in the group.
Device configurations for a machine-learned model. A device analytics system includes an electronic processor configured to determine, for a machine-learned model configured to detect a plurality of features, a prioritization ranking for a plurality of input parameters provided to the machine-learned model and receive, for each device, a confidence value for each feature included in the plurality of features. The electronic processor is configured to determine, for each device included in the plurality of devices, a performance value for each feature included in the plurality of features based on the prioritization ranking for the plurality of input parameters and the confidence value for each feature for the respective device. The electronic processor is configured to select, based on the performance value for each device included in the plurality of devices for a feature, a device configuration for the machine-learned model, and implement the selected device configuration.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 67/00 - Network arrangements or protocols for supporting network services or applications
27.
CERTIFICATE ENTITLEMENT LICENSES FOR AUTHENTICATING PUBLIC KEY INFRASTRUCTURE CERTIFICATE ENROLLMENT
Systems and methods for authenticating public key infrastructure certificate enrollment using certificate entitlement licenses. One example system includes a device manager including an electronic processor. The electronic processor is configured to receive a request for software for an electronic device including a unique electronic device identifier. The electronic processor is configured to determine, based on the request, whether the electronic device is entitled to participate in a certificate management service. The electronic processor is configured to, responsive to determining that the electronic device is entitled to participate in a certificate management service, transmit a certificate entitlement license request including the unique device identifier to a certificate entitlement license manager. The electronic processor is configured to receive, from the certificate entitlement license manager, a certificate entitlement license for the unique device identifier. The electronic processor is configured to deliver the certificate entitlement license based on the unique device identifier.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
An access-control mechanism, wireless device, and method for controlling the access-control mechanism and wireless device is provided herein. During operation the wireless device will create a “group” of devices that will be allowed to enter through a passage barrier without authentication. When authenticating with the access-control mechanism, the wireless device will prove the access-control mechanism with a list of credentials (e.g., identification information) for each device within the group. The access-control mechanism will then determine if every device on the list is allowed entry. If so, non-authenticated entry for a number of devices/people through the passage barrier will be allowed. The number of non-authenticated devices/people allowed to enter will be equal to a number of devices that are in the group.
Systems and methods for managing rate-controlled and scheduled workloads in distributed computing systems. One example method provides a distributed two-phase algorithm, which utilizes an external timer service and local high-resolution timers to orchestrate time critical workloads on distributed computing systems. The first phase is a planning phase implemented as a recurrent process by means of repeated registrations to the external timer service. During the planning phase, a portion or all of the workload to be performed is broken down into small batches to be assigned to computing instances for execution at a later time. The second phase is a batch execution phase. Each batch planned during the planning phase includes fine-grained instructions as to when each item within the batch is to be executed. The computing instance receiving the batch uses local high-resolution timers to synchronize the execution of items relative to one another.
A device, system, and method for machine-learning based noise suppression is provided. The device (and/or system) comprises a microphone, an output device, a noise suppression engine and a machine-learning noise suppression engine. The machine-learning noise suppression engine receives audio data from the noise suppression engine or the microphone, applies machine learning algorithms to the audio data to generate machine-learning based noise suppression parameters, and provides the parameters to the noise suppression engine. The noise suppression engine receives the audio data from the microphone and, prior to receiving the parameters, applies non-machine-learning based noise suppression to the audio data to generate noise-suppressed audio data, and provides the noise-suppressed audio data to the output device. However, after receiving the parameters, the noise suppression engine applies the parameters to the noise-suppressed audio data to generate updated noise-suppressed audio data, and provides the updated noise-suppressed audio data to the output device.
G10L 19/00 - Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
Systems and methods for authenticating public key infrastructure (314) certificate enrollment using certificate entitlement licenses. One example system (100) includes a device manager (102) including an electronic processor (205). The electronic processor (205) is configured to receive a request for software for an electronic device (106) including a unique electronic device (106) identifier. The electronic processor (205) is configured to determine, based on the request, whether the electronic device (106) is entitled to participate in a certificate management service (109). The electronic processor (205) is configured to, responsive to determining that the electronic device (106) is entitled to participate in a certificate management service (109), transmit a certificate entitlement license request including the unique device (106) identifier to a certificate entitlement license manager (104). The electronic processor (205) is configured to receive, from the certificate entitlement license manager (104), a certificate entitlement license for the unique device (106) identifier. The electronic processor (205) is configured to deliver the certificate entitlement license based on the unique device (106) identifier.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
An access-control mechanism, wireless device, and method for controlling the access-control mechanism and wireless device is provided herein. During operation the wireless device will create a “group” of devices that will be allowed to enter through a passage barrier without authentication. When authenticating with the access-control mechanism, the wireless device will prove the access-control mechanism with a list of credentials (e.g., identification information) for each device within the group. The access-control mechanism will then determine if every device on the list is allowed entry. If so, non-authenticated entry for a number of devices/people through the passage barrier will be allowed. The number of non-authenticated devices/people allowed to enter will be equal to a number of devices that are in the group.
A portable communication system includes a remote speaker microphone (RSM) accessory (102) coupled to a portable radio and further coupled to a secondary audio accessory (SAA) (108). The RSM accessory (102) includes a user interface toggle switch (120) that toggles between a first mode of operation and a second mode of operation. Toggling to the first mode of operation selectively routes receive audio from the portable radio to a speaker (112) of the RSM accessory, while generating and routing a periodic audio artifact from the RSM to the SAA (108) for play out at a speaker (316) of the secondary accessory. The received audio is played out of the RSM speaker (112) in parallel with the periodic audio artifact being played out of the secondary accessory speaker (316).
A process of anonymizing a person captured in an image. An anonymization server receives a request from an agency to anonymize a person captured in an image including an unredacted facial feature corresponding to the person and an unredacted non-facial feature. The server redacts the facial feature captured in the image to generate a first redacted image. The server then identifies a second image accessible to users not associated with the agency. When the server determines that the anonymity of the person captured in the first redacted image can be compromised using unredacted facial and non-facial features captured in the second image, the server further redacts the non-facial feature captured in the image.
An access-control mechanism and method for controlling the access-control mechanism is provided herein. During operation the access-control mechanism will grant access to a user when a same utterance is detected over a local microphone and via a communication system, and a time period between receptions of each utterance is within a predetermined period.
G07C 9/23 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/00 - Individual registration on entry or exit
G10L 17/24 - the user being prompted to utter a password or a predefined phrase
37.
ANONYMIZING CALLER IDENTITY BASED ON VOICE PRINT MATCH
Methods and systems for anonymizing an identity of a caller using a voice print match. One system includes a surveillance system including a camera and a microphone; and a dispatch computer. The dispatch computer is configured to receive a voice call from the caller, generate a voice print from the voice call, compare the voice print to a plurality of stored voice prints, and, in response to the voice print not matching any of the plurality of stored voice prints, transmit the voice print to the surveillance system. The surveillance system is configured to receive the voice print, capture audio data via the microphone, compare the audio data to the voice print, and, in response to identifying a match between the voice print and the audio data, tag image data, captured via the camera, corresponding to the audio data for redaction.
A portable communication system includes a remote speaker microphone (RSM) accessory (102) coupled to a portable radio and further coupled to a secondary audio accessory (SAA) (108). The RSM accessory (102) includes a user interface toggle switch (120) that toggles between a first mode of operation and a second mode of operation. Toggling to the first mode of operation selectively routes receive audio from the portable radio to a speaker (112) of the RSM accessory, while generating and routing a periodic audio artifact from the RSM to the SAA (108) for play out at a speaker (316) of the secondary accessory. The received audio is played out of the RSM speaker (112) in parallel with the periodic audio artifact being played out of the secondary accessory speaker (316).
Methods and systems for anonymizing an identity of a caller (40) using a voice print (102) match. One system (10) includes a surveillance system (50) including a camera (60) and a microphone (58); and a dispatch computer (22). The dispatch computer (22) is configured to receive a voice call from the caller (40), generate a voice print (102) from the voice call, compare the voice print (102) to a plurality of stored voice prints, and, in response to the voice print (102) not matching any of the plurality of stored voice prints, transmit the voice print (102) to the surveillance system (50). The surveillance system (50) is configured to receive the voice print (102), capture audio data via the microphone (58), compare the audio data to the voice print (102), and, in response to identifying a match between the voice print (102) and the audio data, tag image data (310), captured via the camera (60), corresponding to the audio data for redaction.
A device, system, and method for implementing role-based machine learning models is provided. A implements a supervisory machine learning model that detects a first role associated with a first object in images received from a camera. The device, from machine learning models, selects and implements a first machine learning model associated with the first role to perform analysis on the images, that is reported to one or more communication devices. After implementing the first machine learning model, the device uses the supervisory machine learning model to determine a second role associated with a second object in the images that is different from the first role, and selects, from the machine learning models, a second machine learning model associated with the second role. The device implements the second machine learning model to perform analysis on the images to change the analysis reported to the one or more communication device.
A device, system and method for dispatching public-safety responder types to a three-dimensional location is provided. A device: receives a call and an associated location including ground coordinates and an altitude; and selects a primary public-safety responder type from a plurality of public-safety responder types associated with corresponding altitude ranges that are at or near the ground coordinates, the primary public-safety responder type associated with a corresponding altitude range that includes the altitude of the associated location of the call. The device one of automatically dispatches the primary public-safety responder type to the ground coordinates and the altitude associated with the call; and provides, to a public-safety answering point associated with the ground coordinates, an electronic suggestion to dispatch the primary public-safety responder type to the ground coordinates and the altitude associated with the call.
A device, system, and method for causing electronic actions for categories of persons-of-interest (POI) is provided. A device maintains an attendee list of persons located within a given area using images received from cameras monitoring the given area. In response to determining that the given area meets a given condition the device: uses a current version of the attendee list to generate a POI list of POIs within the given area; categorizes, using the images received from the cameras, the POIs into given categories based on: whether a POI is being monitored by the cameras; whether a location associated with the POI is determined; and, the location associated with the POI, when determined; and causes one or more respective electronic actions to occur in relation to respective POIs associated with a given category into which the respective POIs are categorized.
A device, system, and method for causing electronic actions for categories of persons-of-interest (POI) is provided. A device maintains an attendee list of persons located within a given area using images received from cameras monitoring the given area. In response to determining that the given area meets a given condition the device: uses a current version of the attendee list to generate a POI list of POIs within the given area; categorizes, using the images received from the cameras, the POIs into given categories based on: whether a POI is being monitored by the cameras; whether a location associated with the POI is determined; and, the location associated with the POI, when determined; and causes one or more respective electronic actions to occur in relation to respective POIs associated with a given category into which the respective POIs are categorized.
A device, system, and method for incident air space management is provided. A system includes a controller and a signaling unmanned aerial vehicle (SUAV) associated with a public-safety entity. The controller dispatches the SUAV to a location of a public-safety incident and generates a restricted airspace boundary for airspace, associated with the incident, within which the SUAV operates. The controller activates a restricted airspace beacon of the SUAV that correlates with the restricted airspace boundary. The SUAV broadcasts the restricted airspace beacon, indicating the restricted airspace boundary, relative to a current location of the SUAV. The restricted airspace beacon is operational in at least two modes: a stationary incident mode, during which the SUAV and the restricted airspace boundary are stationary relative to a fixed location of incident; and a mobile incident mode, during which the SUAV and the restricted airspace boundary are mobile and tracking a moving incident location.
A system and method are provided for managing an incident call between a public safety responder and a target. Once an incident call is established, the system and method perform audio analytics on the call to determine a trusted side of the call and a target side of the call. The method and system determine, based on the audio analytics of the call, that the trusted side of the call should be modified to create a suitable call environment perception for the target side of the call. Modifications are then made at the trusted side of the call by injecting background audio to create the suitable call environment to be heard at the target side of the call.
Techniques for identifying human interaction limitations based on historical information are provided. An indication of a public safety incident is received. The public safety incident involves at least one person and occurs at an incident location. Historical video of the incident location is acquired. The historical video of the incident location is analyzed to identify the presence of the at least one person. A behavior of the at least one person in the historical video of the incident location is analyzed to identify at least one human interaction limitation. A first responder that is responding to the public safety incident is informed of the at least one human interaction limitation.
A device, system, and method for altering video streams to identify objects of interest is provided. A devices analyzes: media data to determine one or more visual traits of an object-of-interest (OOI); and a first video stream to determine that the visual trait(s) are not identifiable at the first video stream, the first video stream being rendered at a display screen. The device identifies at least one of the visual trait(s) at a second video stream to identify the OOI at the second video stream, the second video stream associated with the first video stream. The device identifies the OOI at the first video stream using the OOI as identified in the second video stream. The device alters the first video stream at the display screen to visually indicate one or more of: the OOI; and at least one of visual trait(s) identified at the second video stream.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 21/422 - Input-only peripherals, e.g. global positioning system [GPS]
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to MPEG-4 scene graphs
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G11B 27/28 - Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording
A method and apparatus for better securing databases is provided herein. During a database search, a target of a search (e.g., a person or object) will have a maximum number of allowed searches. When a user performs a search on a target, a determination of how many prior searches on the target object or individual was made. If the number of prior searches exceeds a threshold, then the search will be denied.
A device, system, and method for altering video streams to identify objects of interest is provided. A devices analyzes: media data to determine one or more visual traits of an object-of-interest (OOI); and a first video stream to determine that the visual trait(s) are not identifiable at the first video stream, the first video stream being rendered at a display screen. The device identifies at least one of the visual trait(s) at a second video stream to identify the OOI at the second video stream, the second video stream associated with the first video stream. The device identifies the OOI at the first video stream using the OOI as identified in the second video stream. The device alters the first video stream at the display screen to visually indicate one or more of: the and at least one of visual trait(s) identified at the second video stream.
G06V 20/40 - Scenes; Scene-specific elements in video content
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
50.
METHOD AND APPARATUS FOR ASSIGNING TALK GROUPS TO NETWORK SLICES
A method and apparatus for assigning and associating devices using a particular talkgroup to a particular network slice is provided herein. During operation talkgroups within a communication system will be assigned to particular network slices. Some network slices may have a single talkgroup assigned to them, and other network slices may have multiple talkgroups assigned to them. During operation, communicationsystem infrastructure will conduct all communications for a group of devices over a particular talkgroup via a particular network slice.
A battery alignment system (10) includes a housing (14) having a groove along a side (54) of the housing (14), a first set of surfaces (42) that define a recess (46), and first electrical contacts (50) positioned at least partially within the recess (46). The battery alignment system (10) also includes a battery (18) having a tab to slide within the groove of the housing (14) to facilitate a first alignment, a second set of surfaces (42) that protrude from an end of the battery (18) to slide into the recess (46) of the housing (14) to facilitate a second alignment, and a third surface (102) that extends from one of the second set of surfaces (42). The third surface (102) engages one of the first set of surfaces (42) to facilitate a third alignment. The battery (18) also includes second electrical contacts (50) that engage the first electrical contacts (50).
H01M 50/247 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders specially adapted for portable devices, e.g. mobile phones, computers, hand tools or pacemakers
H01M 50/244 - Secondary casings; Racks; Suspension devices; Carrying devices; Holders characterised by their mounting method
H01M 50/262 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders with fastening means, e.g. locks
H01M 50/296 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders characterised by terminals of battery packs
A battery alignment system includes a housing having a groove along a side of the housing, a first set of surfaces that define a recess, and first electrical contacts positioned at least partially within the recess. The battery alignment system also includes a battery having a tab to slide within the groove of the housing to facilitate a first alignment, a second set of surfaces that protrude from an end of the battery to slide into the recess of the housing to facilitate a second alignment, and a third surface that extends from one of the second set of surfaces. The third surface engages one of the first set of surfaces to facilitate a third alignment. The battery also includes second electrical contacts that engage the first electrical contacts.
H01M 50/291 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders characterised by spacing elements or positioning means within frames, racks or packs characterised by their shape
H01M 50/247 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders specially adapted for portable devices, e.g. mobile phones, computers, hand tools or pacemakers
H01M 50/262 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders with fastening means, e.g. locks
H01M 50/244 - Secondary casings; Racks; Suspension devices; Carrying devices; Holders characterised by their mounting method
53.
METHOD OF HANDLING AN INCIDENT IN A MULTI-CLOUD ENVIRONMENT
A process for handling an incident in a multi-cloud environment is provided. The process comprises receiving digital data associated with an incident, identifying cloud services to be executed in response to the incident, determining estimated usage levels at which the cloud services will be utilized in response to the incident, determining at least a first option of executing the cloud services and a second option of executing the cloud services that is different from the first option, estimating at least a cost of executing the cloud services according to the first option and a cost of executing the cloud services according to the second option, identifying a selected option by receiving the selected option from a user or choosing an option having the lowest estimated cost to be the selected option, and causing the cloud services to be executed according to the selected option.
A method and system that accounts for appearance changes in an object, attributable to object deformation or restoration, is disclosed. The system includes an object deformation prediction database. The object deformation prediction database is accessible as a function of the type of the object. The object deformation prediction database can identify one or more ways in which the type of object, and thus the object, is deformable to or restorable from a reference appearance that is depicted in a particular sub-region of an object.
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
G06F 16/78 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
55.
METHOD OF HANDLING AN INCIDENT IN A MULTI-CLOUD ENVIRONMENT
A process for handling an incident in a multi-cloud environment is provided. The process comprises receiving digital data associated with an incident, identifying cloud services to be executed in response to the incident, determining estimated usage levels at which the cloud services will be utilized in response to the incident, determining at least a first option of executing the cloud services and a second option of executing the cloud services that is different from the first option, estimating at least a cost of executing the cloud services according to the first option and a cost of executing the cloud services according to the second option, identifying a selected option by receiving the selected option from a user or choosing an option having the lowest estimated cost to be the selected option, and causing the cloud services to be executed according to the selected option.
A method (250) and system (100) that accounts for appearance changes in an object (310), attributable to object deformation or restoration, is disclosed. The system (100) includes an object deformation prediction database (191). The object deformation prediction database (191) is accessible (268) as a function of the type (262) of the object (310). The object deformation prediction database (191) can identify one or more ways in which the type of object (262), and thus the object (310), is deformable to or restorable from a reference appearance that is depicted in a particular sub-region (320) of an object (310).
G06V 10/22 - Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06V 10/75 - Image or video pattern matching; Proximity measures in feature spaces using context analysis; Selection of dictionaries
G06V 10/94 - Hardware or software architectures specially adapted for image or video understanding
G06V 10/98 - Detection or correction of errors, e.g. by rescanning the pattern or by human intervention; Evaluation of the quality of the acquired patterns
G06V 20/40 - Scenes; Scene-specific elements in video content
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
Apparatus and method for appearance search for incident response. One embodiment provides a method for appearance searching for incident response. The method includes receiving a search criteria at a command server and initiating an appearance search based on the search criteria. The appearance search is performed on a plurality of responding devices communicatively connected to the command server. The method further includes receiving, at the command server, an update to the search criteria and determining, using the command server, a confidence level of the update based on weights assigned to each a plurality of parameters of the update. The method also includes creating, using the command server, an updated search criteria based on the search criteria and the update when the confidence level of the update exceeds a predetermined confidence threshold and pushing the updated search criteria for the appearance search to the plurality of responding devices.
A system for alerting an emergency responder that an emergency has occurred during a video communication between two or more participants, including: a trusted custodian computer system that receives emergency information from (and then generates unique tokens for) the participants of a video communication. A second participant who has witnessed a first participant have an emergency during the video communication transmits the first participant's unique token to a first responder who then transmits the unique token to the trusted custodian computer system. The trusted custodian computer system then determines when the first responder is both capable of and permitted to respond to the emergency, or locates another appropriate first responder that is capable of and permitted to respond to the emergency.
Method and 3D modeling server (110) to generate a 3D model. The method includes receiving first images captured by a camera (320) corresponding to an incident scene and receiving first metadata generated by a time-of-flight sensor (325) corresponding to the first images. The method also includes generating a 3D model at a first resolution including a plurality of 3D points based on the first images and the first metadata and identifying a first incident-specific point of interest from the first images. The method further includes transmitting for recapturing the first incident-specific point of interest and receiving second images captured of the first incident-specific point of interest. The method also includes receiving second metadata generated corresponding to the second images and updating a first portion of the 3D model corresponding to the first incident-specific point of interest to a second resolution based on the second images and the second metadata.
A process of detecting signal interference among geographically co-located radios affiliated with different talkgroups, An electronic computing device receives a log of push-to-talk (PTT) operations performed at a first radio and a log of audio quality values measured corresponding to audio communications received at a second radio. The first radio is affiliated with a first talkgroup and operates on a first channel frequency assigned to the first talkgroup. The second radio is affiliated with a second talkgroup and further operates on a second channel frequency assigned to the second talkgroup. The device detects that signal interference at the second radio is potentially caused by the first radio when there is a time correlation between a PTT operation performed at the first radio and a change in audio quality at the second radio and when the second radio was geographically co-located with the first radio during the time correlation.
A process of detecting signal interference among geographically co-located radios affiliated with different talkgroups, An electronic computing device receives a log of push-to-talk (PTT) operations performed at a first radio and a log of audio quality values measured corresponding to audio communications received at a second radio. The first radio is affiliated with a first talkgroup and operates on a first channel frequency assigned to the first talkgroup. The second radio is affiliated with a second talkgroup and further operates on a second channel frequency assigned to the second talkgroup. The device detects that signal interference at the second radio is potentially caused by the first radio when there is a time correlation between a PTT operation performed at the first radio and a change in audio quality at the second radio and when the second radio was geographically co-located with the first radio during the time correlation.
A system and method for redaction based on group association is disclosed. The method includes carrying out an analysis that includes coming to a determination that, notwithstanding at least some features of a plurality of group-associated objects are being concealed, a visible association between the objects in combination with size and shape definitions for corresponding redactions of the group-associated objects is such that an identity deducibility condition is either met or is not met.
Systems and methods for dynamically updating and distributing digital reconnaissance maps for incident response. One example system includes an electronic processor coupled to an electronic communication interface. The processor is configured to receive an incident notification for an incident occurring at an incident scene and to generate a reconnaissance map for the incident scene. The processor is configured to receive a voice communication associated with a first incident responder at the incident scene and determine, for the first incident responder, a location within the incident scene. The processor is configured to determine a location status for the location based on the voice communication and to generate an updated reconnaissance map for the incident scene based on the reconnaissance map, the location, and the location status. The processor is configured to send, via the communication interface, the updated reconnaissance map to an electronic communication device associated with a second incident responder.
Techniques for transcription of an audio stream are provided. A request for transcription of a first audio stream from a first device is received. A request for transcription of a second audio stream from a second device is received. It is determined that the first and second audio streams are the same. One of the first and second audio streams are selected for transcription. Transcription of the selected audio stream is requested.
A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation a workflow is automatically modified, or a new workflow generated, based upon user queries made after a workflow has been executed.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
G06F 9/451 - Execution arrangements for user interfaces
66.
DEVICE WITH A MICROPHONE AND A CONDENSATION COLLECTION APPARATUS TO PREVENT MIGRATION OF CONDENSATION TO THE MICROPHONE
A device with a microphone and a condensation collection apparatus to prevent migration of condensation to the microphone is provided. The device comprises a microphone; a board having an acoustic port therethrough, the microphone positioned to accept sound through the acoustic port; a moisture-resistant, acoustically transparent membrane over the acoustic port; an outer membrane that receives the sound for the microphone, the outer membrane being non-permeable to at least moisture; and a condensation collection apparatus between the outer membrane and the acoustically transparent membrane. The condensation collection apparatus comprises: an aperture through which the sound from the outer membrane passes; and one or more condensation collection features, at an outer-membrane facing side of the condensation collection apparatus, configured to: collect condensation that migrates from an inner side of the outer membrane; and prevent migration of the condensation, that is collected, through the aperture.
H04R 1/22 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired frequency characteristic only
H04R 1/28 - Transducer mountings or enclosures designed for specific frequency response; Transducer enclosures modified by provision of mechanical or acoustic impedances, e.g. resonator, damping means
67.
SMART RECEIVE AUDIO SWITCHING FOR A CONVERGED DEVICE
An audio receiver for a converged portable radio (LMR/LTE radio) is provided with improved audio management. The converged device is managed by two different processors (BP/AP) and includes a selectable user setting for selecting either an LMR audio mode or an LTE audio mode (or both). Power up timing differences between the two processors is managed through a smart audio switch mechanism which includes AP control logic for selectively enabling and disabling an AP audio switch in response to operational status of both (AP/BP) processors during power up. The smart audio switch system further includes BP control logic for selectively enabling and disabling a BP audio switch in response to the operational status of the processors. Audio is played out at a single speaker. Both LTE audio and LMR audio can be mixed for a predetermined time during power up until the user selected audio mode has been established.
One example device includes an electronic processor configured identify, based on an incident type and a role of an object associated with a public safety incident, an uncompleted task that is to be performed by a public safety officer and that is associated with the object associated with the public safety incident. The electronic processor may be configured to identify first data included in a captured data file associated with the public safety incident that was generated at least partially by monitoring the object. The electronic processor may be configured to determine a time period within the captured data file during which the first data is identified to be present, and display an indication of the uncompleted task and at least one of the time period within the captured data file, the first data, and a user-selectable link to allow a user to consume the first data.
G06V 20/40 - Scenes; Scene-specific elements in video content
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
69.
Device with a microphone and a condensation collection apparatus to prevent migration of condensation to the microphone
A device with a microphone and a condensation collection apparatus to prevent migration of condensation to the microphone is provided. The device comprises a microphone; a board having an acoustic port therethrough, the microphone positioned to accept sound through the acoustic port; a moisture-resistant, acoustically transparent membrane over the acoustic port; an outer membrane that receives the sound for the microphone, the outer membrane being non-permeable to at least moisture; and a condensation collection apparatus between the outer membrane and the acoustically transparent membrane. The condensation collection apparatus comprises: an aperture through which the sound from the outer membrane passes; and one or more condensation collection features, at an outer-membrane facing side of the condensation collection apparatus, configured to: collect condensation that migrates from an inner side of the outer membrane; and prevent migration of the condensation, that is collected, through the aperture.
An audio receiver for a converged portable radio (LMR/LTE radio) is provided with improved audio management. The converged device is managed by two different processors (BP/AP) and includes a selectable user setting for selecting either an LMR audio mode or an LTE audio mode (or both). Power up timing differences between the two processors is managed through a smart audio switch mechanism which includes AP control logic for selectively enabling and disabling an AP audio switch in response to operational status of both (AP/BP) processors during power up. The smart audio switch system further includes BP control logic for selectively enabling and disabling a BP audio switch in response to the operational status of the processors. Audio is played out at a single speaker. Both LTE audio and LMR audio can be mixed for a predetermined time during power up until the user selected audio mode has been established.
One embodiment provides a method for mobility and collaboration between ultraportable systems. The method includes connecting a plurality of portable communications devices (120) to a first base station (110A) and receiving an indication from a first portable communications device (120A) of the plurality of portable communications devices (120) that the first portable communications device (120 A) is in a coverage area (130B) of a second base station (110B). The method also includes determining a number of portable communications devices (120) connected to the first base station (110A) and determining that the number of portable communications devices (120) connected to the first base station (110A) exceeds a capacity threshold of the first base station (110A). The method further includes instructing the first portable communications device (120) to re-attach to the second base station (110B) in response to determining that the number of portable communications devices (120) exceeds the capacity threshold.
Techniques for attaching multimedia to a report are provided. A request to attach a multimedia file to a report is received at a virtual assistant. A placeholder associated with the requested multimedia file is inserted in the report. A source of the multimedia file is identified. When the file is not already stored by a multimedia repository, it is requested from the source of the multimedia file that the multimedia file be provided to the multimedia repository to be stored. The placeholder associated with the requested multimedia file is replaced with the multimedia file stored in the multimedia repository once available.
G06F 16/40 - Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
73.
SYSTEM AND METHOD FOR MANAGING MULTIMEDIA UPLOAD OF A REPORT USING A VIRTUAL ASSISTANT
Techniques for attaching multimedia to a report are provided. A request to attach a multimedia file to a report is received at a virtual assistant. A placeholder associated with the requested multimedia file is inserted in the report. A source of the multimedia file is identified. When the file is not already stored by a multimedia repository, it is requested from the source of the multimedia file that the multimedia file be provided to the multimedia repository to be stored. The placeholder associated with the requested multimedia file is replaced with the multimedia file stored in the multimedia repository once available.
G06F 16/483 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/48 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
74.
Method and apparatus for allowing access through a controlled-access point
An access-control mechanism and method for controlling the access-control mechanism is provided herein. During operation the access-control mechanism will grant access to a user when a same utterance is detected over a local microphone and via a communication system, and a time period between receptions of each utterance is within a predetermined period.
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/00 - Individual registration on entry or exit
75.
System and method for streaming media to a public safety access point without incurring additional user costs
Techniques for streaming media to a public safety access point without incurring additional user costs are provided. A media stream from a mobile device is received at a communications network. The media stream being streamed from the mobile device to a social media platform in a first format. A request from a Public Safety Access Point to stream the media from the mobile device in a second format is received at the communications network. A request is sent to the mobile device to send the media stream in the second format. The media stream received from the mobile device in the second format is converted to the first format. The media stream received in the second format is sent to the Public Safety Access Point. The converted media stream in the first format is sent to the social media platform.
A process for prompting a user to report a public-safety incident. In operation, an electronic computing device captures sensor data via one or more sensor devices communicatively coupled to the electronic computing device. The device uses the captured sensor data to detect an occurrence of a potential public-safety incident and further monitors whether a user operating the device has not reported the safety incident to an identified public-safety agency. If the user does not report the incident, then the device identifies a time window as a function of as a function of one or more of user availability, user health and/or mental status, user convenience, user privacy, user safety or severity of the potential public-safety incident, or predefined user input. The device then provides a visual and/or audio prompt for prompting the user to report the incident to the public-safety agency during the identified time window.
A process for prompting a user to report a public-safety incident. In operation, an electronic computing device captures sensor data via one or more sensor devices communicatively coupled to the electronic computing device. The device uses the captured sensor data to detect an occurrence of a potential public-safety incident and further monitors whether a user operating the device has not reported the safety incident to an identified public-safety agency. If the user does not report the incident, then the device identifies a time window as a function of as a function of one or more of user availability, user health and/or mental status, user convenience, user privacy, user safety or severity of the potential public-safety incident, or predefined user input. The device then provides a visual and/or audio prompt for prompting the user to report the incident to the public-safety agency during the identified time window.
One aspect provides a method (300) for object detection including detecting, using an electronic processor (140), a plurality of candidate objects in a video using a convolutional neural network detection process (200) and a background subtraction detection process (210) and identifying, using the electronic processor (140), a candidate object from the plurality of candidate objects. The candidate object detected by the background subtraction detection process (210) in a location of the video with no candidate objects detected by the convolutional neural network detection process (200). The method (300) also includes determining, using the electronic processor (140), a background subtraction confidence level of the candidate object and categorizing, using the electronic processor (140), the candidate object as a detected object in the video in response to the background subtraction confidence level satisfying a background subtraction confidence threshold.
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
79.
VIDEO-BASED PUBLIC SAFETY INCIDENT PREDICTION SYSTEM AND METHOD THEREFOR
A method and system for improving prediction of an incident affecting public safety is described. At a machine learning analytics system, the method includes obtaining a real-time video for a location of a public safety emergency call and predicting a public safety incident therefrom. At a learning processor, the method includes: receiving information related to the public safety emergency call; identifying a public safety incident type based thereon; receiving the prediction of the public safety incident; using a first public safety incident machine learning model based on the identified public safety incident type and comparing the public safety incident prediction with the information related to the public safety emergency call and identifying an incident prediction mismatch therefrom. The learning processor identifies an artifact in the real-time video that is a contributing factor for the incident prediction mismatch; and implements a model improvement action associated with the artifact.
One aspect provides a method for object detection including detecting, using an electronic processor, a plurality of candidate objects in a video using a convolutional neural network detection process and a background subtraction detection process and identifying, using the electronic processor, a candidate object from the plurality of candidate objects. The candidate object detected by the background subtraction detection process in a location of the video with no candidate objects detected by the convolutional neural network detection process. The method also includes determining, using the electronic processor, a background subtraction confidence level of the candidate object and categorizing, using the electronic processor, the candidate object as a detected object in the video in response to the background subtraction confidence level satisfying a background subtraction confidence threshold.
A portable radio is provided that performs an impedance measurement to determine a radio frequency (RF) load type connected to an antenna port of the portable radio. The portable radio includes an impedance measurement circuit and a tunable matching circuit operatively coupled thereto through an RF switch A sweep generator injects an LMR frequency sweep to the RF load during non-transmit or non-receive time slots for the impedance measurement. The tunable matching circuit is configured as a radio frequency (RF) bypass during the impedance measurement, thereby enabling the impedance measurement circuit to directly measure the impedance of the RF load coupled to the RF port and identify the RF load as either a land mobile radio (LMR) antenna or equipment (wideband load). When the RF load is determined to be an LMR antenna, then the matching circuitry is tuned for the identified antenna. When the RF load is determined to be wideband equipment, then the matching circuitry remains bypassed.
In response to detecting an incident at a building, a risk assessment for the building is performed. The risk assessment identifies dynamic security constraints for different locations at the building. A set of behavioral rules for controlling a sensor system at the building is updated based on the risk assessment to obtain an updated set of behavioral rules. The sensor system operating under the updated set of behavioral rules is referenced to detect a visitor at a location of the building during the incident. The location of the visitor is correlated to the risk assessment to determine a specific information security risk posed by the visitor. A recommended follow-up action is generated based on the specific information security risk.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
83.
EMERGENCY MEDICAL SYSTEM FOR HANDS-FREE MEDICAL-DATA EXTRACTION, HAZARD DETECTION, AND DIGITAL BIOMETRIC PATIENT IDENTIFICATION
Systems described herein can use microphones and cameras to capture media data (e.g., audio data and video data) at the scene of an emergency, apply specific types of software to the media data to extract medical data for a patient and a digital biometric identifier of the patient, associate the medical data with the digital biometric identifier in a data structure, and transmit the medical data, the digital biometric identifier, and the data structure to a treatment facility. The systems described herein can accomplish these tasks without involving responders' hands, thereby allowing responders' hands to be used for treating patients, driving ambulances, and performing other lifesaving tasks without interruption. When a person arrives at the treatment facility, a second digital biometric identifier can be captured and compared to the digital biometric identifier to confirm that the person is the patient to whom the medical data applies.
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G10L 17/00 - Speaker identification or verification
G06F 40/40 - Processing or translation of natural language
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Methods and systems for processing multimedia files associated with an incident. One method includes receiving a request to submit a multimedia file associated with the incident and, in response to receiving the request, transmitting a text message including an identifier of the incident to a communication device. The method also includes receiving, at the answering point, a reply to the text message, the reply including the multimedia file and the identifier, and storing, at the answering point, the multimedia file including using the identifier to link the multimedia file to an incident record for the incident.
Tendency detecting and analysis in support of generating one or more workflows via user interface interactions is disclosed. In accordance with the user interface interactions, processing user selection of one or more icons may generate at least one user-selectable option within a graphical user interface, where the user-selectable option corresponds to at least one workflow action. The workflow action may relate to an identified tendency of a person or a group of people.
Systems and methods for indicating call status for relevant dispatch call participants. One example method includes receiving a voice communication associated with a talkgroup having a plurality of participants, determining context information for the participants from the voice communication, and selecting a relevant participant based on the context information. The method includes receiving a plurality of video streams, at least one of which includes an image of one of the participants. The method includes, for each of the video streams, when the video stream includes an image of the relevant participant, augmenting the video stream to include a highlighted image of the relevant participant, and assigning a priority based on the highlighted image and the context information. The method includes selecting a video stream including the highlighted image of the relevant participant based on the priorities assigned to the video streams and presenting the video stream on a display.
G10L 25/57 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for processing of video signals
G10L 15/18 - Speech classification or search using natural language modelling
87.
COMPUTING SYSTEMS FOR RAPIDLY COLLECTING DIGITAL WITNESS STATEMENTS AND EFFICIENTLY CORRECTING TRANSCRIPTION ERRORS
Systems, methods, and devices disclosed herein can capture an audio recording of an utterance, generate a transcription based on the audio recording, and generate a score for a section of the transcription that reflects a level of confidence that at least one word in the section was correctly transcribed. Content of the section is rendered in a field on a display. Also, a timeline for the audio recording is rendered. If the score does not satisfy a condition, the fill scheme applied to a segment of the timeline that maps to the section may differ from a fill scheme that is applied to the remainder of the timeline. An additional audio recording is then captured and transcribed. An additional timeline is rendered for the additional audio recording alongside the timeline and is aligned with the section. The transcription of the additional audio recording is used to replace the section.
A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation a workflow for a first camera is automatically suggested, or a new workflow generated for the first camera, based upon a workflow being created for a second camera having a similar field of view as the first camera. In particular, a workstation (or server) will receive an indication that a workflow was created for a camera. The workstation (or server) then determines if any other cameras have similar field of views. New workflows will then be suggested (or implemented) for the cameras having similar field of views. The suggested/implemented workflows will have a similar trigger and a similar action.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
89.
Operation mode selection and synchronization for converged devices
A converged device including a first subsystem and a second subsystem, configured to operate in multiple operation modes with varying levels of security. One example provides a method for operating the device. The method includes determining, during a startup sequence of the first subsystem and with a first processor of the first subsystem, a last operation mode for the first subsystem. The method includes determining, responsive to detecting that a SIM is installed in the converged device, a network type for the SIM. The method includes controlling, with the first processor, a first communication interface based on the network type and the last operation mode. The method includes determining, during a startup sequence of the second subsystem and with a second processor of the second subsystem, the last operation mode for the first subsystem and controlling, with the second processor, a second communication interface based on the last operation mode.
G06F 9/00 - Arrangements for program control, e.g. control units
G06F 15/177 - Initialisation or configuration control
G06F 21/74 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Systems, methods, and devices disclosed herein can collect digital witness statements (e.g., on a witness's own mobile device), detect when witnesses are accessing electronic resources during preparation of those digital witness statements, elicit input from witnesses to identify the electronic resources accessed, and detect portions of the digital witness statements that may have been influenced by data procured from those electronic resources. Furthermore, the systems, methods, and devices disclosed herein can generate an indication of consistency between content found in the electronic resources and content found in the digital witness statements so that a degree to which the electronic resources influenced the witness statements can be inferred.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
A converged device including a first subsystem (104) and a second subsystem (106), configured to operate in multiple operation modes with varying levels of security. One example provides a method (400) for operating the device. The method (400) includes determining, during a startup sequence (612) of the first subsystem (104) and with a first processor of the first subsystem (104), a last operation mode for the first subsystem (104). The method (400) includes determining, responsive to detecting that a SIM (230) is installed in the converged device, a network type (280) for the SIM (230). The method (400) includes controlling, with the first processor, a first communication interface (225) based on the network type (280) and the last operation mode. The method (400) includes determining, during a startup sequence (612) of the second subsystem (106) and with a second processor of the second subsystem (106), the last operation mode for the first subsystem (104) and controlling, with the second processor, a second communication interface (225) based on the last operation mode.
A security ecosystem, device and method for controlling workflows based on network confirmation processes is provided. A first device receives, from a second device, a message for delivery to a talkgroup on a given network, the second device executing a safety workflow comprising: a trigger that caused transmission of the; and one or more responsive actions that depend on whether transmission/delivery of the message to the talkgroup is successful or unsuccessful. The first device selects a mechanism for determining success or failure of transmission/delivery of the message based on a message confirmation process of the given network. The first device provides, to the given network, the message for delivery to the talkgroup and receives a reply to the message. The first device provides, to the second device, an indication of success or failure of transmission/delivery of the message, based on the reply and the mechanism selected.
H04L 51/23 - Reliability checks, e.g. acknowledgments or fault reporting
H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
93.
PREDICTIVE CASE SOLVABILITY SCORE SYSTEM WITH ACTION RECOMMENDATIONS BASED ON DETECTED TRENDS
Technical methods, devices, and systems disclosed herein provide a predictive case-solvability score service. The predictive case-solvability score service generates case solvability scores for cases, detects events that signal those scores should be updated, updates a machine-learning model over time to ensure current trends in recent data are reflected, and identifies specific actions to recommend for increasing those scores. Furthermore, the predictive case-solvability score service provides an interface that allows users to perceive trends in case-solvability scores over time and to execute some of the specific recommended actions.
Techniques for improving admissibility of electronic evidence are provided. An indication that a piece of evidence has been presented to and rejected by a court may be received. The indication includes a reason the piece of evidence was rejected. Metadata related to the piece of evidence is updated in the evidence management system to indicate the reason why the piece of evidence was rejected. Analytics are used to locate additional incidents similar to the incident in the evidence management system. Additional rejected evidence associated with the located incidents that are associated with the piece of evidence that has been rejected by the court based on metadata associated with the additional rejected evidence are identified. Artificial intelligence is used to analyze the rejected evidence and the additional rejected evidence to determine commonalities between the reasons for rejection. A recommended corrective action to prevent future rejection of later gathered evidence is output.
Techniques for leveraging downlink bandwidth when uplink bandwidth is limited are provided. An image is captured at an edged device, the image including at least one face of a person, the image captured at a first resolution. The image is stored at the first resolution in the edge device. The image is converted to a second resolution, the second resolution being lower than the first resolution. The converted image is sent to a backend facial recognition system. A set of candidate facial recognition matches is received. Facial recognition is performed at the edge device based on the stored image captured at the first resolution and the set of candidate facial recognition matches.
A computer-implemented method for video redaction of disclosure-protected objects is disclosed. A system for video redaction of disclosure-protected objects is also disclosed. A computer program product video redaction of disclosure-protected objects is also disclosed. A video interval may be broken into a plurality of sub-intervals, and unique random image substitution may be carried out over each of the sub-intervals in connection with the video redaction.
A process of extending retention periods of records. In operation, an electronic computing device identifies a retention period associated with the record. The device obtains information related to a future event. The information includes a time period during which the future event is predicted or scheduled to occur and a location at which the future event is predicted or scheduled to occur. When the device determines that the record is contextually related to the future event based at least in part on the time period or the location of the future event, the retention period associated with the record is extended. The device may also automatically extend retention periods of records based on a number of other retention-related factors associated with the record including recording content, record trustworthiness, recording time, recording location, recording data type, recording source, recording officers' profile and their association, crime statistics, incident severity, and the like.
A method and apparatus for displaying information regarding calls to a plurality of PSAPs is provided herein. During operation, an interface will display information as to whether a PSAP is receiving calls it normally would not be receiving, information as to whether or not a PSAP is not working correctly, and information on a status of any rerouted calls to a PSAP In an alternate embodiment of the present invention, a reason for a PSAP call re-route is also provided.
A process of issuing a limited-use electronic certificate. In operation, a public key infrastructure (PKI) device receives a request for an electronic certificate from an end entity. The PKI device detects an anomaly with respect to the request received from the end entity. The PKI device generates, based on the detected anomaly, a limited-use electronic certificate. The PKI then issues the limited-use electronic certificate to the end entity. When the end entity determines that the issued certificate is a limited-use certificate with limited-use attributes such as a shortened validity period or lowered assurance level, the end entity provides a visual and/or audio prompt indicating the issuance of the limited-use certificate and further including one or more corrective actions to be performed to eliminate the anomaly prior to sending a new request for an electronic certificate to the PKI device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
100.
DEVICE AND METHOD FOR EXTENDING RETENTION PERIODS OF RECORDS
A process of extending retention periods of records. In operation, an electronic computing device identifies a retention period associated with the record. The device obtains information related to a future event. The information includes a time period during which the future event is predicted or scheduled to occur and a location at which the future event is predicted or scheduled to occur. When the device determines that the record is contextually related to the future event based at least in part on the time period or the location of the future event, the retention period associated with the record is extended. The device may also automatically extend retention periods of records based on a number of other retention-related factors associated with the record including recording content, record trustworthiness, recording time, recording location, recording data type, recording source, recording officers' profile and their association, crime statistics, incident severity, and the like.