A device, system and method for managing talkgroups is provided. A computing device determines that a communication device is communicating with a talkgroup via a first communication network, the talkgroup dominated by other communication devices communicating on one or more second communication networks different from the first communication network. The computing device determines a level of activity of the communication device in the talkgroup via the first communication network. When the level of activity meets a threshold condition, the computing device: requests a confirmation from the communication device to cease communication with the talkgroup; and when the confirmation is received, drops the communication device from the talkgroup.
Techniques for prioritizing similarities and differences during responses to incidents based on incident context are provided. Video and audio of an initial response to a first incident at an incident location is monitored. A context for the initial response is created. Video and audio of a subsequent response to a second incident at the incident location is monitored. The video and audio of the initial response and the subsequent response is compared. A machine learning model prioritizes the similarities and differences between the video and audio based on the context. The similarities and differences between the video and audio are provided to a subsequent responder based on the prioritization.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
6.
DEVICE, SYSTEM, AND METHOD FOR TRANSFERRING CALLS TO PUBLIC-SAFETY ANSWERING POINTS
A device, system and method for transferring calls to public-safety answering points is provided. A call routing devices receives, from a plurality of public-safety answering points (PSAPs), status data indicating respective states of the plurality of PSAPs. The call routing device receives a call to be routed to a first PSAP of the plurality of PSAPs. The call routing device generates a list of other PSAPs, of the plurality of PSAPs, prioritized according to the status data. The call routing device routes the call to the first PSAP, the call routed with the list. The call routing device receives, from the first PSAP, an indication to transfer the call to a second PSAP selected from the list. The call routing device transfers the call to the second PSAP.
H04M 3/58 - Arrangements for transferring received calls from one subscriber to another; Arrangements affording interim conversations between either the calling or the called party and a third party
One aspect provides a video surveillance system including a video camera configured to capture a video and a video redactor in communication with the video camera and including an electronic processor. The electronic processor is configured to retrieve the video from the video camera, identify an object to be redacted from the video, and redact the object from the video. The electronic processor is further configured to identify a first reflective surface appearing in the video, redact the first reflective surface from the video, and output a modified video in which the object and the first reflective surface have been redacted.
A video security system configured for simplified cluster join is disclosed. The video security system includes a video management server device that internally includes at least one non-volatile storage medium initially storing incomplete portions of first and second computer readable instructions that entirely define server components that provide first and second operational supports for first and second video cameras. The video management server device is configured to communicate with the first and second video cameras over at least one local area network path. The video management server device is also configured to communicate with a package sourcing entity to transmit information about the incomplete portions to the package sourcing entity. The video management server device is also configured to automatically receive, from the package sourcing entity, an upgrade package that is tailored to include remainder portions of the first and second computer readable instructions without the incomplete portions
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
H04N 21/241 - Operating system [OS] processes, e.g. server setup
H04N 21/63 - Control signaling between client, server and network components; Network processes for video distribution between server and clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
Device configurations for a machine-learned model. A device analytics system includes an electronic processor configured to determine, for a machine-learned model configured to detect a plurality of features, a prioritization ranking for a plurality of input parameters provided to the machine-learned model and receive, for each device, a confidence value for each feature included in the plurality of features. The electronic processor is configured to determine, for each device included in the plurality of devices, a performance value for each feature included in the plurality of features based on the prioritization ranking for the plurality of input parameters and the confidence value for each feature for the respective device. The electronic processor is configured to select, based on the performance value for each device included in the plurality of devices for a feature, a device configuration for the machine-learned model, and implement the selected device configuration.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 67/00 - Network arrangements or protocols for supporting network services or applications
10.
CERTIFICATE ENTITLEMENT LICENSES FOR AUTHENTICATING PUBLIC KEY INFRASTRUCTURE CERTIFICATE ENROLLMENT
Systems and methods for authenticating public key infrastructure certificate enrollment using certificate entitlement licenses. One example system includes a device manager including an electronic processor. The electronic processor is configured to receive a request for software for an electronic device including a unique electronic device identifier. The electronic processor is configured to determine, based on the request, whether the electronic device is entitled to participate in a certificate management service. The electronic processor is configured to, responsive to determining that the electronic device is entitled to participate in a certificate management service, transmit a certificate entitlement license request including the unique device identifier to a certificate entitlement license manager. The electronic processor is configured to receive, from the certificate entitlement license manager, a certificate entitlement license for the unique device identifier. The electronic processor is configured to deliver the certificate entitlement license based on the unique device identifier.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
An access-control mechanism, wireless device, and method for controlling the access-control mechanism and wireless device is provided herein. During operation the wireless device will create a “group” of devices that will be allowed to enter through a passage barrier without authentication. When authenticating with the access-control mechanism, the wireless device will prove the access-control mechanism with a list of credentials (e.g., identification information) for each device within the group. The access-control mechanism will then determine if every device on the list is allowed entry. If so, non-authenticated entry for a number of devices/people through the passage barrier will be allowed. The number of non-authenticated devices/people allowed to enter will be equal to a number of devices that are in the group.
Systems and methods for managing rate-controlled and scheduled workloads in distributed computing systems. One example method provides a distributed two-phase algorithm, which utilizes an external timer service and local high-resolution timers to orchestrate time critical workloads on distributed computing systems. The first phase is a planning phase implemented as a recurrent process by means of repeated registrations to the external timer service. During the planning phase, a portion or all of the workload to be performed is broken down into small batches to be assigned to computing instances for execution at a later time. The second phase is a batch execution phase. Each batch planned during the planning phase includes fine-grained instructions as to when each item within the batch is to be executed. The computing instance receiving the batch uses local high-resolution timers to synchronize the execution of items relative to one another.
A device, system, and method for machine-learning based noise suppression is provided. The device (and/or system) comprises a microphone, an output device, a noise suppression engine and a machine-learning noise suppression engine. The machine-learning noise suppression engine receives audio data from the noise suppression engine or the microphone, applies machine learning algorithms to the audio data to generate machine-learning based noise suppression parameters, and provides the parameters to the noise suppression engine. The noise suppression engine receives the audio data from the microphone and, prior to receiving the parameters, applies non-machine-learning based noise suppression to the audio data to generate noise-suppressed audio data, and provides the noise-suppressed audio data to the output device. However, after receiving the parameters, the noise suppression engine applies the parameters to the noise-suppressed audio data to generate updated noise-suppressed audio data, and provides the updated noise-suppressed audio data to the output device.
G10L 19/00 - Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
An access-control mechanism, wireless device, and method for controlling the access-control mechanism and wireless device is provided herein. During operation the wireless device will create a “group” of devices that will be allowed to enter through a passage barrier without authentication. When authenticating with the access-control mechanism, the wireless device will prove the access-control mechanism with a list of credentials (e.g., identification information) for each device within the group. The access-control mechanism will then determine if every device on the list is allowed entry. If so, non-authenticated entry for a number of devices/people through the passage barrier will be allowed. The number of non-authenticated devices/people allowed to enter will be equal to a number of devices that are in the group.
A portable communication system includes a remote speaker microphone (RSM) accessory (102) coupled to a portable radio and further coupled to a secondary audio accessory (SAA) (108). The RSM accessory (102) includes a user interface toggle switch (120) that toggles between a first mode of operation and a second mode of operation. Toggling to the first mode of operation selectively routes receive audio from the portable radio to a speaker (112) of the RSM accessory, while generating and routing a periodic audio artifact from the RSM to the SAA (108) for play out at a speaker (316) of the secondary accessory. The received audio is played out of the RSM speaker (112) in parallel with the periodic audio artifact being played out of the secondary accessory speaker (316).
A process of anonymizing a person captured in an image. An anonymization server receives a request from an agency to anonymize a person captured in an image including an unredacted facial feature corresponding to the person and an unredacted non-facial feature. The server redacts the facial feature captured in the image to generate a first redacted image. The server then identifies a second image accessible to users not associated with the agency. When the server determines that the anonymity of the person captured in the first redacted image can be compromised using unredacted facial and non-facial features captured in the second image, the server further redacts the non-facial feature captured in the image.
An access-control mechanism and method for controlling the access-control mechanism is provided herein. During operation the access-control mechanism will grant access to a user when a same utterance is detected over a local microphone and via a communication system, and a time period between receptions of each utterance is within a predetermined period.
G07C 9/23 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/00 - Individual registration on entry or exit
G10L 17/24 - the user being prompted to utter a password or a predefined phrase
18.
ANONYMIZING CALLER IDENTITY BASED ON VOICE PRINT MATCH
Methods and systems for anonymizing an identity of a caller using a voice print match. One system includes a surveillance system including a camera and a microphone; and a dispatch computer. The dispatch computer is configured to receive a voice call from the caller, generate a voice print from the voice call, compare the voice print to a plurality of stored voice prints, and, in response to the voice print not matching any of the plurality of stored voice prints, transmit the voice print to the surveillance system. The surveillance system is configured to receive the voice print, capture audio data via the microphone, compare the audio data to the voice print, and, in response to identifying a match between the voice print and the audio data, tag image data, captured via the camera, corresponding to the audio data for redaction.
A device, system, and method for implementing role-based machine learning models is provided. A implements a supervisory machine learning model that detects a first role associated with a first object in images received from a camera. The device, from machine learning models, selects and implements a first machine learning model associated with the first role to perform analysis on the images, that is reported to one or more communication devices. After implementing the first machine learning model, the device uses the supervisory machine learning model to determine a second role associated with a second object in the images that is different from the first role, and selects, from the machine learning models, a second machine learning model associated with the second role. The device implements the second machine learning model to perform analysis on the images to change the analysis reported to the one or more communication device.
A device, system and method for dispatching public-safety responder types to a three-dimensional location is provided. A device: receives a call and an associated location including ground coordinates and an altitude; and selects a primary public-safety responder type from a plurality of public-safety responder types associated with corresponding altitude ranges that are at or near the ground coordinates, the primary public-safety responder type associated with a corresponding altitude range that includes the altitude of the associated location of the call. The device one of automatically dispatches the primary public-safety responder type to the ground coordinates and the altitude associated with the call; and provides, to a public-safety answering point associated with the ground coordinates, an electronic suggestion to dispatch the primary public-safety responder type to the ground coordinates and the altitude associated with the call.
A device, system, and method for causing electronic actions for categories of persons-of-interest (POI) is provided. A device maintains an attendee list of persons located within a given area using images received from cameras monitoring the given area. In response to determining that the given area meets a given condition the device: uses a current version of the attendee list to generate a POI list of POIs within the given area; categorizes, using the images received from the cameras, the POIs into given categories based on: whether a POI is being monitored by the cameras; whether a location associated with the POI is determined; and, the location associated with the POI, when determined; and causes one or more respective electronic actions to occur in relation to respective POIs associated with a given category into which the respective POIs are categorized.
A device, system, and method for incident air space management is provided. A system includes a controller and a signaling unmanned aerial vehicle (SUAV) associated with a public-safety entity. The controller dispatches the SUAV to a location of a public-safety incident and generates a restricted airspace boundary for airspace, associated with the incident, within which the SUAV operates. The controller activates a restricted airspace beacon of the SUAV that correlates with the restricted airspace boundary. The SUAV broadcasts the restricted airspace beacon, indicating the restricted airspace boundary, relative to a current location of the SUAV. The restricted airspace beacon is operational in at least two modes: a stationary incident mode, during which the SUAV and the restricted airspace boundary are stationary relative to a fixed location of incident; and a mobile incident mode, during which the SUAV and the restricted airspace boundary are mobile and tracking a moving incident location.
Techniques for identifying human interaction limitations based on historical information are provided. An indication of a public safety incident is received. The public safety incident involves at least one person and occurs at an incident location. Historical video of the incident location is acquired. The historical video of the incident location is analyzed to identify the presence of the at least one person. A behavior of the at least one person in the historical video of the incident location is analyzed to identify at least one human interaction limitation. A first responder that is responding to the public safety incident is informed of the at least one human interaction limitation.
A method and apparatus for better securing databases is provided herein. During a database search, a target of a search (e.g., a person or object) will have a maximum number of allowed searches. When a user performs a search on a target, a determination of how many prior searches on the target object or individual was made. If the number of prior searches exceeds a threshold, then the search will be denied.
A device, system, and method for altering video streams to identify objects of interest is provided. A devices analyzes: media data to determine one or more visual traits of an object-of-interest (OOI); and a first video stream to determine that the visual trait(s) are not identifiable at the first video stream, the first video stream being rendered at a display screen. The device identifies at least one of the visual trait(s) at a second video stream to identify the OOI at the second video stream, the second video stream associated with the first video stream. The device identifies the OOI at the first video stream using the OOI as identified in the second video stream. The device alters the first video stream at the display screen to visually indicate one or more of: the and at least one of visual trait(s) identified at the second video stream.
G06V 20/40 - Scenes; Scene-specific elements in video content
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
A battery alignment system includes a housing having a groove along a side of the housing, a first set of surfaces that define a recess, and first electrical contacts positioned at least partially within the recess. The battery alignment system also includes a battery having a tab to slide within the groove of the housing to facilitate a first alignment, a second set of surfaces that protrude from an end of the battery to slide into the recess of the housing to facilitate a second alignment, and a third surface that extends from one of the second set of surfaces. The third surface engages one of the first set of surfaces to facilitate a third alignment. The battery also includes second electrical contacts that engage the first electrical contacts.
H01M 50/291 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders characterised by spacing elements or positioning means within frames, racks or packs characterised by their shape
H01M 50/247 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders specially adapted for portable devices, e.g. mobile phones, computers, hand tools or pacemakers
H01M 50/262 - Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders with fastening means, e.g. locks
H01M 50/244 - Secondary casings; Racks; Suspension devices; Carrying devices; Holders characterised by their mounting method
27.
METHOD OF HANDLING AN INCIDENT IN A MULTI-CLOUD ENVIRONMENT
A process for handling an incident in a multi-cloud environment is provided. The process comprises receiving digital data associated with an incident, identifying cloud services to be executed in response to the incident, determining estimated usage levels at which the cloud services will be utilized in response to the incident, determining at least a first option of executing the cloud services and a second option of executing the cloud services that is different from the first option, estimating at least a cost of executing the cloud services according to the first option and a cost of executing the cloud services according to the second option, identifying a selected option by receiving the selected option from a user or choosing an option having the lowest estimated cost to be the selected option, and causing the cloud services to be executed according to the selected option.
A method and system that accounts for appearance changes in an object, attributable to object deformation or restoration, is disclosed. The system includes an object deformation prediction database. The object deformation prediction database is accessible as a function of the type of the object. The object deformation prediction database can identify one or more ways in which the type of object, and thus the object, is deformable to or restorable from a reference appearance that is depicted in a particular sub-region of an object.
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
G06F 16/78 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
Apparatus and method for appearance search for incident response. One embodiment provides a method for appearance searching for incident response. The method includes receiving a search criteria at a command server and initiating an appearance search based on the search criteria. The appearance search is performed on a plurality of responding devices communicatively connected to the command server. The method further includes receiving, at the command server, an update to the search criteria and determining, using the command server, a confidence level of the update based on weights assigned to each a plurality of parameters of the update. The method also includes creating, using the command server, an updated search criteria based on the search criteria and the update when the confidence level of the update exceeds a predetermined confidence threshold and pushing the updated search criteria for the appearance search to the plurality of responding devices.
A system for alerting an emergency responder that an emergency has occurred during a video communication between two or more participants, including: a trusted custodian computer system that receives emergency information from (and then generates unique tokens for) the participants of a video communication. A second participant who has witnessed a first participant have an emergency during the video communication transmits the first participant's unique token to a first responder who then transmits the unique token to the trusted custodian computer system. The trusted custodian computer system then determines when the first responder is both capable of and permitted to respond to the emergency, or locates another appropriate first responder that is capable of and permitted to respond to the emergency.
A process of detecting signal interference among geographically co-located radios affiliated with different talkgroups, An electronic computing device receives a log of push-to-talk (PTT) operations performed at a first radio and a log of audio quality values measured corresponding to audio communications received at a second radio. The first radio is affiliated with a first talkgroup and operates on a first channel frequency assigned to the first talkgroup. The second radio is affiliated with a second talkgroup and further operates on a second channel frequency assigned to the second talkgroup. The device detects that signal interference at the second radio is potentially caused by the first radio when there is a time correlation between a PTT operation performed at the first radio and a change in audio quality at the second radio and when the second radio was geographically co-located with the first radio during the time correlation.
Method and 3D modeling server (110) to generate a 3D model. The method includes receiving first images captured by a camera (320) corresponding to an incident scene and receiving first metadata generated by a time-of-flight sensor (325) corresponding to the first images. The method also includes generating a 3D model at a first resolution including a plurality of 3D points based on the first images and the first metadata and identifying a first incident-specific point of interest from the first images. The method further includes transmitting for recapturing the first incident-specific point of interest and receiving second images captured of the first incident-specific point of interest. The method also includes receiving second metadata generated corresponding to the second images and updating a first portion of the 3D model corresponding to the first incident-specific point of interest to a second resolution based on the second images and the second metadata.
A system and method for redaction based on group association is disclosed. The method includes carrying out an analysis that includes coming to a determination that, notwithstanding at least some features of a plurality of group-associated objects are being concealed, a visible association between the objects in combination with size and shape definitions for corresponding redactions of the group-associated objects is such that an identity deducibility condition is either met or is not met.
Systems and methods for dynamically updating and distributing digital reconnaissance maps for incident response. One example system includes an electronic processor coupled to an electronic communication interface. The processor is configured to receive an incident notification for an incident occurring at an incident scene and to generate a reconnaissance map for the incident scene. The processor is configured to receive a voice communication associated with a first incident responder at the incident scene and determine, for the first incident responder, a location within the incident scene. The processor is configured to determine a location status for the location based on the voice communication and to generate an updated reconnaissance map for the incident scene based on the reconnaissance map, the location, and the location status. The processor is configured to send, via the communication interface, the updated reconnaissance map to an electronic communication device associated with a second incident responder.
Techniques for transcription of an audio stream are provided. A request for transcription of a first audio stream from a first device is received. A request for transcription of a second audio stream from a second device is received. It is determined that the first and second audio streams are the same. One of the first and second audio streams are selected for transcription. Transcription of the selected audio stream is requested.
A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation a workflow is automatically modified, or a new workflow generated, based upon user queries made after a workflow has been executed.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
G06F 9/451 - Execution arrangements for user interfaces
37.
INDICATING THAT CAPTURED DATA IS ASSOCIATED WITH AN UNCOMPLETED TASK OF AN INCIDENT
One example device includes an electronic processor configured identify, based on an incident type and a role of an object associated with a public safety incident, an uncompleted task that is to be performed by a public safety officer and that is associated with the object associated with the public safety incident. The electronic processor may be configured to identify first data included in a captured data file associated with the public safety incident that was generated at least partially by monitoring the object. The electronic processor may be configured to determine a time period within the captured data file during which the first data is identified to be present, and display an indication of the uncompleted task and at least one of the time period within the captured data file, the first data, and a user-selectable link to allow a user to consume the first data.
G06V 20/40 - Scenes; Scene-specific elements in video content
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
38.
Device with a microphone and a condensation collection apparatus to prevent migration of condensation to the microphone
A device with a microphone and a condensation collection apparatus to prevent migration of condensation to the microphone is provided. The device comprises a microphone; a board having an acoustic port therethrough, the microphone positioned to accept sound through the acoustic port; a moisture-resistant, acoustically transparent membrane over the acoustic port; an outer membrane that receives the sound for the microphone, the outer membrane being non-permeable to at least moisture; and a condensation collection apparatus between the outer membrane and the acoustically transparent membrane. The condensation collection apparatus comprises: an aperture through which the sound from the outer membrane passes; and one or more condensation collection features, at an outer-membrane facing side of the condensation collection apparatus, configured to: collect condensation that migrates from an inner side of the outer membrane; and prevent migration of the condensation, that is collected, through the aperture.
An audio receiver for a converged portable radio (LMR/LTE radio) is provided with improved audio management. The converged device is managed by two different processors (BP/AP) and includes a selectable user setting for selecting either an LMR audio mode or an LTE audio mode (or both). Power up timing differences between the two processors is managed through a smart audio switch mechanism which includes AP control logic for selectively enabling and disabling an AP audio switch in response to operational status of both (AP/BP) processors during power up. The smart audio switch system further includes BP control logic for selectively enabling and disabling a BP audio switch in response to the operational status of the processors. Audio is played out at a single speaker. Both LTE audio and LMR audio can be mixed for a predetermined time during power up until the user selected audio mode has been established.
One embodiment provides a method for mobility and collaboration between ultraportable systems. The method includes connecting a plurality of portable communications devices (120) to a first base station (110A) and receiving an indication from a first portable communications device (120A) of the plurality of portable communications devices (120) that the first portable communications device (120 A) is in a coverage area (130B) of a second base station (110B). The method also includes determining a number of portable communications devices (120) connected to the first base station (110A) and determining that the number of portable communications devices (120) connected to the first base station (110A) exceeds a capacity threshold of the first base station (110A). The method further includes instructing the first portable communications device (120) to re-attach to the second base station (110B) in response to determining that the number of portable communications devices (120) exceeds the capacity threshold.
Techniques for attaching multimedia to a report are provided. A request to attach a multimedia file to a report is received at a virtual assistant. A placeholder associated with the requested multimedia file is inserted in the report. A source of the multimedia file is identified. When the file is not already stored by a multimedia repository, it is requested from the source of the multimedia file that the multimedia file be provided to the multimedia repository to be stored. The placeholder associated with the requested multimedia file is replaced with the multimedia file stored in the multimedia repository once available.
G06F 16/483 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/48 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
42.
Method and apparatus for allowing access through a controlled-access point
An access-control mechanism and method for controlling the access-control mechanism is provided herein. During operation the access-control mechanism will grant access to a user when a same utterance is detected over a local microphone and via a communication system, and a time period between receptions of each utterance is within a predetermined period.
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/00 - Individual registration on entry or exit
43.
System and method for streaming media to a public safety access point without incurring additional user costs
Techniques for streaming media to a public safety access point without incurring additional user costs are provided. A media stream from a mobile device is received at a communications network. The media stream being streamed from the mobile device to a social media platform in a first format. A request from a Public Safety Access Point to stream the media from the mobile device in a second format is received at the communications network. A request is sent to the mobile device to send the media stream in the second format. The media stream received from the mobile device in the second format is converted to the first format. The media stream received in the second format is sent to the Public Safety Access Point. The converted media stream in the first format is sent to the social media platform.
A process for prompting a user to report a public-safety incident. In operation, an electronic computing device captures sensor data via one or more sensor devices communicatively coupled to the electronic computing device. The device uses the captured sensor data to detect an occurrence of a potential public-safety incident and further monitors whether a user operating the device has not reported the safety incident to an identified public-safety agency. If the user does not report the incident, then the device identifies a time window as a function of as a function of one or more of user availability, user health and/or mental status, user convenience, user privacy, user safety or severity of the potential public-safety incident, or predefined user input. The device then provides a visual and/or audio prompt for prompting the user to report the incident to the public-safety agency during the identified time window.
A method and system for improving prediction of an incident affecting public safety is described. At a machine learning analytics system, the method includes obtaining a real-time video for a location of a public safety emergency call and predicting a public safety incident therefrom. At a learning processor, the method includes: receiving information related to the public safety emergency call; identifying a public safety incident type based thereon; receiving the prediction of the public safety incident; using a first public safety incident machine learning model based on the identified public safety incident type and comparing the public safety incident prediction with the information related to the public safety emergency call and identifying an incident prediction mismatch therefrom. The learning processor identifies an artifact in the real-time video that is a contributing factor for the incident prediction mismatch; and implements a model improvement action associated with the artifact.
One aspect provides a method for object detection including detecting, using an electronic processor, a plurality of candidate objects in a video using a convolutional neural network detection process and a background subtraction detection process and identifying, using the electronic processor, a candidate object from the plurality of candidate objects. The candidate object detected by the background subtraction detection process in a location of the video with no candidate objects detected by the convolutional neural network detection process. The method also includes determining, using the electronic processor, a background subtraction confidence level of the candidate object and categorizing, using the electronic processor, the candidate object as a detected object in the video in response to the background subtraction confidence level satisfying a background subtraction confidence threshold.
A portable radio is provided that performs an impedance measurement to determine a radio frequency (RF) load type connected to an antenna port of the portable radio. The portable radio includes an impedance measurement circuit and a tunable matching circuit operatively coupled thereto through an RF switch A sweep generator injects an LMR frequency sweep to the RF load during non-transmit or non-receive time slots for the impedance measurement. The tunable matching circuit is configured as a radio frequency (RF) bypass during the impedance measurement, thereby enabling the impedance measurement circuit to directly measure the impedance of the RF load coupled to the RF port and identify the RF load as either a land mobile radio (LMR) antenna or equipment (wideband load). When the RF load is determined to be an LMR antenna, then the matching circuitry is tuned for the identified antenna. When the RF load is determined to be wideband equipment, then the matching circuitry remains bypassed.
In response to detecting an incident at a building, a risk assessment for the building is performed. The risk assessment identifies dynamic security constraints for different locations at the building. A set of behavioral rules for controlling a sensor system at the building is updated based on the risk assessment to obtain an updated set of behavioral rules. The sensor system operating under the updated set of behavioral rules is referenced to detect a visitor at a location of the building during the incident. The location of the visitor is correlated to the risk assessment to determine a specific information security risk posed by the visitor. A recommended follow-up action is generated based on the specific information security risk.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
49.
EMERGENCY MEDICAL SYSTEM FOR HANDS-FREE MEDICAL-DATA EXTRACTION, HAZARD DETECTION, AND DIGITAL BIOMETRIC PATIENT IDENTIFICATION
Systems described herein can use microphones and cameras to capture media data (e.g., audio data and video data) at the scene of an emergency, apply specific types of software to the media data to extract medical data for a patient and a digital biometric identifier of the patient, associate the medical data with the digital biometric identifier in a data structure, and transmit the medical data, the digital biometric identifier, and the data structure to a treatment facility. The systems described herein can accomplish these tasks without involving responders' hands, thereby allowing responders' hands to be used for treating patients, driving ambulances, and performing other lifesaving tasks without interruption. When a person arrives at the treatment facility, a second digital biometric identifier can be captured and compared to the digital biometric identifier to confirm that the person is the patient to whom the medical data applies.
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G10L 17/00 - Speaker identification or verification
G06F 40/40 - Processing or translation of natural language
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Methods and systems for processing multimedia files associated with an incident. One method includes receiving a request to submit a multimedia file associated with the incident and, in response to receiving the request, transmitting a text message including an identifier of the incident to a communication device. The method also includes receiving, at the answering point, a reply to the text message, the reply including the multimedia file and the identifier, and storing, at the answering point, the multimedia file including using the identifier to link the multimedia file to an incident record for the incident.
Tendency detecting and analysis in support of generating one or more workflows via user interface interactions is disclosed. In accordance with the user interface interactions, processing user selection of one or more icons may generate at least one user-selectable option within a graphical user interface, where the user-selectable option corresponds to at least one workflow action. The workflow action may relate to an identified tendency of a person or a group of people.
Systems and methods for indicating call status for relevant dispatch call participants. One example method includes receiving a voice communication associated with a talkgroup having a plurality of participants, determining context information for the participants from the voice communication, and selecting a relevant participant based on the context information. The method includes receiving a plurality of video streams, at least one of which includes an image of one of the participants. The method includes, for each of the video streams, when the video stream includes an image of the relevant participant, augmenting the video stream to include a highlighted image of the relevant participant, and assigning a priority based on the highlighted image and the context information. The method includes selecting a video stream including the highlighted image of the relevant participant based on the priorities assigned to the video streams and presenting the video stream on a display.
G10L 25/57 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for processing of video signals
G10L 15/18 - Speech classification or search using natural language modelling
53.
COMPUTING SYSTEMS FOR RAPIDLY COLLECTING DIGITAL WITNESS STATEMENTS AND EFFICIENTLY CORRECTING TRANSCRIPTION ERRORS
Systems, methods, and devices disclosed herein can capture an audio recording of an utterance, generate a transcription based on the audio recording, and generate a score for a section of the transcription that reflects a level of confidence that at least one word in the section was correctly transcribed. Content of the section is rendered in a field on a display. Also, a timeline for the audio recording is rendered. If the score does not satisfy a condition, the fill scheme applied to a segment of the timeline that maps to the section may differ from a fill scheme that is applied to the remainder of the timeline. An additional audio recording is then captured and transcribed. An additional timeline is rendered for the additional audio recording alongside the timeline and is aligned with the section. The transcription of the additional audio recording is used to replace the section.
A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation a workflow for a first camera is automatically suggested, or a new workflow generated for the first camera, based upon a workflow being created for a second camera having a similar field of view as the first camera. In particular, a workstation (or server) will receive an indication that a workflow was created for a camera. The workstation (or server) then determines if any other cameras have similar field of views. New workflows will then be suggested (or implemented) for the cameras having similar field of views. The suggested/implemented workflows will have a similar trigger and a similar action.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
55.
Operation mode selection and synchronization for converged devices
A converged device including a first subsystem and a second subsystem, configured to operate in multiple operation modes with varying levels of security. One example provides a method for operating the device. The method includes determining, during a startup sequence of the first subsystem and with a first processor of the first subsystem, a last operation mode for the first subsystem. The method includes determining, responsive to detecting that a SIM is installed in the converged device, a network type for the SIM. The method includes controlling, with the first processor, a first communication interface based on the network type and the last operation mode. The method includes determining, during a startup sequence of the second subsystem and with a second processor of the second subsystem, the last operation mode for the first subsystem and controlling, with the second processor, a second communication interface based on the last operation mode.
G06F 9/00 - Arrangements for program control, e.g. control units
G06F 15/177 - Initialisation or configuration control
G06F 21/74 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Systems, methods, and devices disclosed herein can collect digital witness statements (e.g., on a witness's own mobile device), detect when witnesses are accessing electronic resources during preparation of those digital witness statements, elicit input from witnesses to identify the electronic resources accessed, and detect portions of the digital witness statements that may have been influenced by data procured from those electronic resources. Furthermore, the systems, methods, and devices disclosed herein can generate an indication of consistency between content found in the electronic resources and content found in the digital witness statements so that a degree to which the electronic resources influenced the witness statements can be inferred.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
A security ecosystem, device and method for controlling workflows based on network confirmation processes is provided. A first device receives, from a second device, a message for delivery to a talkgroup on a given network, the second device executing a safety workflow comprising: a trigger that caused transmission of the; and one or more responsive actions that depend on whether transmission/delivery of the message to the talkgroup is successful or unsuccessful. The first device selects a mechanism for determining success or failure of transmission/delivery of the message based on a message confirmation process of the given network. The first device provides, to the given network, the message for delivery to the talkgroup and receives a reply to the message. The first device provides, to the second device, an indication of success or failure of transmission/delivery of the message, based on the reply and the mechanism selected.
H04L 51/23 - Reliability checks, e.g. acknowledgments or fault reporting
H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
58.
PREDICTIVE CASE SOLVABILITY SCORE SYSTEM WITH ACTION RECOMMENDATIONS BASED ON DETECTED TRENDS
Technical methods, devices, and systems disclosed herein provide a predictive case-solvability score service. The predictive case-solvability score service generates case solvability scores for cases, detects events that signal those scores should be updated, updates a machine-learning model over time to ensure current trends in recent data are reflected, and identifies specific actions to recommend for increasing those scores. Furthermore, the predictive case-solvability score service provides an interface that allows users to perceive trends in case-solvability scores over time and to execute some of the specific recommended actions.
Techniques for improving admissibility of electronic evidence are provided. An indication that a piece of evidence has been presented to and rejected by a court may be received. The indication includes a reason the piece of evidence was rejected. Metadata related to the piece of evidence is updated in the evidence management system to indicate the reason why the piece of evidence was rejected. Analytics are used to locate additional incidents similar to the incident in the evidence management system. Additional rejected evidence associated with the located incidents that are associated with the piece of evidence that has been rejected by the court based on metadata associated with the additional rejected evidence are identified. Artificial intelligence is used to analyze the rejected evidence and the additional rejected evidence to determine commonalities between the reasons for rejection. A recommended corrective action to prevent future rejection of later gathered evidence is output.
Techniques for leveraging downlink bandwidth when uplink bandwidth is limited are provided. An image is captured at an edged device, the image including at least one face of a person, the image captured at a first resolution. The image is stored at the first resolution in the edge device. The image is converted to a second resolution, the second resolution being lower than the first resolution. The converted image is sent to a backend facial recognition system. A set of candidate facial recognition matches is received. Facial recognition is performed at the edge device based on the stored image captured at the first resolution and the set of candidate facial recognition matches.
A computer-implemented method for video redaction of disclosure-protected objects is disclosed. A system for video redaction of disclosure-protected objects is also disclosed. A computer program product video redaction of disclosure-protected objects is also disclosed. A video interval may be broken into a plurality of sub-intervals, and unique random image substitution may be carried out over each of the sub-intervals in connection with the video redaction.
Techniques for eliminating bias in selectively edited videos are provided. A request to release a video capturing a public safety incident is received. The video is edited to create an edited video. At least one civilian score and at least one public safety official score based on the sentiment of the video is computed. At least one edited civilian score and at least one edited public safety official score based on the sentiment of the video is computed. A first score is computed based on a combination of the civilian score and public safety official score. A second score is computed based on a combination of the edited civilian score and edited public safety official score. The first and second score are compared to determine if a difference between the scores exceed a threshold. The edited video is released when the scores do not exceed the threshold.
A computer-implemented method for recommending changes in relation to video security camera deployment within a security system is disclosed. The computer-implemented method includes obtaining, at an at least one electronic computing device, video analytics data in respect of a plurality of video frames captured by an at least one video security camera operating under a plurality of operational parameters. When processing of the video analytics data indicates at least one issue in relation to performance of the video security camera, a visual message or an audio message is delivered by a screen or a speaker respectively. The visual or audio message indicates a recommendation in relation to some change, replacement or upgrading of the video security camera.
A device, method and system for providing a notification of a distinguishing activity is provided. A devices receives information describing an appearance of a target object. The device determines, using the information, that the target object is located in images acquired by a camera. The device determines a distinguishing activity of the target object in the images. The device controls a notification device to provide a notification of the distinguishing activity.
A process of notifying users about publicly available data. In operation, an authorization server receives a request from a user to access a data item. The authorization server then determines a restriction status assigned to the data item. When the restriction status indicates that the data item is not publicly available for access, the authorization server identifies access rights associated with the user to the data item. If access rights indicate that the user does not have access to the data item, the authorization server denies user access to the data item, and responsively monitors for a reclassification of the restriction status assigned to the data item. The authorization server transmits a notification to the user indicating that the data item is publicly available for access by the user in response to detecting a reclassification of the restriction status indicating that the data item is publicly available.
A process of issuing a limited-use electronic certificate. In operation, a public key infrastructure (PKI) device receives a request for an electronic certificate from an end entity. The PKI device detects an anomaly with respect to the request received from the end entity. The PKI device generates, based on the detected anomaly, a limited-use electronic certificate. The PKI then issues the limited-use electronic certificate to the end entity. When the end entity determines that the issued certificate is a limited-use certificate with limited-use attributes such as a shortened validity period or lowered assurance level, the end entity provides a visual and/or audio prompt indicating the issuance of the limited-use certificate and further including one or more corrective actions to be performed to eliminate the anomaly prior to sending a new request for an electronic certificate to the PKI device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
67.
Method and apparatus for providing information on an emergency call
A method and apparatus for displaying information regarding calls to a plurality of PSAPs is provided herein. During operation, an interface will display information as to whether a PSAP is receiving calls it normally would not be receiving, information as to whether or not a PSAP is not working correctly, and information on a status of any re-routed calls to a PSAP. In an alternate embodiment of the present invention, a reason for a PSAP call re-route is also provided.
A method and apparatus for increasing security at access points for a room or facility is provided herein. During operation, a security level at an access point will be increased during a lockdown situation. The increased security at the access point will require permission from those behind the access point prior to granting entry to any individual.
Monitoring systems and methods for identifying an object of interest after the object of interest has undergone a change in appearance. One example provides an image sensor is configured to monitor a first area. A first electronic processor is configured to detect a first appearance of an object of interest within the first area, and determine a visual characteristic of the object of interest. The first electronic processor is configured to receive a first notification indicative of movement of the object of interest into a second area and an access input, and associate the visual characteristic of the object of interest with the access input. The first electronic processor is configured to detect a second appearance of the object of interest within the first area, and update the visual characteristic of the object of interest based on the second appearance of the object of interest.
A device, system and method for modifying electronic workflows is provided. An example device: receives, from a user mobile device, a search query, as one step, of a plurality of steps, of a current electronic workflow followed in association with an incident; compares the search query with stored search queries received from other user mobile devices as a respective step of previously implemented respective electronic workflows, different from the current electronic workflow, as stored at one or more memories; in response to matching the search query with a stored search query of a previously implemented electronic workflow, compares remaining steps of the current electronic workflow with respective executed steps of the previously implemented electronic workflow; and, in response to determining an overlap between the remaining steps and the respective executed steps, causes one or more overlapping steps to be skipped in the current electronic workflow.
A method, system and computer program product for correlating objects of interest based on difference and similarities analysis is disclosed. The method includes receiving input that a human user is focused on a portion of a first image during a first period of time, and also focused on a portion of a second image during a second period of time. In response to the input being received, a first analytics-based action may be initiated when certain similarity/difference conditions are met, or a second analytics-based action may be initiated when certain other similarity/difference conditions are met.
A device, system and method for routing botnet calls to a botnet call-answer queue. A device, such as a call answering point (CAP) and/or a public-safety answering point (PSAP) router device, receives a call and determines an audio signature of the call. The device compares the audio signature of the call with one or more botnet audio signatures stored at a memory. In response to the audio signature of the call matching at least one of the one or more botnet audio signatures, the device: identifies the call as a botnet call that has been placed by a botnet; and cause the call to be routed to a botnet call-answer queue.
A method and system for enhancing authenticity detail of captured video is disclosed. Objects within a physical environment (and visible within a camera field of view) are captured in video, and by way of video analytics these objects and their respective metadata are employed as part of the method and system for enhancing the authenticity detail of the captured video. Also, rather than the audio/video stream(s) being modified, the actual video scene itself may be modified.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
74.
Method and system for controlling operation of a fixed position camera
A method and system for controlling operation of a fixed position camera are disclosed. The method includes determining durations of time with respect to which moving objects are projected to become at least practically out of a capture range of the fixed position camera. Based at least in part on these determined durations of time, a number of changes are made to physical settings of the fixed position camera within respective opportunity windows for achieving respective objectives, and in a priority-ordered manner.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/147 - Optical characteristics of the device performing the acquisition or on the illumination arrangements - Details of sensors, e.g. sensor lenses
H04N 23/69 - Control of means for changing angle of the field of view, e.g. optical zoom objectives or electronic zooming
H04N 23/695 - Control of camera direction for changing a field of view, e.g. pan, tilt or based on tracking of objects
75.
Camera parameter adjustment based on frequency shift
A method and apparatus for operating a camera is provided herein. During operation a microphone will identify an object by receiving the sound emitted by the object. Once the object has been identified, a main frequency component of the received sound is determined, and camera parameters are adjusted based on the value of the main frequency component.
A method and apparatus for providing discovery within a D2D communications is provided herein. During operation, a first device will determine an identification of its own network slice, and an identification of a network slice other devices operate on. Only devices operating on the same network slice as the first device are allowed for D2D communication with the first device.
Systems, devices, and technical methods of the present disclosure use an edge appliance to facilitate seamless interoperability between a cloud emergency call management system and call-center systems that are situated onsite in an emergency call center. When an emergency call is received from a caller device, the CECMS routes the call to a call taker who may be working remotely on a telecommunication device. The CECMS transmits a duplicate of audio data and other data that is exchanged between the caller device and the telecommunication device during the call to the edge appliance. The edge appliance converts the audio data and the other data into formats that are compatible with the call-center systems and uses a virtual construct that represents the telecommunication device to transmit the converted data to the call-center systems through a network to which both the edge appliance and the call-center systems are connected.
A converged device with dual RFPA technology for a dynamic switchable mode. One example provides a communication device comprising a RF transmitter system and a controller. The RF transmitter system includes a plurality of RFPAs, each RFPA having a biasing system and outputting an output signal, and a summing junction, wherein the output signal of each RFPA are combined to form an output RF transmitter signal. The controller is configured to control the biasing state of each biasing system to a nominal bias state for a first mode of the communication device. The controller is configured to control a first plurality of offset voltages applied to each biasing system for a second mode of the communication device. The controller is configured to control a second plurality of offset voltages applied to each biasing system for a third mode of the communication device.
There is disclosed a method that includes analyzing, using an at least one processor, image data to generate or facilitate acquisition of violation assessment data associated with a vehicle or an owner of that associated vehicle. The method also includes receiving, at the at least one processor, input originating from a police officer indicating an intention to stop the vehicle. The method also includes making a determination, at the at least one processor, whether the violation assessment data supports affirming the stop of the vehicle as a compliant stop, or whether the violation assessment data supports disaffirming the stop of the vehicle. The method also includes transmitting a notification in respect of the stop of the vehicle to a display or speaker perceptible to the police officer. The notification informs as to compliancy or non-compliancy of the stop of the vehicle.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06V 20/54 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects of traffic, e.g. cars on the road, trains or boats
G06V 20/62 - Text, e.g. of license plates, overlay texts or captions on TV images
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G08B 7/06 - Signalling systems according to more than one of groups ; Personal calling systems according to more than one of groups using electric transmission
83.
Artificial intelligence query system for protecting private personal information
Methods and systems for generating a response to a query using an AI engine. One method includes translating a received query into a profile comprised of at least a query type and a priority. The method further includes collecting, based on the profile, a first set of data items from a first data file storing data categorized as general public data and a second set of data items from a second data file storing data categorized as personal private information and applying an AI correlation engine to the second set of data items to determine PPI-agnostic relevancy indicators for PPI included in the second set of data items. The method further includes masking, based on the query cluster profile, the second set of data items by replacing the PPI included in the second set of data items with the PPI-agnostic relevancy indicators.
A device, system and method for radio-frequency emissions control is provided. The device comprises: a communication unit configured to communicate via main radio channels and a control channel, the main radio channels contributing to radio-frequency (RF) emissions; and a controller interconnected with the communication unit. The controller is configured to: receive, via the communication unit communicating over the control channel, an RF emissions control command to reduce the RF emissions emitted by the communication unit; and in response to receiving the RF emissions control command, control one or more of the communication unit and activity on the main radio channels to reduce the RF emissions.
A process of evaluating the expertise of participants during a group call. In operation, an electronic computing device analyzes speech content of participants on a group call to determine a call context associated with the group call. The electronic computing device then assigns an expected expertise score for the participant by correlating the call context with a participant profile and further determines a demonstrated expertise score for the participant as a function of the expected expertise score and a call participation score indicating a duration of time that the participant has spoken during the group call. When the electronic computing device detects that a decision is being made with respect to the call context, the electronic computing device provides a visual or audio output on a corresponding visual or audio output device indicating the demonstrated expertise score of at least one of the participants.
H04M 3/56 - Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
G10L 15/18 - Speech classification or search using natural language modelling
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
A method and apparatus for formulating a query by a digital assistant is provided herein. During operation a digital assistant will receive a query from a user. The query will have a type of device mentioned within the query. In response, the digital assistant will listen for any nearby device to announce itself. The query will then be modified by the digital assistant to include a device identification heard in the announcement. Results from the modified query will be provided to the user.
A method is provided. The method includes receiving, at an arbitration server, a call setup request, the call setup request including at least an indication of an application used to send the call setup request and at least one other indication of a call type of a call associated with the call setup request. The method includes retrieving, from a configuration database, a call priority associated with the call set up request. The method includes determining that the user device is currently engaged in an ongoing call associated with an ongoing call priority. The method includes determining that the call setup request is of higher priority than the ongoing call based on the ongoing call priority. The method includes when the call setup request is of higher priority, terminating the ongoing call and completing the setup of the call associated with the call setup request.
A conductive solder pad for a ball grid array (BGA) includes a concave edge to accommodate a via that exits a substrate at a position at the surface of the substrate that is offset from the solder pad. The offset arrangement of the via and solder pad allow for differential thermal expansion of the substrate material and the via material with reduced risk of cracking or fracturing the solder joint. The concave edge of the solder pad provides a gap from the via to avoid unintended electrical connections while maintaining the solder-joint pitch of the BGA.
H05K 3/34 - Assembling printed circuits with electric components, e.g. with resistor electrically connecting electric components or wires to printed circuits by soldering
A method and apparatus for aiding a police officer in writing a report by creating a depiction of an incident scene is provided herein. During operation a drone will photograph an incident scene from above. Relevant objects will be identified and a depiction of the incident scene will be created by overlaying the relevant photographed real world objects onto a map retrieved from storage. The depiction of the incident scene will be made available to police officers to increase the officers' efficiency in report writing. More particularly, officers will no longer need to re-create the depiction of the incident scene by hand. Instead, the officer will be able to use the depiction of the incident scene.
The present specification provides systems, devices and methods for controlling an uncrewed aerial vehicle (UAV) at a public safety incident. An example method contemplates placing a UAV in a shadow mode that follows a firefighter’s movements throughout the PSI while monitoring voice activity while the UAV performs tasks such as sending images from a camera to a central server. Potential voice commands are extracted from the voice activity and associated with tasks being performed by the UAV. A machine learning dataset is built from those associations such that at future incidents the UAV can operate in a freelance mode based on detected voice commands or other contextual factors.
Systems and methods of identifying anomalies within radio devices. The method includes obtaining raw radio data from a radio device of a plurality of radio devices, identifying a radio performance indicator related to an operational performance, determining a long-term and a short-term average of the indicator based on previously received indicators from the device, and determining a weighted ratio of the long-term and short-term average based on an age of the indicator and an amount of the previously received indicators. The method includes generating a curated indicator from the weighted ratio and the indicator, deriving, from a plurality of curated indicators from the plurality of devices and the curated indicator, a curated group average, determining an anomaly in the operational performance of the radio device based on a comparison of the curated indicator and the curated group average, determining a recommended action, and transmitting an electronic notification indicating the action.
H04W 24/04 - Arrangements for maintaining operational condition
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
An example system comprises a battery and a battery-powered device. Battery contacts and a data interface are therebetween. The battery includes low-power and high-power circuits to output power, from a cell, to the battery-powered device via the contacts. The high-power circuit outputs power higher than the low-power circuit. A switch(es) connects and disconnects the high-power circuit to/from the contacts, the low-power circuit connected to the contacts when the switch disconnects the high-power circuit. A voltage detector: detects a battery-voltage on the contacts and an output voltage on the data interface; when the output voltage is greater than the battery-voltage, controls the switch to connect the high-power circuit to the contacts; and when the output voltage is below the battery-voltage, controls the switch to disconnect the high-power circuit from the contacts. The battery-powered device provides the output voltage on the data interface as powered from the contacts by the battery.
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H01M 10/46 - Accumulators structurally combined with charging apparatus
H01M 10/48 - Accumulators combined with arrangements for measuring, testing or indicating the condition of cells, e.g. the level or density of the electrolyte
H01M 10/42 - Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
H01M 10/0525 - Rocking-chair batteries, i.e. batteries with lithium insertion or intercalation in both electrodes; Lithium-ion batteries
93.
Mobility and access control across tenant boundaries in a multitenant private communication system
A multitenant private communication system and a method for providing mobility and access control across tenant boundaries in the multitenant private communication system. The method includes receiving a first connection request from a user device for connection to first network infrastructure of a first tenant and establishing a connection between the user device and a first private sub-network of the first tenant through the first network infrastructure. The method further includes receiving a second connection request from the user device for connection to second network infrastructure of a second tenant of the multitenant private communication system and determining whether the second network infrastructure is a guest network infrastructure of the user device. The method also includes establishing a connection between the user device and the first private sub-network through the second network infrastructure when the second network infrastructure is the guest network infrastructure of the user device.
The present specification provides a system, devices and methods for electronic identity verification in law enforcement. The specification provides for at least one data set that contains direct identifiers of persons of interest and indirect identifiers of electronic sources with known geographic locations that are associated with the persons of interest. A query to a server from a communication device operated by a law enforcement personnel can contain signatures detected from the electronic sources and an indication of a direct identity of the person of interest. The server can compare the query to the data sets and calculate a likelihood that the person of interest has been correctly identified.
A device, method and system for resolving misunderstandings on channels is provided. A device monitors communications on a channel between communication devices. The device determines a misunderstanding in the communications. The device determines information to resolve the misunderstanding. The device controls one or more of the communication devices to provide the information to resolve the misunderstanding.
Wireless communication device and methods for operating the same. One wireless communication device includes an electronic processor configured to operate the wireless communication device in a first security mode of a plurality of available security modes. The electronic processor is also configured to evaluate one or more environmental context parameters associated with the wireless communication device, determine, based on the environmental context parameters, whether communications of the wireless communication device are susceptible to a potential cyber-security threat, and, in response to determining the communications of the wireless communication device are susceptible to the potential cyber-security threat, transition the wireless communication device to a second security mode of the plurality of available security modes to determine whether the potential cyber-security threat is present, wherein at least one selected from a group consisting of the frequency scanning feature and the frequency hopping feature is enabled in the second security mode.
A security ecosystem, device and method for distributing physical resources based on workflow interactions is provided. A computing device determines that a trigger, of a safety-workflow, has occurred, comprising: determining, from distribution-tracking data, that distribution of physical resources in a region meets a suboptimal-distribution condition. In response, the computing device implement a first responsive action, of the safety-workflow, comprising generating an indication of the distribution of the physical resources in the region at an electronic map. The computing device implements an analysis component, of the safety-workflow, comprising: determining whether the distribution of the physical resources meeting the suboptimal-distribution condition meets a predetermined exemption condition. In response to the predetermined exemption condition not being met, the computing device implements a second responsive action, of the safety workflow, comprising: providing an alert to one or more notification devices identifying that the distribution of the physical resources meets the suboptimal-distribution condition.
A communication_system, apparatus, and method are provided including a portable public safety (PS) radio that scans a portable non public safety (non-PS) communication device having electronic press credentials stored therein. A server temporarily registers the portable non-PS communication device and electronic press credentials. The server monitors movement of the temporarily registered device for boundary violations within a public safety incident scene, and communicates a warning to the temporarily registered device in response to boundary violations. Electronic press scores are saved and used as a basis to determine access to future registration requests at future incident scenes.
H04W 4/029 - Location-based management or tracking services
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
99.
ACCESS CONTROL SYSTEM AND METHOD TO DISTINGUISH BETWEEN TAILGATE AND PIGGYBACK
Access control system and method to distinguish between tailgate and piggyback. The method includes receiving, from a camera positioned at an access point, one or more images of a first person at the access point and determining based on credential information whether the first person is authorized to enter through the access point. In response to determining that the first person is authorized to enter through the access point, the method includes determining, based on a consent-to-follow gesture of the first person detected in the one or more images, a number of guests of the first person requested to enter through the access point. The method also includes determining, based on the one or more images, a number of persons entering through the access point and generating an alert indicating unauthorized entry when the number of persons is greater than the number of guests.
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G07C 9/21 - Individual registration on entry or exit involving the use of a pass having a variable access code
100.
Audio accessory with high and low impedance paths to a speaker, and a radio for the audio accessory
An audio accessory with high and low impedance paths to a speaker is provided, and a radio therefor. The audio accessory comprises: a speaker; an audio interface to connect to a respective audio interface of the radio; a switching circuit comprising: high and low impedance paths; and a switch to connect the audio interface to the speaker via one of the high and low impedance paths, the switch initially connecting the audio interface to the speaker via the high impedance path. The accessory further comprises a data interface to connect to a respective data interface of the radio; and a controller to: in response to receiving, via the first data interface, from the radio, a message to control the switch to connect the audio interface to the speaker via the low impedance path, control the switch to connect the audio interface to the speaker via the low impedance path.