A device, system and method for providing services between a communication device and an application server is provided. A trust session is established between a gateway device and an application server. The gateway device provides, to the application server, on behalf of a communication device served by the gateway device: a service request that requests a service from the application server; an indication of successful authentication of the gateway device by the application server, the indication associated with the trust session; and a payload including an indicator of the communication device. The gateway device receives, from the application server, a verification of the service request determined using at least the indication associated with the trust session. The service is provided between the communication device and the application server via one or more of the gateway device and a network.
A device, system and method for providing services between a communication device and an application server is provided. A trust session is established between a gateway device and an application server. The gateway device provides, to the application server, on behalf of a communication device served by the gateway device: a service request that requests a service from the application server; an indication of successful authentication of the gateway device by the application server, the indication associated with the trust session; and a payload including an indicator of the communication device. The gateway device receives, from the application server, a verification of the service request determined using at least the indication associated with the trust session. The service is provided between the communication device and the application server via one or more of the gateway device and a network.
A device, system and method for facilitating communication to trapped victims due to an emergency incident are described. A camera detects an emergency incident at a location. The camera switches a mode of a camera to a notification mode based on the emergency incident. The camera determines that a person is within a vicinity of the location. The status of the person is determined by audible feedback associated with the emergency incident that is sensed by the camera. The camera determines a presence of rescuers based on the audible feedback or a rescue signal sensed by the camera, which is associated with emergency incident rescue object or event. In the notification mode, the camera generates an output indicative of the status.
One example provides a portable communications device including a speaker, a power amplifier configured to provide audio signals to the speaker, a sensing circuit configured to sense a variable parameter of the speaker, and a control circuit coupled to the sensing circuit. The control circuit is configured to selectively connect a resistive load between the power amplifier and the speaker based on the variable parameter.
An example method includes: receiving a query at a generative artificial intelligence (Al) system; obtaining a set of anchored words for calibrating a response to the query; identifying, at the generative Al system, one or more keywords from the query by cross-referencing the query to a secondary database; determining an anchoring weight of each of the one or more keywords based on the cross-referencing to the secondary database; updating the set of anchored words with the one or more keywords having the anchoring weight exceeding a threshold anchoring weight; and generating, at the generative Al system, an initial response to the query, wherein the initial response is calibrated by providing, to the generative Al system, the set of anchored words as additional prompts.
An example method includes: receiving a query at a generative artificial intelligence (AI) system; obtaining a set of anchored words for calibrating a response to the query; identifying, at the generative AI system, one or more keywords from the query by cross-referencing the query to a secondary database; determining an anchoring weight of each of the one or more keywords based on the cross-referencing to the secondary database; updating the set of anchored words with the one or more keywords having the anchoring weight exceeding a threshold anchoring weight; and generating, at the generative AI system, an initial response to the query, wherein the initial response is calibrated by providing, to the generative AI system, the set of anchored words as additional prompts.
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
7.
METHOD AND SYSTEM FOR A LOCKOUT IN RESPONSE TO BLOCKED VIEW
A method and system for a lockout in response to a blocked view is disclosed. The method is carried out within at least one network. The at least one network includes at least one network addressable machine and at least one fixed-location camera having a respective Field Of View (FOV). The method includes creating an operation dependency definition between the fixed-location camera and the network addressable machine based on an inclusion of the network addressable machine within the FOV. Video analytics is employed to generate a blocked view alert in response to a blocked view threshold being satisfied in relation to the live video captured by the fixed-location camera. In response to the blocked view alert, the network addressable machine is caused to enter a lockout mode.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G16Y 20/10 - Information sensed or collected by the things relating to the environment, e.g. temperatureInformation sensed or collected by the things relating to location
Examples provide a system for performing video redaction. The system includes an electronic processor configured to obtain video data, identify an object in a respective frame of video data using an artificial intelligence (AI) model trained on object detection, and flag the object for redaction from the video data. The electronic processor is also configured to identify a moving portion in the respective frame of the video data. The moving portion including at least one pixel having motion in a plurality of frames of the video data. The moving portion is included in a portion of the video data not having the object flagged for redaction. The electronic processor performs a motion analysis of the moving portion of the video data, and, based on a result of the motion analysis, flags the moving portion for redaction from the video data.
G06V 20/40 - ScenesScene-specific elements in video content
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
Examples provide a system (100) for performing video redaction. The system (100) includes an electronic processor (116) configured to obtain video data, identify an object in a respective frame of video data using an artificial intelligence (AI) model trained on object detection, and flag the object for redaction from the video data. The electronic processor (116) is also configured to identify a moving portion in the respective frame of the video data. The moving portion including at least one pixel having motion in a plurality of frames of the video data. The moving portion is included in a portion of the video data not having the object flagged for redaction. The electronic processor (116) performs a motion analysis of the moving portion of the video data, and, based on a result of the motion analysis, flags the moving portion for redaction from the video data.
A process of collaboration between different agencies for classifying an event captured in a video stream. In operation, a video stream captured by a camera operated by a public-safety agency is analyzed using a first video analytics engine trained using a first set of video analytics data associated with the public-safety agency and an abnormal event with respect to a person or object captured in the video stream is detected. When it is determined that the video stream is captured at a location that is proximity to an operating environment of a non-public-safety agency, a query is transmitted to a second video analytics engine trained using a second set of video analytics data associated with the non-public-safety agency. The abnormal event is reclassified as a normal event when a response from the second video analytics engine indicates that the abnormal event is normal within the operating environment of the non-public-safety agency.
A communication system embeds a trust message into an outbound control channel signal derived from a GPS reference signal associated with trunked communications. The trust message is used as a basis for incrementally expanding the subscriber's automatic frequency control (AFC) range beyond its pre-stored default limits to enable re-tuning a temperature compensated crystal oscillator (TCXO) that has drifted off frequency. Coarse-tuning of the subscriber TCXO is based on a measured frequency error of a control channel outbound transmission determined to fall within the expanded AFC range of the subscriber. Additionally, an inbound signal frequency error may be measured by the base station, and reported to the subscriber to use for fine-tuning the TCXO.
A process for restricting a vehicle operator from passing through an access-controlled barrier in response to a parking violation. In operation, an electronic computing device determines that a vehicle is parked in violation of a parking regulation enforced in a parking space and that a vehicle operator associated with the vehicle has exited the vehicle after having parked the vehicle in violation of the parking regulation. The electronic computing device then compares an identifiable feature uniquely associated with the vehicle operator with an identifiable feature uniquely associated with a person approaching the access-controlled barrier. The person is identified as the vehicle operator who parked the vehicle in violation of the parking regulation when there is a threshold level of correlation between the identifiable feature uniquely associated with the person and the identifiable features uniquely associated with the vehicle operator. The electronic computing device restricts the person identified as the vehicle operator from passing through the access-controlled barrier.
G07C 9/10 - Movable barriers with registering means
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
Examples provide a converged communication device including a first radio frequency (RF) transmitter system configured to transmit signals according to a first communication protocol, and a second RF transmitter system configured to transmit signals according to a second communication protocol. An attenuator operable in an active mode and a bypass mode is configured to receive an RF signal generated by a processor of the second RF transmitter system and selectively attenuate the RF signal. In the bypass mode, the attenuator outputs the RF signal to an RF power amplifier (RFPA) of the second transmitter system without attenuation. In the active mode, the attenuator attenuates the RF signal and outputs an attenuated RF signal to the RFPA. An attenuator control circuit controls the attenuator for operation in the active mode or the bypass mode based on state information received from the first RF transmitter system and/or the second RF transmitter system.
Examples provide a converged communication device including a first radio frequency (RF) transmitter system configured to transmit signals according to a first communication protocol, and a second RF transmitter system configured to transmit signals according to a second communication protocol. An attenuator (112) operable in an active mode and a bypass mode is configured to receive an RF signal generated by a processor of the second RF transmitter system and selectively attenuate the RF signal. In the bypass mode, the attenuator (112) outputs the RF signal to an RF power amplifier (RFPA) of the second transmitter system without attenuation. In the active mode, the attenuator (112) attenuates the RF signal and outputs an attenuated RF signal to the RFPA. An attenuator (112) control circuit (116) controls the attenuator (112) for operation in the active mode or the bypass mode based on state information received from the first RF transmitter system and/or the second RF transmitter system.
Devices, systems, and methods for dynamic antenna tuning compensation. One example method includes controlling a transmitter to transmit a first plurality of signals, each of the first plurality of signals having a fundamental frequency different from the others. The method includes controlling a receiver to receive a second plurality of signals, wherein each of the second plurality of signals is received at a harmonic frequency of one of the first plurality of signals. The method includes determining at least one tuning parameter for an antenna tuner based on the second plurality of signals. The method includes controlling the antenna tuner to operate using the at least one tuning parameter.
Devices, systems, and methods for dynamic antenna (120) tuning compensation. One example method (300) includes controlling a transmitter (108A) to transmit a first plurality of signals (402), each of the first plurality of signals (402) having a fundamental frequency different from the others. The method (300) includes controlling a receiver (108B) to receive a second plurality of signals (404), wherein each of the second plurality of signals (404) is received at a harmonic frequency of one of the first plurality of signals (402). The method (300) includes determining at least one tuning parameter for an antenna tuner (108C) based on the second plurality of signals (404). The method (300) includes controlling the antenna tuner (108C) to operate using the at least one tuning parameter.
H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
17.
Method and system for unauthorized person alerting
A method and system for unauthorized person alerting. The method includes activating at least one non-imaging sensor to capture non-imaging data. The non-imaging sensor monitors an area in respect of which a physical access control system restricts access. At least one processor is employed to generate a count of people present in the monitored area from computerized analysis of the non-imaging data. An unauthorized person alert is generated based on at least one of a plurality of alert conditions being satisfied.
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
G07C 9/20 - Individual registration on entry or exit involving the use of a pass
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
18.
DEVICE, SYSTEM AND METHOD FOR AI-BASED NOISE SUPPRESSION
A device, system and method for AI-based noise suppression is provided. The device is configured to perform during a first period of time: applying one or more AI algorithms to an audio data; applying noise suppression to the audio data to generate a noise-suppressed audio data; and providing the noise-suppressed audio data to an output device. The device is further configured to perform during a second period of time, the second period of time following the first period of time: applying the one or more AI algorithms to the audio data to generate an AI-based noise-suppressed audio data; and providing the AI-based noise-suppressed audio data to the output device.
A device, system and method for AI-based noise suppression is provided. The device is configured to perform during a first period of time: applying one or more AI algorithms to an audio data; applying noise suppression to the audio data to generate a noise-suppressed audio data; and providing the noise-suppressed audio data to an output device. The device is further configured to perform during a second period of time, the second period of time following the first period of time: applying the one or more AI algorithms to the audio data to generate an AI-based noise-suppressed audio data; and providing the AI-based noise-suppressed audio data to the output device.
Embodiments provide for a system and method that address challenges associated with audio routing of an incoming call between two devices operatively coupled via a short-range wireless connection. Ultrasonic watermark signals are generated and sent between the two devices. Detection and non-detection of the ultrasonic watermark signals controls the audio routing. The ultrasonic watermark signals can be modified based on a predetermined operational characteristic known only to the two devices for increased robustness to the system.
G10L 19/018 - Audio watermarking, i.e. embedding inaudible data in the audio signal
H04M 1/72412 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
H04M 1/72469 - User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
A method and apparatus for obtaining a drive request from a first communication device registered with a driving service, the drive request identifying a source location and a destination location. Further embodiments include identifying that an individual associated with the drive request is currently subject to a legal restriction, the legal restriction restricting mobility of the individual. Additional embodiments include generating custom drive route for the drive request between the source location and the destination location that satisfies the legal restriction and providing the custom drive route to a second communication device of a driver associated with the driving service, without presenting a first notification on the second communication device of the legal restriction. Other embodiments are disclosed.
A method and system for detecting a request for distress assistance is disclosed. An electronic screen of the system is configured to display visible information that instructs on a human performance of a clandestine gesture that will indicate the request for distress assistance. The method includes carrying out video analytics on video to automatically detect and recognize that the human has communicated the clandestine gesture via an at least one surveillance camera that captured the video. The method also includes determining, based on the communicated clandestine gesture and contextual information, a level of urgency of the request for distress assistance indicated by the clandestine gesture. The method also includes generating an electronic notification or electronic alert, based on the level of urgency, corresponding to an expected assistance action to be taken by a designated assistance person.
A physical security system and method for effecting a temporary access permission change are disclosed. The method includes analyzing context information, corresponding to a defined and applied, time-limited video redaction, to responsively define the temporary access permission change impacting a physical access control system of the physical security system. The method also includes effecting the temporary access permission change to at least make entry via an at least one entry barrier of the physical access control system more restricted than before the effecting of the temporary access permission change.
The computer-implemented methods and the computing devices for alerting about a citizen interaction limitation are disclosed. An ambient audio signal acquired by a citizen communication device associated with a citizen is monitored to detect an interaction of the citizen with a public safety agency. Responsive to detecting the interaction of the citizen with the public safety agency, an alert is transmitted to a device associated with the public safety agency, the alert comprising data related to the citizen interaction limitation. Additionally or alternatively the alert regarding the interaction of the citizen with the public safety agency comprising data related to a citizen's interaction limitation is received. Location of the citizen is determined and an in-field first responder associated with the location of the citizen is identified. A notification is provided to a communication device associated with the identified in-field first responder, the notification comprising the data related to the citizen interaction limitation or instructions associated with the citizen interaction limitation.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 25/14 - Central alarm receiver or annunciator arrangements
H04W 4/029 - Location-based management or tracking services
A process of collaboration between different agencies for classifying an event captured in a video stream. In operation, a video stream captured by a camera operated by a public-safety agency is analyzed using a first video analytics engine trained using a first set of video analytics data associated with the public-safety agency and an abnormal event with respect to a person or object captured in the video stream is detected. When it is determined that the video stream is captured at a location that is proximity to an operating environment of a non-public-safety agency, a query is transmitted to a second video analytics engine trained using a second set of video analytics data associated with the non-public-safety agency. The abnormal event is reclassified as a normal event when a response from the second video analytics engine indicates that the abnormal event is normal within the operating environment of the non-public-safety agency.
G06V 20/40 - ScenesScene-specific elements in video content
G06F 16/787 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
Examples provide a system for detecting large vehicles. The system includes an electronic processor configured to obtain video data from an image sensor, determine a bounding box bounding a detected vehicle in a plurality of frames of the video data, determine a trajectory of the detected vehicle based on changes in location of the bounding box in the plurality of frames, and determine a position of the detected vehicle within at least one frame of the plurality of frames. Based on the trajectory of the detected vehicle, the bounding box, and the position of the detected vehicle within the at least one frame, the electronic processor determines a length of the detected vehicle, and determines whether the length is greater than a threshold. In response to the length of the detected vehicle being greater than a threshold, the electronic processor makes a determination that a large vehicle is detected.
An organization can subscribe to an emergency notification service for alerting emergency service providers when an emergency occurs at a site of the organization, such as an emergency that necessitates a lockdown situation. When an emergency service provider is alerted that a lockdown is in effect, the emergency service provider dispatches responding officers to the scene. Once the responding officers have addressed the situation and it is safe to exit the lockdown, the officers may attempt to access the locked rooms to evacuate the occupants. To verify the identity of an officer seeking access to a room, the officer or a room occupant requests an access phrase via their mobile device. The emergency service provider generates a distinct access phrase and sends it to the officer and the occupant so that when the officer speaks the access phrase the occupant knows it is safe to grant access to the room.
G07C 9/21 - Individual registration on entry or exit involving the use of a pass having a variable access code
H04M 1/72421 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
H04M 1/72436 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
H04M 1/72457 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
29.
SYSTEM AND METHOD FOR IMPROVING SEARCHES USING COMPLETENESS METRICS
An example method for improving searches using completeness metrics includes: receiving a search request including search target parameters and video parameters; performing a search of available video streams matching the video parameters for a search target matching the search target parameters; determining a completeness metric for the search based on the available video streams and expected video streams matching the video parameters; and defining a search update condition to trigger an update to the search based on the expected video streams.
Examples provide a server system for dynamic provision of elements features of a software application. The server includes an electronic processor configured to receive, from a client computer, session identifier and access information of a client software session running on the client computer and determine a set of session identity factors at least including licenses, user privileges, compatibilities, and application feature availabilities associated with the client software session. The electronic processor determines, from a set of application features, a first subset of application features to which the client software session is entitled based on an intersection of availability, compatibility, user privilege, and licensing of each respective application feature. The electronic processor delivers the first subset of application features to the client software session, causing each of the first subset of application features to load and render on a user interface of the client computer.
A server may include an electronic processor configured to broadcast an incident alert to a plurality of communication devices within a geographical area associated with an imminent incident, the incident alert including an enrollment feature, receive, via the enrollment feature in response to the incident alert, enrollment notifications from the plurality of communication devices for enrolling the plurality of communication devices in incident response location tracking for the incident, divide the plurality of communication devices into a plurality of location-based clusters based on pre-incident location information of the plurality of communication devices; and rank the plurality of location-based clusters based on location behavior of communications devices within each of the plurality of location-based clusters.
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
32.
DEVICE, SYSTEM, AND METHOD FOR CONTROLLING A VEHICLE DISPLAY AND A MOBILE DISPLAY INTO A THREAT MODE
A device, system, and method for controlling a vehicle display and a mobile display into a threat mode is provided. A system comprises a vehicle display of a vehicle; and a mobile device communicatively coupled to the vehicle, the mobile device comprising: a mobile display. The system further comprises a controller that determines a threat associated with the vehicle; and a threat type; and in response to determining the threat, controls the vehicle display and the mobile display to switch to a threat mode by: controlling the vehicle display to: provide one or more graphical threat indications indicating one or more of: the threat; and the threat type; and controls the mobile display to: provide one or more threat-related applications associated with the threat, that may be for one or more of interacting with, and modifying, one or more graphical threat indications at the vehicle display.
B60K 35/81 - Arrangements for controlling instruments for controlling displays
B60K 35/215 - Output arrangements, i.e. from vehicle to user, associated with vehicle functions or specially adapted therefor using visual output, e.g. blinking lights or matrix displays characterised by the combination of multiple visual outputs, e.g. combined instruments with analogue meters and additional displays
B60K 35/28 - Output arrangements, i.e. from vehicle to user, associated with vehicle functions or specially adapted therefor characterised by the type of the output information, e.g. video entertainment or vehicle dynamics informationOutput arrangements, i.e. from vehicle to user, associated with vehicle functions or specially adapted therefor characterised by the purpose of the output information, e.g. for attracting the attention of the driver
B60K 35/29 - Instruments characterised by the way in which information is handled, e.g. showing information on plural displays or prioritising information according to driving conditions
33.
PROVIDING DIFFERENTIATING INFORMATION INCLUDED IN SIMILAR EVENTS
One example electronic computing device includes an electronic processor configured to determine, based on information regarding a first event and information regarding a first user selected to respond to the first event, whether the first event is similar to a plurality of previous events to which the first user has responded. In response to determining that the first event is similar to the plurality of previous events, the electronic processor determines whether there are any significant differences between the first event and the plurality of previous events to which the first user has responded. In response to determining that there is a significant difference between the first event and the plurality of previous events to which the first user has responded, the electronic processor provides, to a communication device associated with the first user, a notification regarding the first event and an indication of the significant difference.
One example provides a server (110) that includes an electronic processor (210) configured to broadcast an incident alert (416) to a plurality of communication devices (130) within a geographical area associated with an imminent incident. The incident alert (416) includes an enrollment feature. The electronic processor (210) is configured to receive, via the enrollment feature in response to the incident alert (416), enrollment notifications from the plurality of communication devices (130) for enrolling the plurality of communication devices (130) in incident response location tracking for the incident, divide the plurality of communication devices (130) into a plurality of location-based clusters (426) based on pre-incident location information (422) of the plurality of communication devices (130); and rank the plurality of location-based clusters (426) based on location behavior of communications devices within each of the plurality of location-based clusters (426).
One example electronic computing device includes an electronic processor configured to determine, based on information regarding a first event and information regarding a first user selected to respond to the first event, whether the first event is similar to a plurality of previous events to which the first user has responded. In response to determining that the first event is similar to the plurality of previous events, the electronic processor determines whether there are any significant differences between the first event and the plurality of previous events to which the first user has responded. In response to determining that there is a significant difference between the first event and the plurality of previous events to which the first user has responded, the electronic processor provides, to a communication device (105) associated with the first user, a notification regarding the first event and an indication of the significant difference.
G08B 29/18 - Prevention or correction of operating errors
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
36.
DEVICE AND METHOD FOR DISPLAY SCREEN CONTROL USING TWO PROCESSORS
A communication device comprises: a communication interface; a display screen; a first processor configured to power up according to a first power-up time, the first processor for implementing radio functionality associated with the communication interface; and a second processor configured to power up according to a second power-up time longer than the first power-up time, the second processor for implementing extended functionality as compared to the first processor. The first processor, after the first power-up time: controls the display screen to provide a first GUI displaying communication interface-related information and a power-up status of the second processor; and after the second power-up time, hand off control of the display screen to the second processor. The second processor, after being provided with control of the display screen: controls the display screen to provide a second GUI displaying the communication interface-related information and information associated with the extended functionality.
A communication device comprises: a communication interface; a display screen; a first processor configured to power up according to a first power-up time, the first processor for implementing radio functionality associated with the communication interface; and a second processor configured to power up according to a second power-up time longer than the first power-up time, the second processor for implementing extended functionality as compared to the first processor. The first processor, after the first power-up time: controls the display screen to provide a first GUI displaying communication interface-related information and a power-up status of the second processor; and after the second power-up time, hand off control of the display screen to the second processor. The second processor, after being provided with control of the display screen: controls the display screen to provide a second GUI displaying the communication interface-related information and information associated with the extended functionality.
An example apparatus includes a locking mechanism, a transceiver, a memory storing a default plan for the locking mechanism, and an electronic processor. The electronic processor is configured to retrieve, from the memory, and execute cause the electronic processor to: control the locking mechanism based on the default plan and a current time; receive, via the transceiver, a first lockdown command sent according to a first protocol; receive a second lockdown command sent according to a second protocol; determine a selected lockdown command by selecting one of the first lockdown command and the second lockdown command based on a first time of receipt for the first lockdown command and a second time of receipt for the second lockdown command; discard the other of the first lockdown command and the second lockdown command; and override the default plan by controlling the locking mechanism based on the selected lockdown command.
When an emergency service provider receives a call, the emergency service provider determines that the caller does not have a user profile in an emergency service information system configured to release user profile data for a given caller to the emergency service provider when the given caller places an emergency call. Based on this determination, the emergency service provider uses a transcript of the call to identify information that could potentially be included in a user profile for the caller in the emergency service information system. The emergency service provider sends a request to the caller to create a user profile along with an indication of the information identified from the transcript. Upon receiving authorization from the caller, the emergency service provider creates the user profile using the information identified from the transcript.
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
40.
DERIVING UPDATES TO AN EMERGENCY USER PROFILE FROM COMMUNICATIONS ASSOCIATED WITH AN EMERGENCY INCIDENT
When an emergency service provider receives a call, the emergency service provider determines that the caller has an emergency user profile in an emergency service information system configured to release user profile data for a given caller to the emergency service provider when the given caller places an emergency call. Based on this determination, the emergency service provider uses a transcript of the call to identify inconsistencies between information in the transcript and information in the caller's emergency user profile, and the emergency service provider automatically sends a request to the caller to update their user profile along with an indication of the identified inconsistencies from the transcript. Upon receiving authorization from the caller, the emergency service provider updates the caller's user profile using the information identified from the transcript.
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
41.
MANAGING SECURITY-COMPROMISED COMMUNICATION DEVICES IN A TALK GROUP
A process of managing security-compromised communication devices in a talk group. In operation, a talk group receives security information associated with communication devices that are each operated by a member of a talk group. When a request to establish a group call between the members of the talk group is received, the talkgroup server determines whether the request is associated with an incident assigned to the members of the talk group. If the request is associated with the incident assigned to the members of the talk group, the talkgroup server restricts or allows the participation of a security-compromised communication device in the group call established between the members of the talk group based at least in part on incident-response communication requirements associated with responding to the incident. If the request is not associated with any incident, the talkgroup server restricts the participation of the security-compromised communication device.
One or more computing devices establish a geofence around a location of a communication device, that encompasses at least two cameras from different camera systems, and configure a first camera within the geofence to be accessible by a communication device in response to a predetermined user gesture detected in first images from the first camera, that is from a first camera system. The computing device(s), in response to detecting the gesture, provide the communication device with access to: first current and historical video from the first camera. The computing device(s) generate from the first current video, a feature identifier of a user of the communication device and, in response to detecting the feature identifier in second current video from a second camera within the geofence, provide the communication device with access to: second current and historical video from the second camera that is associated with a second camera system.
A base station or a controller generates a first random variable according to a given distribution. The base station or the controller maps the first random variable to a second variable using a bimodal distribution of offset values. The base station uses the second variable to offset a given respective frequency of transmitted symbols.
H04B 7/024 - Co-operative use of antennas at several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
44.
RELIABLE LOCKDOWN COMMUNICATION IN WIRELESS ELECTRONIC LOCKS
An example apparatus includes a locking mechanism (220), a transceiver, a memory (210) storing a default plan for the locking mechanism (220), and an electronic processor (205). The electronic processor (205) is configured to control the locking mechanism (220) based on the default plan and a current time; receive, via the transceiver, a first lockdown command sent according to a first protocol; receive a second lockdown command sent according to a second protocol; determine a selected lockdown command by selecting one of the first lockdown command and the second lockdown command based on a first time of receipt for the first lockdown command and a second time of receipt for the second lockdown command; discard the other of the first lockdown command and the second lockdown command; and override the default plan by controlling the locking mechanism (220) based on the selected lockdown command.
Techniques for modifying user access rights are provided. Access rights of the user are retrieved from an access control system token associated with the user. Access rights of a piece of equipment currently being operated by the user are retrieved from an access control system token associated with the piece of equipment. Access rights of a temporary token currently associated with the piece of equipment are retrieved from an access control system token associated with temporary token. The access rights of the user, the piece of equipment, and the temporary token currently associated with the equipment are combined to create an access control triplet. It is determined if the user is allowed to pass through an access control point based on the access control triplet.
Techniques for managing a border crossing are provided including automatically establishing a vehicle-to-border communication link with a border checkpoint server in response to the vehicle crossing into a geo-fenced area associated with a customs and border protection (CBP) checkpoint. The CBP server is granted temporary control of internal and external vehicular devices such as cameras, sensors, and communication devices associated with the vehicle to provide vehicle, occupant and cargo identification information. The vehicle, occupant, and cargo identification information is relayed to the CBP server and validated based on occupant responses to automated virtual assistant (VA) CBP interview queries, generated by the CBP server. The vehicle is automatically receiving granted access to a fast pass lane of the CBP checkpoint in response to the vehicle, occupant and cargo identification being validated by the CBP server.
A base station or a controller generates a first random variable according to a given distribution. The base station or the controller maps the first random variable to a second variable using a bimodal distribution of offset values. The base station uses the second variable to offset a given respective frequency of transmitted symbols.
Examples provide a public safety answering point server including a processor configured to determines that a call taker of the PSAP has received a call from a caller regarding an incident and generate a transcript of the call. Based on the transcript, the processor determines a set of call attributes associated with the call, and determines whether a computer automated dispatch (“CAD”) record associated with the call is created within a threshold time period from the start time of the call. When the CAD record associated with the call is not created within the threshold time period, the processor infers, using a first artificial intelligence model, whether a CAD record should be created. In response to inferring that a CAD record should be created based on the set of call attributes, the processor generates and transmits a quality alert to an electronic device associated with a user of the PSAP.
When an emergency service provider receives a call, the emergency service provider determines that the caller does not have a user profile in an emergency service information system configured to release user profile data for a given caller to the emergency service provider when the given caller places an emergency call. Based on this determination, the emergency service provider uses a transcript of the call to identify information that could potentially be included in a user profile for the caller in the emergency service information system. The emergency service provider sends a request to the caller to create a user profile along with an indication of the information identified from the transcript. Upon receiving authorization from the caller, the emergency service provider creates the user profile using the information identified from the transcript.
A process for enabling an emergency caller to selectively access information about incident-response resources. In operation, a public-safety answering point receives an emergency communication from a caller device associated with the emergency caller. The answering point obtains incident information relating to occurrence of an incident from the emergency communication and assigns one or more incident-response resources for responding to the incident. The answering point then verifies authenticity of the emergency caller and enables the emergency caller to selectively access information indicating a current status of the one or more of the incident-response resources as a function of verifying the authenticity of the emergency caller.
Techniques for initiating an existing workflow at a workflow server based on an artificial event notification are provided. An artificial event notification is received from a source external to a security ecosystem. The artificial event notification is related to an incident. The artificial event notification is mapped to a currently existing workflow within the workflow server. The currently existing workflow is associated with an internal trigger. The currently existing workflow is initiated based on the artificial event notification without receiving the internal trigger.
A process for enabling an emergency caller to selectively access information about incident-response resources. In operation, a public-safety answering point receives an emergency communication from a caller device associated with the emergency caller. The answering point obtains incident information relating to occurrence of an incident from the emergency communication and assigns one or more incident-response resources for responding to the incident. The answering point then verifies authenticity of the emergency caller and enables the emergency caller to selectively access information indicating a current status of the one or more of the incident-response resources as a function of verifying the authenticity of the emergency caller.
A method and apparatus for notifying a public safety officer of public works projects is provided herein. During operation each public safety officer will have location data associated with the officer maintained at a public safety database. The location data comprises those locations most often frequented by the officer during their daily activities (e.g., while on the job). A public works database will be accessed by a server to determine locations of any active or future public works projects. An officer will only be notified of those public works projects when locations affected by the public works projects are nearby those locations most often frequented by the officer.
Techniques for modifying user access rights are provided. Access rights of the user are retrieved from an access control system token associated with the user. Access rights of a piece of equipment currently being operated by the user are retrieved from an access control system token associated with the piece of equipment. Access rights of a temporary token currently associated with the piece of equipment are retrieved from an access control system token associated with temporary token. The access rights of the user, the piece of equipment, and the temporary token currently associated with the equipment are combined to create an access control triplet. It is determined if the user is allowed to pass through an access control point based on the access control triplet.
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G07C 9/00 - Individual registration on entry or exit
G07C 9/10 - Movable barriers with registering means
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
55.
System and method for notifying a guardian when an expected gesture from a monitored user is not received
Techniques for notifying a guardian when an expected gesture from a monitored user is not received are provided. A start point and a destination point are received from the monitored user. A route from the start point to the destination point that includes a gesture monitoring point is determined. The gesture monitoring point includes a camera capable of gesture detection. A selection of the gesture monitoring points to be monitored is received. An expected gesture for each of the selected gesture monitoring points is received. A guardian to be informed when the expected gesture is not received. The monitored user is tracked as they traverse the route. The guardian is notified when the expected gesture for the selection of gesture monitoring points is not detected from the monitored user when the monitored user passes through a field of view of the camera associated with the selected gesture monitoring points.
A method and system for check-in using a camera assigned from amongst a plurality of pre-deployed cameras is disclosed. The method includes identifying the plurality of pre-deployed security cameras within a geographic region that are potentially accessible to a person for a virtual appearance relating to individualized conditions imposed on the person under at least one legally enforceable order. The method also includes assigning one camera from the plurality of pre-deployed security cameras for access by the person during a defined time period which will begin at a point in time after the assigning of the camera.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
57.
Device and Method for Identifying Relationships Between Individuals in a Crowd
A process for identifying relationships between individuals in a crowd. In operating, an electronic computing device detects questions presented to a crowd with an instruction directing the crowd to answer each question in the form of non-verbal responses rather than in the form of verbal responses. The computing device enables at least one camera to record videos capturing activities of the crowd in response to each presented question. The activities of the crowd captured in the videos are analyzed using a video analytics engine to identify a pattern of non-verbal responses that would indicate a leader-follower relationship between individuals identified from the crowd. The electronic computing device then generates a visual and/or audio output identifying the leader-follower relationship between the individuals identified from the crowd.
A first mobile device receives actuation of a victim assistance button of an emergency assistance application associated with a first identifier of a first emergency profile associated with a first user of the first mobile device. The first mobile device receives, from a second mobile device, using a short-range communication interface, a second identifier of a second emergency profile associated with a second user of the second mobile device, the second identifier being encrypted and decryptable using a common decryption key associated with the emergency assistance application. The first mobile device decrypts the second identifier using the common decryption key, and provides, to an emergency service provider server, using a long-range communication interface, the second identifier that enables the emergency service provider server to retrieve the second emergency profile from a data storage module of an emergency information system at which the first and second emergency profiles are registered.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
59.
METHOD AND APPARATUS FOR MONITORING VERMIN WITHIN A GEOGRAPHIC AREA
A method and apparatus for creating a heat map of vermin within a geographic area is provided herein. During operation a camera (and/or other sensors) that are fixed and/or mobile are utilized to detect vermin. The camera and other sensors themselves may be equipped with the capabilities to detect vermin and report the detection of vermin and their location back to a server, or alternatively, a video feed of the camera and/or other sensors (and their locations) may be provided to the server for the server to attempt to detect vermin. Regardless of how vermin are detected in a particular area (e.g., via a sensor itself performing the detection, or via a server performing the detection via viewing a camera feed), the detected vermin are utilized to create a heat map of vermin for a particular area. The heat map may be provided to health authorities to aid in eradication of vermin.
Systems and methods for controlling use of a device having a plurality of operating features based on authentication of a user. The system includes an electronic processor communicatively coupled to an identification device. The electronic processor is configured to receive, from the identification device, a first characteristic of the user, and determine, based on the first characteristic of the user, whether the user is a primary user. The electronic processor is configured to determine, in response to failing to determine that the user is the primary user, a current operating pattern of the user, receive, in response to the user not being the primary user and from the identification device, a second characteristic of the user, and limit access to a subset of the plurality of operating features of the device based on the current operating pattern of the user and the second characteristic of the user.
Examples provide an emergency call center server including an electronic processor (32) configured to determine that an emergency service provider has received a call from a caller (24) regarding an incident, identify the caller (24) based on the received call, and access a user profile (48) associated with the caller (24) from a database (28). The user profile (48) includes a set of user data associated with the caller (24) and a set of contextual trigger conditions defining types and/or locations of incidents. Based on the received call, the electronic processor (32) determines satisfied ones of the set of contextual trigger conditions, selectively releases, to the emergency service provider, a first subset of user data that is associated with one or more satisfied contextual trigger conditions, and prevents release of a second subset of user data that is associated with one or more unsatisfied contextual trigger conditions.
Techniques for two factor authentication are provided. An access control point that is not connected to a network receives an encoded encrypted access credential that includes a biometric factor and an access token. The encoded encrypted access credential is decoded to extract a signed encrypted access credential. The signed encrypted access credential is decrypted at the access control point using a private key to create a signed decrypted access credential. The signed decrypted access credential is validated at the access control point. The biometric factor and the access token are extracted from the signed decrypted access credential. A user provided biometric factor is received. The user provided biometric factor is compared with the extracted biometric factor. Access via the access control point is provided when the comparing indicates the user provided biometric factor and the extracted biometric factor are the same and the access token indicates access should be allowed.
A method and system for employing video analytics in providing a situational awareness alert is disclosed. The method includes automatically detecting that a first person has entered a coverage area of a security camera. The method also includes automatically determining that the first person is registered in a monitoring service associated with the coverage area. The method also includes determining that a plurality of environmental and geospatial parameters associated with the coverage area satisfy a situational awareness threshold applicable to the first person. In response to the situational awareness threshold being satisfied, video analytics is employed to analyze video captured by security camera(s) to determine that there exists a second person having a respective Point Of View (POV) that permits staring observation of the first person by the second person.
A device, system and method to log a communication device into services using a device identifier is provided. An identity management (IM) computing device receives, from a certificate authority, a first digital certificate, and further receives from a given communication device, a second digital certificate and a device identifier associated with the given communication device. The IM computing device successfully validates the second digital certificate using the first digital certificate, obtains a user identifier associated with the device identifier, and issues, to the given communication device, one or more tokens that include the user identifier, the one or more tokens enabling the given communication device to log into one or more services using the user identifier.
G06F 9/451 - Execution arrangements for user interfaces
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
65.
DEVICE, METHOD AND SYSTEM FOR REDUCING NETWORK BANDWIDTH USAGE WHEN PROVIDING ALERTS
A device receives an indication of an incident associated with a given premises, the device having access to: network addresses associated with individuals associated with the given premises, and electronic roles and schedules of the individuals. The device classifies the individuals as recipients or nonrecipients of alerts for the incident based on the roles/schedules, and determines respective current activity classifications of the recipients and nonrecipients based on the roles/schedules. The device identifies, from the current activity classifications, respective relationship statuses between the recipients and nonrecipients, and generates at least one alert based on the respective relationship statuses, the at least one alert including instructions for a recipient to carry out relative to respective nonrecipients. The device transmits, over a network, the at least one alert to respective network addresses associated with the recipients, and refrains transmitting the at least one alert to the respective network addresses associated with the nonrecipients.
G06Q 10/109 - Time management, e.g. calendars, reminders, meetings or time accounting
G06Q 90/00 - Systems or methods specially adapted for administrative, commercial, financial, managerial or supervisory purposes, not involving significant data processing
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
66.
DEVICE, SYSTEM AND METHOD FOR MICROPHONIC NOISE COMPENSATION
A device, system, and method for microphonic noise compensation is provided. The device comprises: a speaker; a receiver; an audio processor configured to: process audio received via the receiver; and output processed audio to the speaker; a microphonic detection engine; and a microphonic compensation engine. The microphonic detection engine configured to: search for microphonic noise in the processed audio according to one or more predetermined microphonic parameters; and when the microphonic noise is detected: output a microphonic indicator to the microphonic compensation engine to cause the microphonic compensation engine to compensate for the microphonic noise in the audio. The microphonic compensation engine configured to: receive the microphonic indicator; and responsively compensate for the microphonic noise in the audio received via the receiver, prior to processing of the audio by the audio processor.
A method and system for tampering determination is disclosed. The method includes analyzing video captured by a body worn camera. The method also includes generating a tampering score for a video irregularity present in the video. The tampering score is generated based on inputting values of variables that correspond to a plurality of tamper determination factors into a formula. When the tampering score satisfies a threshold condition corresponding to deliberate tampering, flag (indicating that deliberate action of a person caused the video irregularity) is stored in non-volatile storage.
G06F 16/787 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
Examples provide an emergency call center server including an electronic processor configured to determine that an emergency service provider has received a call from a caller regarding an incident, identify the caller based on the received call, and access a user profile associated with the caller from a database. The user profile includes a set of user data associated with the caller and a set of contextual trigger conditions defining types and/or locations of incidents. Based on the received call, the electronic processor determines satisfied ones of the set of contextual trigger conditions, selectively releases, to the emergency service provider, a first subset of user data that is associated with one or more satisfied contextual trigger conditions, and prevents release of a second subset of user data that is associated with one or more unsatisfied contextual trigger conditions.
A device receives an indication of an incident associated with a given premises, the device having access to: network addresses associated with individuals associated with the given premises, and electronic roles and schedules of the individuals. The device classifies the individuals as recipients or nonrecipients of alerts for the incident based on the roles/schedules, and determines respective current activity classifications of the recipients and nonrecipients based on the roles/schedules. The device identifies, from the current activity classifications, respective relationship statuses between the recipients and nonrecipients, and generates at least one alert based on the respective relationship statuses, the at least one alert including instructions for a recipient to carry out relative to respective nonrecipients. The device transmits, over a network, the at least one alert to respective network addresses associated with the recipients, and refrains transmitting the at least one alert to the respective network addresses associated with the nonrecipients.
A camera system includes an electronic processor configured to generate a three-dimensional scene including static assets and dynamic assets. The static assets and the dynamic assets are representative of an environment and objects within a reference video. The reference video represents a first perspective. The electronic processor is configured to animate the dynamic assets based on motions of the objects within the reference video to generate an animated scene, render a test video based on the animated scene. The test video represents a second perspective. The electronic processor is configured to generate video analytics data of the test video, generate a comparison based on the video analytics data of the test video and video analytics data of the reference video, and transform a graphical user interface according to the comparison.
A device, method and system for detecting objects of interest using soundscaped signatures is provided. A device identifies, using first video or first audio from a first camera, an object of interest (OOI) and a sound type of a sound made by the OOI, and extracts a sound signature of the OOI from the first audio, using the sound type and a first soundscaping prediction model for a first environment of the first camera; generating a soundscaped signature of the OOI which predicts a modification of the sound signature in a second environment of a second camera, the soundscaped signature generated by inputting the sound signature and the sound type into a second soundscaping prediction model for the second environment. The device detects the soundscaped signature of the OOI in second audio from the second camera, and generates a notification that the OOI was detected at the second camera location.
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
H04R 3/04 - Circuits for transducers for correcting frequency response
G06V 20/40 - ScenesScene-specific elements in video content
72.
DEVICE, SYSTEM AND METHOD FOR MICROPHONIC NOISE COMPENSATION
A device, system, and method for microphonic noise compensation is provided. The device comprises: a speaker; a receiver; an audio processor configured to: process audio received via the receiver; and output processed audio to the speaker; a microphonic detection engine; and a microphonic compensation engine. The microphonic detection engine configured to: search for microphonic noise in the processed audio according to one or more predetermined microphonic parameters; and when the microphonic noise is detected: output a microphonic indicator to the microphonic compensation engine to cause the microphonic compensation engine to compensate for the microphonic noise in the audio. The microphonic compensation engine configured to: receive the microphonic indicator; and responsively compensate for the microphonic noise in the audio received via the receiver, prior to processing of the audio by the audio processor.
A connector application is provided. A trigger is received from a workflow server. The trigger includes an action ID. A public safety device is identified from a plurality of public safety devices based on agency private information. The identified public safety device is to perform an action in response to the trigger. No agency private information is shared with the workflow server. An indication is sent to the identified public safety device to execute the action.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04L 67/53 - Network services using third party service providers
Techniques for automatically modifying elevator workflow based on incident type are provided. An incident occurring within an elevator is detected via a video camera. Video analytics are used to determine the incident type. It is determined that a floor selection associated with the incident type will place elevator passengers or people on the selected floor at risk. Elevator workflow execution is automatically modified based on the incident type and risk associated with the floor selection. The floor selection is displayed while modifying the elevator workflow to a different floor. A security notification indicative of the incident type and the automatic modification of the elevator workflow is sent.
A system (100) includes non-transitory computer-readable media storing instructions and a processor configured to execute the instructions to receive a request for access to first media from a device. The first media is recorded by a first media-recording device (104) (104-1) (104-2) (104-3) and includes a portion identified as being associated with an event. The event is classified into an event category. The request for access includes an authorization certificate that includes a role. The processor is configured to execute the instructions to, in response to determining the authorization certificate is valid and the role is authorized to access the event category, provide the device access to the portion of the first media and transmit a token to the device. The token includes metadata (602) associated with the portion of the first media and is usable by the device to access a portion of second media. The second media is recorded by a second media-recording device (104) (104-1) (104-2) (104-3).
A system includes non-transitory computer-readable media storing instructions and a processor configured to execute the instructions to receive a request for access to first media from a device. The first media is recorded by a first media-recording device and includes a portion identified as being associated with an event. The event is classified into an event category. The request for access includes an authorization certificate that includes a role. The processor is configured to execute the instructions to, in response to determining the authorization certificate is valid and the role is authorized to access the event category, provide the device access to the portion of the first media and transmit a token to the device. The token includes metadata associated with the portion of the first media and is usable by the device to access a portion of second media. The second media is recorded by a second media-recording device.
A connector application is provided. A trigger is received from a workflow server. The trigger includes an action ID. A public safety device is identified from a plurality of public safety devices based on agency private information. The identified public safety device is to perform an action in response to the trigger. No agency private information is shared with the workflow server. An indication is sent to the identified public safety device to execute the action.
A portable communication device includes a main housing, and a knob coupled to the main housing. The knob is rotatable about a first axis that extends into the main housing, and the knob includes a channel that extends partially circumferentially about the first axis. The portable communication device also includes a button coupled to the main housing. The button is moveable linearly along a second axis that is parallel to the first axis, and the button includes a projection that is sized and shaped to extend into the channel. The button is movable between a first position in which the projection is within the channel, and a second position in which the projection is outside of the channel.
System, device and method are provided for inspection of electronic products. The method includes receiving, at a server electronic processor, x-ray image(s) associated with an electronic device. Image analytics are performed on the x-ray image(s) to identify a plurality of different fragmented signature portions disposed within the electronic device. The plurality of fragmented signature portions are collected, and a determination is made whether the collected fragments are combinable to form a complete signature based on pre-approved fragment images and fragment location stored in a memory of the server. The server generates a notification indicating: a valid, non-counterfeit product in response to determining a complete combined signature, with no missing fragment; a counterfeit component or counterfeit module in response to a missing fragment; and a counterfeit electronic product in response to a determination of all fragments missing.
A method, system and computer program product for visual representation of an incident scene is disclosed. The method includes generating, using an at least one processor, a set of inputs for causing an at least one learning machine to create, for display on a screen, a visual representation of the incident scene corresponding to witness statements. The visual representation includes depictions of a plurality of scene elements. The method also includes providing the set of inputs to the at least one learning machine to cause the at least one learning machine to create the visual representation of the incident scene.
Examples provide a variable zoom imaging system including an image sensor (14), a set of illumination channels (18), and a current driver circuitry for driving the set of illumination channels (18). Each respective illumination channel includes a set of light sources and a lens, and is associated with a respective focus distance. An electronic processor (22) is configured to focus the image sensor (14) to an object of interest (46), determine a distance from the image sensor (14) to the object of interest (46), determine an exposure period for the image sensor (14), select a subset of illumination channels to activate based at least on the distance from the image sensor (14) to the object of interest (46), and capture a first image of the object of interest (46) using the image sensor (14) by sequentially activating and deactivating each selected illumination channel of the subset for first respective time frames within the exposure period.
H04N 23/56 - Cameras or camera modules comprising electronic image sensorsControl thereof provided with illuminating means
H04N 23/67 - Focus control based on electronic image sensor signals
H04N 23/741 - Circuitry for compensating brightness variation in the scene by increasing the dynamic range of the image compared to the dynamic range of the electronic image sensors
H04N 25/58 - Control of the dynamic range involving two or more exposures
83.
SYSTEMS AND METHODS FOR INSERTINGWATERMARKS IN RADAR SIGNALS FOR ELECTRONIC COUNTER-COUNTERMEASURES
Systems and methods for inserting watermarks in radar signals for electronic counter-countermeasures are provided. An example radar system generates a radar signal comprising a plurality of rising and falling edges and inserts a watermark into the radar signal by applying a time shift to a particular one of the rising and falling edges. The radar system then determines whether a received radar signal includes a time-shifted rising or falling edge corresponding to the inserted watermark and responsively determines whether the received radar signal is a skin return signal or an electronic countermeasure signal.
A system and computer-implemented method for responding to a potential or actual vehicle theft is disclosed. The system is installable within a parking facility that includes a fixed barrier structure around at least a portion of a perimeter of the parking facility to facilitate restriction of vehicle exit and entry to an at least one location where a respective at least one access-controlled gate or door is installed. The system also includes a camera that is configured to capture at least one image showing license plate characters of a license plate of a vehicle. A Field Of View (FOV) of the camera is arranged to include coverage of an area that is inside the parking facility and along a path leading to the at least one access-controlled gate or door.
Examples provide a variable zoom imaging system including an image sensor, a set of illumination channels, and a current driver circuitry for driving the set of illumination channels. Each respective illumination channel includes a set of light sources and a lens, and is associated with a respective focus distance. An electronic processor is configured to focus the image sensor to an object of interest, determine a distance from the image sensor to the object of interest, determine an exposure period for the image sensor, select a subset of illumination channels to activate based at least on the distance from the image sensor to the object of interest, and capture a first image of the object of interest using the image sensor by sequentially activating and deactivating each selected illumination channel of the subset for first respective time frames within the exposure period.
Techniques for reconfiguring a second camera based on a first camera are provided. An event of interest is identified at a first camera using a first analytic. The event of interest occurring in a portion of a field of view of the first camera. A second camera whose field of view includes at least a portion of the event of interest in a field of view of the second camera is identified. It is determined that the second camera is equipped with a second analytic, the second analytic not currently operating on the at least a portion of the event of interest in the field of view of the second camera. The second camera is reconfigured to perform the second analytic on the at least the portion of the event of interest in the field of view of the second camera.
A method, system and computer program product for visual representation of an incident scene is disclosed. The method includes generating, using an at least one processor, a set of inputs for causing an at least one learning machine to create, for display on a screen, a visual representation of the incident scene corresponding to witness statements. The visual representation includes depictions of a plurality of scene elements. The method also includes providing the set of inputs to the at least one learning machine to cause the at least one learning machine to create the visual representation of the incident scene.
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Radio communications; Transmission and delivery of telecommunication services, namely, providing voice, text, data, pictures, music and video via wireless networks and two-way radio dispatching services Two-way radios; Gateway routers; Downloadable software for enabling mobile phones with push to talk capability Application service provider, namely, hosting, managing, developing, and maintaining applications, software, and web sites, in the fields of personal productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops and mobile electronic devices; Software as a service (SAAS) services featuring software for connecting people and devices with push-to-talk communications
Techniques for executing additional analytics at an access control point are provided. A target at an access control point attempting to traverse the access control point is identified. The target is provided an indication that traversal of the access control point is delayed. Additional analytics resources are directed to the access control point. Additional analytics are run on the target using the additional analytics resources. The target is allowed to traverse the access control point once the additional analytics have completed.
Techniques for executing additional analytics at an access control point are provided. A target at an access control point attempting to traverse the access control point is identified. The target is provided an indication that traversal of the access control point is delayed. Additional analytics resources are directed to the access control point. Additional analytics are run on the target using the additional analytics resources. The target is allowed to traverse the access control point once the additional analytics have completed.
A communication system, method and device are provided for managing a post-incident response. The system includes a security system controller having a processor configured to receive a notification that a mass incident event, such as an active shooter event, has ended and send a prompt requesting in-room victim status information to a plurality of in-room communication device of the building. Analytics are performed by the processor on the received in-room victim status information to determine room priority. A post-incident workflow is triggered that generates a plurality of control signals indicative of each room priority and in-room victim status for each room. The plurality of control signals are sent to chirp generators of door access control devices associated with each room of the building. Each control signal controls chirp playout indicative of the room priority and victim status. A mutual aid responder, without access to a radio, can follow the audible chirps.
G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
G08B 21/22 - Status alarms responsive to presence or absence of persons
93.
Method of generating a trigger initiating an emergency incident response workflow
A computer-implemented method of generating a trigger initiating an emergency incident response workflow and a device implementing the method is disclosed. Emergency notification data associated with at least one emergency notification reporting a first incident is received. Based on the emergency notification data, a first sensor data originating from one or more sensors is retrieved, the first sensor data associated with a time and location of the first incident. At least one alarm-escalating trigger is generated. The alarm escalating trigger comprises an alarm-escalating condition and a first-type emergency incident response workflow, the alarm-escalating condition being based on at least a portion of the first sensor data. The alarm-escalating trigger, when implemented by an implementing device, triggers the first-type emergency incident response workflow in response to receiving a second sensor data originating from one or more implementing sensors, the second sensor data meeting the alarm-escalating condition.
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
94.
DEVICE, SYSTEM, AND METHOD FOR CONTROLLING VEHICLE-RELATED FUNCTIONALITY
A device, system, and method for controlling vehicle-related functionality is provided. A system comprises: a vehicle comprising: a vehicle display; a mobile device comprising: a mobile display, the vehicle and the mobile device communicatively coupled to each other; a transceiver; and a controller. The controller is configured to: determine, via the transceiver, whether the vehicle is a first vehicle or a subsequent vehicle to arrive at an incident scene. When the vehicle is the first vehicle to arrive at the incident scene, the controller selectively enables: a first application for presentation at the vehicle display; and a second application for presentation at the mobile display. When the vehicle is the subsequent vehicle to arrive at the incident scene, the controller selectively enables: a third application, different from the first application, for presentation at the vehicle display; and a fourth application for presentation at the mobile display.
G08G 1/0965 - Arrangements for giving variable traffic instructions having an indicator mounted inside the vehicle, e.g. giving voice messages responding to signals from another vehicle, e.g. emergency vehicle
B60K 35/00 - Instruments specially adapted for vehiclesArrangement of instruments in or on vehicles
H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
95.
DEVICE, SYSTEM, AND METHOD FOR CONTROLLING A VEHICLE-RELATED DISPLAY INTO AN EXITED OCCUPANT SUPPORT MODE
A device, system, and method for controlling a vehicle-related display into an exited occupant support mode is provided. A system comprises: a vehicle egress sensor; a first vehicle comprising: a vehicle display; a mobile device comprising: a mobile display, the first vehicle and the mobile device communicatively coupled to each other; and a controller. The controller is configured to: determine, via the vehicle egress sensor, that an occupant has exited the first vehicle, or a second vehicle proximal to the first vehicle; and in response, selectively enable an exited occupant support mode at one or more of the vehicle display and the mobile display.
A computer-implemented method of generating a trigger initiating an emergency incident response workflow and a device implementing the method is disclosed. Emergency notification data associated with at least one emergency notification reporting a first incident is received. Based on the emergency notification data, a first sensor data originating from one or more sensors is retrieved, the first sensor data associated with a time and location of the first incident. At least one alarm-escalating trigger is generated. The alarm escalating trigger comprises an alarm-escalating condition and a first-type emergency incident response workflow, the alarm-escalating condition being based on at least a portion of the first sensor data. The alarm-escalating trigger, when implemented by an implementing device, triggers the first-type emergency incident response workflow in response to receiving a second sensor data originating from one or more implementing sensors, the second sensor data meeting the alarm-escalating condition.
A device, system and method to control operation of a base station is provided. A computing devices communicates, to two or more spectrum controllers, respective authorization requests associated with a physical base station at a given location, the two or more spectrum controllers managed by different respective entities. The computing device receives, from the two or more spectrum controllers, one or more respective spectrum controller responses to the respective authorization requests. When the one or more respective spectrum controller responses include at least one authorization associated with the physical base station, the computing device provides, to the physical base station, permission to operate via respective RF transmissions.
A method and system for carrying out iterative appearance searching is disclosed. The method includes employing at least one first reference image to carry out a first instance, computer vision-driven appearance search of first video data captured across a respective first set of a plurality of first security cameras. The method also includes obtaining a second reference image, having a respective relevance confidence that satisfies a confidence threshold condition, from the portion of the first video data. The method also includes employing the second reference image for a second instance, computer vision-driven appearance search of second video data captured across a respective second set of a plurality of second security cameras.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 20/40 - ScenesScene-specific elements in video content
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
99.
DIFFERENTIAL CONFIGURATION UPDATES FOR MOBILE DEVICES
A system includes memory hardware configured to store instructions and processing hardware configured to execute the instructions. The instructions include loading a legacy configuration file including a plurality of legacy blocks and loading an updated configuration file including a plurality of updated blocks. The instructions include, for each updated block, identifying one legacy block from the plurality of legacy blocks having a same type as the updated block and a payload representing a nearest match to a payload of the updated block and generating an update data object based on an identifier of the legacy block and an identifier of the updated block and adding the update data object to a difference file in response to the identified one legacy block and the updated block having matching payloads but different identifiers. The instructions include transmitting the difference file to a mobile device via a radio network to update the device.
A method and system for carrying out iterative appearance searching is disclosed. The method includes employing at least one first reference image to carry out a first instance, computer vision-driven appearance search of first video data captured across a respective first set of a plurality of first security cameras. The method also includes obtaining a second reference image, having a respective relevance confidence that satisfies a confidence threshold condition, from the portion of the first video data. The method also includes employing the second reference image for a second instance, computer vision-driven appearance search of second video data captured across a respective second set of a plurality of second security cameras.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestriansRecognition of traffic objects, e.g. traffic signs, traffic lights or roads