Techniques for resetting a primary communications channel of a drone based on a new connection parameter received over a secondary communications channel are provided. It is detected that a drone is suspected of being hijacked. A primary communications channel to the drone that is used for flight operations is disabled. A secondary communications channel that is less suitable for flight control operations is established. At least one new connection parameter for the primary communications channel is received over the secondary communications channel. The primary communications channel is reset based on the at least one new connection parameter.
A surface mountable camera (1000) includes a junction box (104) and clip (300) that provide for a plurality of selectable mounting positions, each accommodating a hanging camera position. The junction box (104) provides a four-sided interior compartment, wherein at least three side walls of the compartment each include a slot (112) and an anchor feature (114) corresponding to the slot. The clip (300) is configured to interchangeably insert onto any of the three side walls of the junction box. The clip (300) includes an access port (304) formed therein for engaging with the anchor feature (114) of the junction box (104), and the clip includes first and second engagement tabs (302) for engaging into the slot (112) of the junction box (104). Once the clip (300) is anchored to the junction box (104), a camera assembly (200) is pivotably mounted, via a hinged bracket (400), to the clip of the junction box.
A surface mountable camera (1000) includes a junction box (104) and clip (300) that provide for a plurality of selectable mounting positions, each accommodating a hanging camera position. The junction box (104) provides a four-sided interior compartment, wherein at least three side walls of the compartment each include a slot (112) and an anchor feature (114) corresponding to the slot. The clip (300) is configured to interchangeably insert onto any of the three side walls of the junction box. The clip (300) includes an access port (304) formed therein for engaging with the anchor feature (114) of the junction box (104), and the clip includes first and second engagement tabs (302) for engaging into the slot (112) of the junction box (104). Once the clip (300) is anchored to the junction box (104), a camera assembly (200) is pivotably mounted, via a hinged bracket (400), to the clip of the junction box.
A voice intercom system and method therefor are disclosed. The method includes wirelessly transmitting intercom directory data to a smartphone. The intercom directory data facilitates generation, on the smartphone, of an intercom access directory interface having a plurality of call initiation selection options, each with respect to which a call to a respective call recipient can be attempted.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
H04L 61/4594 - Address books, i.e. directories containing contact information about correspondents
H04M 19/04 - Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
5.
SECURITY ECOSYSTEM, DEVICE AND METHOD FOR CONTROLLING WORKFLOWS ASSOCIATED WITH DIFFERENT ENTITIES BASED ON EXPORT AND IMPORT RULES
A security ecosystem, device and method for controlling workflows associated with different entities based on export and import rules is provided. For example, a computing device monitors execution of a first safety workflow, associated with a first entity, comprising a first trigger and a first responsive action. The computing device compares an event, associated with the first trigger, with an export rule. In response to the event of the first safety workflow meeting the export rule, the computing device compares the event with an import rule, associated with a second entity, for initiating a second safety workflow based on the event and associated with the second entity. In response to the event meeting the import rule, the computing device initiates the second safety workflow associated with the second entity, the second safety workflow comprising a second trigger and a second responsive action, the second trigger corresponding to the event.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A voice intercom system and method therefor are disclosed. The method includes wirelessly transmitting intercom directory data to a smartphone. The intercom directory data facilitates generation, on the smartphone, of an intercom access directory interface having a plurality of call initiation selection options, each with respect to which a call to a respective call recipient can be attempted.
A method and apparatus for volume control of an electronic device is provided herein. During operation, a volume-control knob will increase a volume of sound output from a device in a substantially linear fashion (versus knob rotation angle) as a volume-control knob is rotated. Once the volume-control knob is rotated past a predetermined amount, a volume boost is activated, increasing the volume level in a non-linear fashion. More particularly, in one embodiment of the present invention, once the volume-control knob is rotated past the predetermined amount (e.g., 300 degrees), the volume will be increased instantaneously (e.g., by 25%).
G10L 21/0216 - Noise filtering characterised by the method used for estimating noise
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
One example device may be configured to determine that a destination public safety answering point (PSAP) of a received first call operates in a legacy PSAP domain. In response such a determination, the device may determine whether the first call is of a first type of call that includes an original number identification or of a second type of call that does not include an original number identification. In response to determining that the first call is of the first type, the device may deliver the first call to the destination PSAP along with an original number identification of the first call. In response to determining that the first call is of the second type, the device may generate a crafted number identification for the first call, and deliver the first call to the destination PSAP along with the crafted number identification.
A method and apparatus for volume control of an electronic device is provided herein. During operation, a volume-control knob will increase a volume of sound output from a device in a substantially linear fashion (versus knob rotation angle) as a volumecontrol knob is rotated. Once the volume-control knob is rotated past a predetermined amount, a volume boost is activated, increasing the volume level in a non-linear fashion. More particularly, in one embodiment of the present invention, once the volume-control knob is rotated past the predetermined amount (e.g., 300 degrees), the volume will be increased instantaneously (e.g., by 25%).
A method and apparatus for performing noise suppression on an electronic device is provided herein. During operation, a volume-control knob will increase a volume of sound output from a device in a substantially linear fashion (versus knob rotation angle) as a volume-control knob is rotated in a first direction. Noise suppression on the electronic device will also increase as the volume-control knob is rotated in the first direction.
Examples provide a video security system including an electronic processor configured to detect an anomaly by obtaining video data captured using an image sensor and determining a number of people detected in each of a plurality of frames of the video data. For each moment t, the electronic processor determines an average number of people n over a time interval (t-Δt1, t), where Δt1 is greater than or equal to the moment t. For each non-overlapping time interval Δt1, the electronic processor updates a histogram based on the average number of people for the time interval Δt1. In response to determining, using the histogram, that the probability ρ of the average number of people n over the time interval (t-Δt1, t) is less than a threshold probability ρ*, the electronic processor generates an alert indicating that an anomalous crowd size is detected.
Examples provide a video security system including an electronic processor configured to detect an anomaly by obtaining video data captured using an image sensor and determining a number of people detected in each of a plurality of frames of the video data. For each moment t, the electronic processor determines an average number of people n over a time interval (t−Δt1, t), where Δt1 is greater than or equal to the moment t. For each non-overlapping time interval Δt1, the electronic processor updates a histogram based on the average number of people for the time interval Δt1. In response to determining, using the histogram, that the probability ρ of the average number of people n over the time interval (t−Δt1, t) is less than a threshold probability ρ*, the electronic processor generates an alert indicating that an anomalous crowd size is detected.
Systems and method for camera calibration. In one example, the camera includes an electronic processor configured to obtain a bounding box in a captured image, the bounding box bounding a person in the image and having a lowermost vertical coordinate and an uppermost vertical coordinate. The electronic processor determines an initial estimation of values of a set of camera parameters Θ and a current estimation of values of the set of camera parameters Θ based on the initial estimation. The electronic processor iteratively updates the current estimation of values of the set of camera parameters Θ by determining feet coordinates within the bounding box, determining a vertical head coordinate, and updating the current estimation of values of the set of camera parameters Θ by reducing a difference between the vertical head coordinate and the uppermost vertical coordinate of the bounding box.
Examples provide a cloud server management controller configured to determine a network resource threshold and a cloud resource availability for a cloud server. The first resource availability is an amount of cloud network resources available in the cloud server within the network resource threshold. For each respective system of a plurality of local network systems, the controller determines a local resource usage and predicts a cloud resource requirement. The cloud resource requirement is an amount of cloud network resources required to provide a cloud-based equivalent of the respective system. The controller builds a model based on the cloud resource requirement for each respective system and the network resource threshold. The model defines a cloud migration priority for each of the plurality of local network systems. Based on the model, the controller generates a cloud migration timeline for sequentially migrating each respective system to the cloud server.
A method and apparatus for providing discovery within a D2D communications is provided herein. During operation, a first device will determine an identification of its own network slice, and an identification of a network slice other devices operate on. Only devices operating on the same network slice as the first device are allowed for D2D communication with the first device.
A method, system and computer program product for diagnosing a malfunctioning or misused electronic device is disclosed. The method includes performing analytics on at least one of video and audio to automatically detect at least one anomaly exhibited by the electronic device or exhibited in relation to user interaction with the electronic device, the at least one anomaly being distinguishable from other non-present anomalies detectable by a computer system that carries out the performing of the analytics.
A process for alerting a user for capturing digital evidence that is not in compliance with evidentiary policies. In operation, an electronic computing device acquires audio and/or video recordings from audio and/or video recorders operated by a user while the user is performing an assigned task. The device retrieves an evidentiary policy established corresponding to a particular type of the assigned task. The evidentiary policy identifies a list of evidentiary objects required to be digitally recorded in the audio and/or video recordings captured corresponding to the user's assigned task. If the audio and/or video recordings do not record at least one evidentiary object identified in the evidentiary policy with a specified quality level, then the device provides an electronic alert to the user indicating that the audio and/or video recordings are not in compliance with the evidentiary policy.
Device, system and method to control at least one electrical circuit to enter a low efficiency mode to heat a battery cell is provided. A temperature measurement device and battery cell parameter determination device respectively determine a temperature and impedance of a battery cell of a device. When the temperature of the battery cell is below a threshold temperature and the impedance of the battery cell is above a threshold impedance, a controller of the device controls at an electrical circuit of the device to enter a low efficiency mode by controlling the electrical circuit to draw an auxiliary current from the battery cell to heat the battery cell, the auxiliary current being below a given functional operating current of the electrical circuit, the electrical circuit having reduced functionality, relative to a given functionality when drawing a given functional operating current from the battery cell, while drawing the auxiliary current.
H01M 10/48 - Accumulators combined with arrangements for measuring, testing or indicating the condition of cells, e.g. the level or density of the electrolyte
19.
SECURITY ECOSYSTEM, DEVICE AND METHOD FOR COMMUNICATING WITH COMMUNICATION DEVICES BASED ON WORKFLOW INTERACTIONS
A device monitors execution of a safety workflow, the safety workflow comprising one or more triggers and one or more responsive actions. The device provides, at a display screen, an indication of the safety workflow and respective visual indications of: a physical sensor that generated sensor data of a trigger of the safety workflow; and a communication device associated with a responsive action to the trigger. The device detects, via an input device, an interaction with one or more of the respective visual indications to interact with one or more of the physical sensor and the communication device. Based on the interaction, the device one or more of: initiates communication with the communication device; and sends the sensor data to the communication device.
A process for redacting an image. In operation, an electronic computing device receives an image captured by a camera corresponding to a field of view of the camera. The image contains a plurality of pixels and each pixel in the plurality of pixels capturing a respective region in a plurality of regions of the field of view of the camera. The electronic computing device measures a distance from the camera to each respective region in the plurality of regions of the field of view of the camera. The electronic computing device redacts at least one pixel in the plurality of pixels contained in the image as a function of the distance measured from the camera to a respective region captured in the at least one pixel.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A process for redacting an image. In operation, an electronic computing device receives an image captured by a camera corresponding to a field of view of the camera. The image contains a plurality of pixels and each pixel in the plurality of pixels capturing a respective region in a plurality of regions of the field of view of the camera. The electronic computing device measures a distance from the camera to each respective region in the plurality of regions of the field of view of the camera. The electronic computing device redacts at least one pixel in the plurality of pixels contained in the image as a function of the distance measured from the camera to a respective region captured in the at least one pixel.
A method and apparatus for identifying a faked video is provided herein. During operation, when a video, or video call is received from a device, a simultaneous audio call is placed to the device (i.e., the video call and audio call take place simultaneously in time). The audio streams on both the video and audio call are compared, and a difference between the audio streams is identified. The video is deemed a potential fake if the difference between the audio streams is above a particular threshold.
A method and apparatus for minimizing a time that a camera field of view is not being monitored while the camera is undergoing a software or firmware update is provided herein. During operation a determination is made that a camera needs a software or firmware update. The location of a security asset (e.g., a mobile camera, a security guard, a drone, . . . , etc.) is determined. The update is performed based on the security asset being within a predetermined distance from the camera. More particularly, in one embodiment, the update is performed only when the security asset is within the predetermined distance from the camera.
A system for low earth orbit (LEO) satellite communication. In one example, the system includes a control computer and a workgroup including a plurality of communication devices. Each communication device includes an electronic processor configured to establish a wireless network connection with the control computer, determine connectivity data associated with a signal between the communication device and a first LEO satellite (121), and transmit the connectivity data to the control computer via the wireless network connection. The control computer is configured to receive the connectivity data from each communication device, and select a first one of the plurality of communication devices as a primary communication device (201) based on each of the connectivity data. The primary communication device (201) is configured to receive media from a different one of the plurality of communication devices via the wireless network connection and transmit the media to the first LEO satellite (121).
A method and apparatus for providing recommendations for evidence collection is provided herein. During operation a recommendation server is provided with evidence collected, including IoT device logs of events that can be used as evidence to investigate a particular crime. In response, the recommendation server will provide the investigator recommendations to search for additional evidence of events and objects that could potentially be used in a successful prosecution of the crime. The recommendations provided will be based on events that were used as evidence in past successful prosecutions of similar crimes.
A system and method for gradual migration from a legacy application to a replacement application is disclosed. The method includes determining whether or not a feature requested by a user is available amongst installed features currently deliverable by a replacement software application. When the feature requested by the user is currently deliverable by the replacement software application, a legacy software application communicates with the replacement software application to cause the feature requested by the user to be obtained from the replacement software application.
A process of selectively enabling execution of video analytics on videos captured by cameras. In operation, an electronic computing device accesses an incident database identifying incidents resolved by one or more agencies. The incidents include a first set of incidents that were first reported to the agencies by a human source and a second set of incidents that were first reported to the agencies by a video analytics system. The electronic computing device then estimates a first average cost incurred in resolving the first set of incidents and a second average cost incurred in resolving the second set of incidents. The electronic computing device enables the video analytics system to execute video analytics on videos captured by the one or more cameras to proactively detect and report incidents when the first average cost is higher than the second average cost by at least the predefined threshold.
A device, system, and method to provide front-facing camera images identified using a scene image assembled from rear-facing camera images is provided. A device retrieves dual-sensor camera images having respective metadata indicating image acquisitions substantially matching a time and a place associated with an incident, the dual-sensor camera images including a front and rear-facing camera image acquired via a same respective dual-sensor camera. The device assembles the rear-facing camera images into a scene image and renders the scene image at a display screen. The device receives an indication of a region-of-interest within the scene image and responsively: identifies a set of rear-facing camera images acquired within a predetermined threshold distance of the region-of-interest as determined using the respective metadata; and renders, at the display screen, front-facing camera images, from the dual-sensor camera images, associated with the set of rear-facing camera images acquired within the predetermined threshold distance of the region-of-interest.
A system for low earth orbit (LEO) satellite communication. In one example, the system includes a control computer and a workgroup including a plurality of communication devices. Each communication device includes an electronic processor configured to establish a wireless network connection with the control computer, determine connectivity data associated with a signal between the communication device and a first LEO satellite, and transmit the connectivity data to the control computer via the wireless network connection. The control computer is configured to receive the connectivity data from each communication device, and select a first one of the plurality of communication devices as a primary communication device based on each of the connectivity data. The primary communication device is configured to receive media from a different one of the plurality of communication devices via the wireless network connection and transmit the media to the first LEO satellite.
A method, system and computer program product for backup assignment of a mobile electronics device is disclosed. In response to one or more device assignment requests received by a controller apparatus when a server is operating in an off-line mode, one or more device assignment records are created within the controller apparatus, and which indicate assignment of the at least one mobile electronics device to a respective one or more users. When the server is operating in an off-line mode such that communication between the controller apparatus and the server is off-line, the one or more device assignment records, in relation to the at least one mobile electronics device, are stored in the controller apparatus. In response to the server re-entering the on-line mode, the server is updated with the one or more device assignment records.
H04L 41/0853 - Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 67/2869 - Terminals specially adapted for communication
31.
METHOD AND SYSTEM FOR TRIGGERING AN AUDIO COMPONENT CHANGE ACTION
A method, system and computer program product for triggering an audio component change action is disclosed. The method includes analyzing audio corresponding to a period of time to identify one or more audio components of the audio that are matching to a defined set of feature parameters. The method also includes triggering an audio component change action on output of the audio, wherein effecting the audio component change action includes at least one of changing audio component volume and changing categorization of the one or more audio components, which may be based on NLP analyzation of preferences relating to volume and category of the one or more audio components.
A communication system and method provide for automatic arrestee grouping and action recommendation during a mass incident arrest. A portable radio sends a notification to a server indicating a mass incident event with grouping request for grouping arrestees. The server returns an electronic form including a mass arrest ID based on type of mass event. The electronic form facilitates collecting individual arrestee information based on the type of mass event. Current offense type and personal attribute information are collected and further electronically tagged to each arrestee. The server automatically assigns each arrestee to an offense group based on current offense type, and then refines the offense group into sub-groups based on prior arrest records. The server generates arrest processing procedure recommendations customized for each sub-group and transmits the recommendations to the PS radio associated with the grouping request.
A security camera and assembly include a camera lens assembly, a lens tilt locking mechanism, and a grab handle having LEDs mounted thereon. Embodiments include a lens tilt locking mechanism coupled to the camera lens assembly for setting a field of view (FOV) for a camera lens of the camera lens assembly. The grab handle is pivotally coupled to the camera lens assembly via a pivoting mechanism. The grab handle having LEDs mounted thereon pivots to provide independent control of illumination to the FOV without shifting the FOV. In a further embodiment, the grab handle may further include an antenna embedded therein.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 23/56 - Cameras or camera modules comprising electronic image sensors; Control thereof provided with illuminating means
35.
METHOD AND APPARATUS FOR ASSIGNING A RELIABILITY SCORE FOR TIP SUBMISSIONS
A method and apparatus for providing a reliability score for a submitted tip is provided herein. During operation, when a user anonymously submits an image to a tipping server, the tipping server determines if an imager (e.g., a camera) used to capture the image has been used to capture any past images submitted to the tipping server. If so, a reliability score is determined for the imager that is based on a reliability of the past images submitted. The reliability score is then presented to any user viewing the image.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
A security camera and assembly include a camera lens assembly, a lens tilt locking mechanism, and a grab handle having LEDs mounted thereon. Embodiments include a lens tilt locking mechanism coupled to the camera lens assembly for setting a field of view (FOV) for a camera lens of the camera lens assembly. The grab handle is pivotally coupled to the camera lens assembly via a pivoting mechanism. The grab handle having LEDs mounted thereon pivots to provide independent control of illumination to the FOV without shifting the FOV. In a further embodiment, the grab handle may further include an antenna embedded therein.
A holster for docking a portable radio is provided. The holster is configured with a GND extension path that provides an antenna counterpoise for an external antenna of the portable radio. The holster is formed of a housing (121) having a belt attachment element (122) extending therefrom and a GND contact (124) integrated into therein, the a GND contact for coupling to a corresponding radio GND of the docked radio. The GND extension path extends from GND contact (124) through a first conductive element (126) of the holster housing to a second conductive element (128) embedded in the belt attachment element of the holster.
Systems and methods for detecting security anomalies in a computing environment. One example system includes an electronic processor configured to receive, via the communication interface, security data for the computing environment and parse the security data to extract a feature set. The electronic processor is configured to apply noise to the feature set to produce a noised feature set and to produce a reduced noise feature set by processing the noised feature set using a neural network trained to remove noise. The electronic processor is configured to compare the reduced noise feature set to the feature set to determine a success score, select a threshold based on the security data, and determine whether the success score exceeds the threshold. The electronic processor is configured to, responsive to determining that the success score does not exceed the threshold, generate a security event based on the security data.
A method and apparatus for analyzing a dirty camera lens to determine if the dirty camera lens causes a failure to detect various events is provided herein. During operation, a filter is created that, when applied to previously-recorded video, mimics a dirty camera lens currently existing on a camera. The filter can then be applied to video taken previously with the camera as a result of an event being detected. The video analytics to detect the event are run again on the filtered video to see if the event is again detected. If the event was detected in both the filtered and unfiltered video, it is assumed that the particular event can still be detected even with the dirty lens. If the results differ, an alert can be sent to an operator indicating that the camera may no longer be capable of detecting the particular event.
A computer-implemented method comprises monitoring activity associated with a user, determining, by a trained machine learning model using the monitored activity of the user, that the user will need to access an asset that the user does not currently have access to, the machine learning model trained with a plurality of previous workflows completed by previous users and associated access privileges required for the previous workflows; and assigning an access privilege to the user, wherein the user is thereafter able to access to the asset.
A method and system for providing a fallback solution in a multi-tenant communication system is provided. A cloud-based call processing service receives a voice call initiation request from a first mobile device located at a first communication system. The voice call initiation request includes a request to complete a voice call with a second mobile device located at a second communication system. Resources are allocated at the first communication system and the second communication system. The cloud-based call processing service establishes a call between the first mobile device and the second mobile device. At some point the first communication system determines that it should fallback to single site operation. In fallback mode, call processing functionality is performed at the first communication system for the first mobile device.
A computer-implemented method comprises monitoring activity associated with a user; determining, by a trained machine learning model using the monitored activity of the user, that the user will need to access an asset that the user does not currently have access to, the machine learning model trained with a plurality of previous workflows completed by previous users and associated access privileges required for the previous workflows; and assigning an access privilege to the user, wherein the user is thereafter able to access to the asset.
An event detected in video is encoded as a binary vector. A set of binary vectors representative of the video may be so generated and stored in a queryable datastore. A query is encoded as a binary vector representative of a queried event. The query binary vector is compared to the set of binary vectors generated for the video and a result indicative of a similarity of the query binary vector to the set of binary vectors is returned.
A method and apparatus for operating a camera is provided herein. During operation a camera having pan/tilt/zoom (PTZ) capabilities will have its field of view (FOV) moved such that any detected blemish on the camera lies over an area with low activity (i.e., a low history of detected motion). More particularly, when it has been determined that a blemish or blemish resides on a camera's lens, a heat map of activity within the current FOV is determined. More active areas of the FOV are marked as “hot”, while less active areas of activity are marked as “cold”. The camera is then aligned such that the dirty portion of the lens does not align with any “hot” part of the heat map.
An event detected in video is encoded as a binary vector. A set of binary vectors representative of the video may be so generated and stored in a queryable datastore. A query is encoded as a binary vector representative of a queried event. The query binary vector is compared to the set of binary vectors generated for the video and a result indicative of a similarity of the query binary vector to the set of binary vectors is returned.
A security ecosystem, device, system and method for mitigating conflicts in workflows is provided. A computing device is provided having a network interface and a processor configured to receive workflows from a plurality of workflow computer systems and identify conflicts in the one or more physical devices that are shared among the workflows. The processor mitigates identified conflicts by modifying at least one of the workflows to avoid an identified conflict and provides the modified workflow back to one or more of workflow computer systems implementing the workflows that caused the conflicts.
Methods and systems for processing audio information to identify persons of interest in regard to a public-safety incident. An example method includes receiving human-generated narrative statements as audio and converting the narrative statements into corresponding digital texts. The method further includes determining incriminating scores for each of the narrative statements by identifying, in the digital texts, incident information classified as not being publicly known. The method further includes determining a cumulative score for an individual based on the incriminating scores tagged to the individual, making a determination of whether the individual is a person of interest based on a comparison of the cumulative score with a fixed threshold, and performing at least one automated responsive action based on the determination.
A device, system, and method for reducing machine learning bias in machine learning generated textual lists of time-stamped events is provided. The device generates, via a machine learning algorithm, using sensor data related to the incident, a textual list of time-stamped events for an incident, one or more of the events associated with respective machine learning confidence scores. For a given time-stamped event having a respective machine learning confidence score less than a threshold confidence score, the device redacts the given event in the list and replaces it in the list with a field for receiving input, the list of rendered at a display screen with the given event in the list replaced with the field. The device receives, via an input device, input at the field and after receiving the input, un-redacts the given event, and renders, at the display screen, the received input received and the given event.
A device, system, and method for an electronic response to a potential carjacking is provided. A device receives: a location and vehicle ignition status of a vehicle; and sensor data generated by one or more sensors that are onboard the vehicle, the sensor data different from the location and the vehicle ignition status. The device determines whether the location of the vehicle is associated with a carjacking type of location, and whether a combination of the vehicle ignition status and the sensor data meet a carjacking threshold condition. When both the location of the vehicle is associated with the carjacking type of location and the carjacking threshold condition is met, the device: outputs an alert at the vehicle indicative of, or associated with, the potential carjacking; and/or causes, a notification to be transmitted to a communication device associated with a public safety agency or a monitoring service.
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
B60R 25/10 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
B60R 25/31 - Detection related to theft or to other events relevant to anti-theft systems of human presence inside or outside the vehicle
B60R 25/33 - Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
An indication of a physical access action performed by a person in proximity of a camera determines a manner in which the physical access action is performed. An operational profile of the camera is set to control capture at the proximity of the camera based on the manner in which the physical access action is performed. This includes selecting the operational profile from a first operational profile and a second operational profile that is different from the first operational profile.
An analysis is performed on a request to compare a resource determined from the request with resources provided or needed by mobile physical entities, such as people, vehicles, or equipment. The analysis includes matching the request to a mobile physical entity. A target marking device that is associated with the mobile physical entity that matches the request is selected. A marking signal is transmitted to the target marking device to cause the target marking device to illuminate and thereby visually mark the mobile physical entity that matches the request.
An automatic gain control (AGC) attenuator for an amplifier. In one example, the AGC attenuator includes a first transistor stack including a plurality of first banks of current steering differential transistor pairs and configured to receive a radio frequency (RF) input signal and output a first attenuated RF signal. Each first bank of the plurality of first banks is configured to attenuate the RF input signal by a predetermined value. The AGC attenuator also includes a second transistor stack that includes a plurality of second banks of current steering differential transistor pairs. The second transistor stack is cascoded to the first transistor stack, and is configured to receive the first attenuated RF signal and output a second attenuated RF signal. Each second bank of the plurality of second banks is configured to attenuate the first attenuated RF signal by a predetermined value.
Methods and systems for tamper reduction for camera systems. One example system includes a camera with a first field of view configured to operate in a low-power mode and an active mode, an energy wave sensor with a second field of view, and an electronic processor. The electronic processor is configured to monitor, via the energy wave sensor, for an object within the second field of view and determine an object type of the object. In response to determining that the object type is a vehicle, the electronic processor transitions the camera from the low-power mode to the active mode and captures, via the camera, an image of the vehicle. In response to determining that the object type is a person, the electronic processor performs a tamper-monitoring action when the person is within a first predetermined range of a plurality of predetermined ranges of the system.
Imaging systems with an integrated infrared cut off filter and methods for operating same. One example system includes an image sensor and an electronic processor coupled to the image sensor. The image sensor includes a plurality of image recording pixels and a plurality of reserved pixels. A subset of the plurality of reserved pixels are covered by an infrared cut-off filter. The electronic processor is configured to determine a first visible light intensity for the subset of the plurality of reserved pixels. The electronic processor is further configured to control the image sensor to operate in one of a day mode and a night mode based on the first visible light intensity.
H04N 23/11 - Cameras or camera modules comprising electronic image sensors; Control thereof for generating image signals from different wavelengths for generating image signals from visible and infrared light wavelengths
G06V 10/143 - Sensing or illuminating at different wavelengths
G06V 10/74 - Image or video pattern matching; Proximity measures in feature spaces
Methods and systems for processing audio information captured by an interactive virtual assistant (IVA). An example method includes: converting sound received by a microphone into electrical signals; generating voiceprints corresponding to voices represented in the electrical signals; distinguishing signals representing background speech and signals representing voice commands directed at the IVA; and based on various signals representing background speech and voice commands, labeling each of the voiceprints with a tag selected from the group consisting of an IVA interactor occupant tag, an IVA non-interactor occupant tag, and a non-occupant tag. The method also includes transmitting, in response to a trigger event, a message with at least one of an estimated number of occupants in a geofenced area corresponding to the IVA and an alert reporting an indication of unlawful activity thereat.
A mobile communication system that includes a short-range communication device, a mobile communication device, and a vehicle-based communication device configured to communicate with the short-range communication device. The system includes a sensor configured to generate sensor data and an electronic processor connected to the sensor and configured to receive sensor data that is associated with a scene external to a vehicle, detect an object based on the received sensor data, determine a parameter associated with the object based on the received sensor data and determine a communication interference value associated with the object based on the determined parameter. The electronic processor is also configured to pre-establish communication between the short-range communication device and the mobile communication device in response to determining that the communication interference value exceeds a pre-defined interference threshold.
Systems and methods for detecting and tracking conversations of interest in crowded areas. The system includes a plurality of body worn portable public safety communication devices, each including a plurality of microphones and an electronic processor. The electronic processor is configured to generate, using the plurality of microphones, a plurality of beams and scan in parallel, using the plurality of beams, a plurality of simultaneous audio conversations. The electronic processor is configured to identify and isolate a plurality of conversations of interest from among the audio conversations based on predetermined characteristics indicative of a potential threat. The electronic processor is configured to determine that at least two of the plurality of conversations of interest are potentially linked to a single potential threat, compile them for playback or transcription, and generate an alert indicating the availability of the linked conversations of interest.
G10L 15/18 - Speech classification or search using natural language modelling
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
An indication of a physical access action performed by a person in proximity of a camera determines a manner in which the physical access action is performed. An operational profile of the camera is set to control capture at the proximity of the camera based on the manner in which the physical access action is performed. This includes selecting the operational profile from a first operational profile and a second operational profile that is different from the first operational profile.
H04N 23/661 - Transmitting camera control signals through networks, e.g. control via the Internet
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
H04N 23/61 - Control of cameras or camera modules based on recognised objects
G07C 9/00 - Individual registration on entry or exit
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
59.
Device, system, and method to initiate electronic actions on calls and manage call-taking resources
Device, system and method to initiate electronic actions on calls and manage call-taking resources is provided. A device receives a call for a public-safety answering point (PSAP) and, based on determining human-operated communication devices of the PSAP are engaged on other calls: places the call into a queue; answers the call; and provides, on the call, an inquiry for keywords indicative of mental health of a caller on the call. The device determines, based on a keyword spoken by the caller, an electronic activity configured to maintain the caller on the call, including a prompt to cause the caller to talk. The device provides, while the call is in the queue, the electronic activity on the call, receives a response, and, based on a relative reduction of the queue, the keyword, the response, and/or a measured stress level of the caller, implements an electronic action configured to manage the queue.
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
H04M 3/22 - Arrangements for supervision, monitoring or testing
Methods and systems for detecting changes in real estate properties for a public safety purpose. An example method includes receiving images of a residential or commercial property and comparing pairs of received images corresponding to different dates to detect structural changes to the property. The method further includes accessing a property permit database to identify unpermitted structural changes and triggering an anomaly check directed at detecting: a first anomaly associated with the type of unpermitted change; a second anomaly associated with an individual residing on the property; and a third anomaly associated with the property based on a public-safety record. The method further includes, in response to at least one of the first, second, and third anomalies having been detected, performing at least one specific automated responsive action through the corresponding system.
Systems and methods for integrating an enterprise digital assistant into a public safety talkgroup. One example system includes a talkgroup server communicatively coupled to a dispatch console and a public safety digital assistant server. The talkgroup server includes an electronic processor configured to receive connection information, associated with an incident, for an enterprise digital assistant server, establish a connection with the enterprise digital assistant server based on the connection information, and generate a talkgroup for the incident, the talkgroup members including the public safety digital assistant server, the dispatch console, and the enterprise digital assistant server.
Imaging systems with an integrated infrared cut off filter and methods for operating the same. One example system includes an image sensor (102) and an electronic processor (205) coupled to the image sensor (102). The image sensor (102) includes a plurality of image recording pixels and a plurality of reserved pixels (304). A subset of the plurality of reserved pixels (304) are covered by an infrared cut- off filter. The electronic processor (205) is configured to determine a first visible light intensity for the subset of the plurality of reserved pixels (304). The electronic processor (205) is further configured to control the image sensor (102) to operate in one of a day mode and a night mode based on the first visible light intensity.
H04N 23/12 - Cameras or camera modules comprising electronic image sensors; Control thereof for generating image signals from different wavelengths with one sensor only
H04N 23/55 - Optical parts specially adapted for electronic image sensors; Mounting thereof
H04N 23/667 - Camera operation mode switching, e.g. between still and video, sport and normal or high and low resolution modes
H04N 23/74 - Circuitry for compensating brightness variation in the scene by influencing the scene brightness using illuminating means
H04N 23/11 - Cameras or camera modules comprising electronic image sensors; Control thereof for generating image signals from different wavelengths for generating image signals from visible and infrared light wavelengths
H04N 23/71 - Circuitry for evaluating the brightness variation
H04N 25/706 - Pixels for exposure or ambient light measuring
63.
DEVICE, SYSTEM, AND METHOD FOR TRAINING MACHINE LEARNING ALGORITHMS TO GENERATE TALKGROUPS BASED ON IN-CALL DATA
A device, system and method for training machine-learning algorithms to generate talkgroups based on in-call data is provided. The device generates, via a machine-learning algorithm, an initial talkgroup based on an incident indication of an incident, the initial talkgroup comprising communication devices communicating via channels, the machine-learning algorithm initially trained to: generate talkgroups based on incident indications; and make changes to the talkgroups. The device receives in-call data such as communications in the initial talkgroup and/or call-transmission metadata, and generates, via the machine-learning algorithm, a suggested change to the initial talkgroup based on the in-call data. The device determines a machine-learning score of the initial talkgroup or the suggested change, indicative of a threshold-based positive or negative reinforcement of efficiency of the initial talkgroup or the suggested change, and implements a machine-learning feedback loop that provides the score to the machine-learning algorithm for further training thereof.
Techniques for communications assurance analysis are provided. A communications assurance analysis system retrieves performance points of a plurality of stages of a single radio call. A level of degradation for each stage of the plurality of stages of the single radio call is determined based on the performance points. A visualization of each stage of the single radio call is displayed. The visualization is in order of a communications path between an initiator of the single radio call and at least one recipient of the single radio call. The visualization for each stage of the plurality of stages is based on the level of degradation for the stage.
An electronic digital assistant detects an assignment to be performed by a first user when a condition is fulfilled. The digital assistant determines if monitoring fulfillment of the condition can be performed by an electronic processing device and if the assignment can be performed by the electronic processing device. If both, monitoring condition and performing an assignment, can be done by the electronic processing device, digital assistant initiates monitoring fulfillment of the condition, and performs the assignment in response to determining that the condition was fulfilled.
A device, system and method for training machine-learning algorithms to generate talkgroups based on in-call data is provided. The device generates, via a machine-learning algorithm, an initial talkgroup based on an incident indication of an incident, the initial talkgroup comprising communication devices communicating via channels, the machine-learning algorithm initially trained to: generate talkgroups based on incident indications; and make changes to the talkgroups. The device receives in-call data such as communications in the initial talkgroup and/or call-transmission metadata, and generates, via the machine-learning algorithm, a suggested change to the initial talkgroup based on the in-call data. The device determines a machine-learning score of the initial talkgroup or the suggested change, indicative of a threshold-based positive or negative reinforcement of efficiency of the initial talkgroup or the suggested change, and implements a machine-learning feedback loop that provides the score to the machine-learning algorithm for further training thereof.
A method for generating a structured graphical user interface (GUI) for improving accuracy of determining violations of public safety policy procedure and effect of such violations on results of an incident includes collecting data pertaining to an incident response and identifying a current public safety policy procedure for an incident type of the incident response. The method also includes detecting one or more actions taken within the incident response falling outside the recommended actions of the current public safety policy procedure and generating a GUI listing a plurality of actions taken during the incident response. The method further includes displaying a recommended action of the current public safety policy procedure corresponding to the one or more actions taken adjacent the one or more actions taken in the GUI and providing a link to the recommended action adjacent the one or more actions taken in the GUI.
A system and method for establishing a dynamic privacy zone for an object. In operation, an electronic computing device receives a request from an electronic tag associated with an object to establish a dynamic privacy zone for the object. The request includes location data indicating a real-time location of the object. The electronic computing device identifies a camera having a field of view overlapping with the real-time location of the object. The electronic computing device converts the real-time location of the object into a corresponding pixel location on the field of view of the camera. The electronic computing device then establishes a dynamic privacy zone for the object within the field of view of the camera as a function of the corresponding pixel location.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
69.
SYSTEM AND METHOD FOR PROVIDING LOCAL ASSISTANCE TO A CALLER WHOSE LOCATION IS UNKNOWN
Techniques for providing assistance to a caller whose location is unknown are provided. A request for assistance from a caller whose location is unknown is received at a public safety answering point from a calling device. A list of devices proximate to the calling devices is received from the calling device whose location is unknown. It is identified when a device in the list of devices proximate to the calling device has been registered as belonging to a person willing to provide local assistance. A request is sent to the identified device to provide local assistance to the caller whose location is unknown.
A system and method for generating a vehicular profile and vehicular profiling system are provided. A request for enrollment in the system is received at a processing device. Live captured images of the vehicle to-be-enrolled and previously recorded images of a base version of the vehicle are processed and compared to detect differences therebetween. The differences are characterized to identify unique identifiers of the vehicle. The vehicular profile is generated including the characterized unique identifiers along with a recoverability-likelihood score. The profile, including the recoverability-likelihood score, is communicated to a primary device associated with capturing the live captured images. The profile including the recoverability-likelihood score may be further communicated to a secondary device having access permissions to the system.
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
G06V 10/74 - Image or video pattern matching; Proximity measures in feature spaces
G06V 20/54 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects of traffic, e.g. cars on the road, trains or boats
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestrians; Recognition of traffic objects, e.g. traffic signs, traffic lights or roads
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
71.
DEVICE HAVING AN INNER SEALING SURFACE FORMING CONTOURS AROUND SCREW BOSSES
A portable communication device having an inner sealing surface forming contours around screw bosses is provided. The device comprises non-metallic housings that mate to form an interior. A first housing comprises: an inner sidewall forming a sealing surface extending around the inner sidewall; an outer sidewall opposing the inner sidewall; and screw bosses between the inner sidewall and the outer sidewall, the sealing surface extending into the interior in respective regions of the screw bosses to form respective contours around the screw bosses. A second housing comprises: a respective sidewall, adjacent to the sealing surface, an outer circumference of the respective sidewall complementary to the sealing surface; and a compressible seal extending around the outer circumference of the respective sidewall, the compressible seal compressing against the sealing surface and the respective contours to seal the interior from moisture. The device further comprises screws configured to mate with respective screw bosses.
A communication system and method are provided for establishing cross-agency communications for managing an incident scene. Converged devices are paired to in-vehicle computers of public safety (PS) vehicles, each PS vehicle having a different agency role. Device capabilities are compared to determine communication commonalities amongst the paired devices of vehicles of different agency roles. One or more frequency channels common to the devices associated with the deployed vehicles of different agency roles are determined. Communication is established amongst devices associated with vehicles of different agency roles using the determined common channel.
A method and system for creation and application of parked vehicle security rules is disclosed. The method includes transmitting, over at least one network to be received via a web-operative interface of an at least one remote system, the parking location and time duration information of a vehicle for enabling creation of a theft alert rule within the at least one remote system. The theft alert rule may be based on a combination of: the vehicle remaining at a parking location for the time duration (i.e. the time duration being a defined part of the parking location and time duration information); and identification data corresponding to the vehicle.
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
B60R 25/104 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device characterised by the type of theft warning signal, e.g. visual or audible signals with special characteristics
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
74.
SYSTEM AND METHOD FOR ESTABLISHING A DYNAMIC PRIVACY ZONE FOR AN OBJECT
A system and method for establishing a dynamic privacy zone for an object. In operation, an electronic computing device receives a request from an electronic tag associated with an object to establish a dynamic privacy zone for the object. The request includes location data indicating a real-time location of the object. The electronic computing device identifies a camera having a field of view overlapping with the real-time location of the object. The electronic computing device converts the real-time location of the object into a corresponding pixel location on the field of view of the camera. The electronic computing device then establishes a dynamic privacy zone for the object within the field of view of the camera as a function of the corresponding pixel location.
A system and method for enhancing a collaborative camera installation experience is disclosed. The method includes running an at least substantially similar test analytic on each of the first video and the second video to generate: first analytic output data corresponding to analytic processing of the first video; and second analytic output data corresponding to analytic processing of the second video. The method also includes assembling for Graphical User Interface (GUI) display to the security camera acquirer, the first and second analytic output data, or performance data derived therefrom. The method also includes, after the assembling for the GUI display, receiving input that one of a plurality of three-dimensionally defined points is selected, thereby identifying a confirmed installation point where a video security camera, different than an at least one substitutional camera, will be permanently installed.
Techniques for summarization of search results are provided. A similarity search query comprising at least one search criteria is received. The similarity search query is executed on at least one data source containing a plurality of images associated with metadata responsive to the search criteria. A plurality of search results response to the similarity search query is received from the at least one data source. The plurality of search results is clustered based on the metadata associated with the plurality of search results excluding the similarity criteria. The plurality of search results is summarized based on the results of the clustering. The summarization is displayed in a display view. An interactive user interface is provided to refine the plurality of search results based on the summarization.
Techniques for joining a subscriber device to a communications network are provided. A first subscriber device that is registered with a communications network receives a request from a second subscriber device that is not registered with the communications network to join the communications network. The request is received over a wireless link. The first subscriber device sends a request to the communications network for authorization for the second subscriber device to join the communications network. The first subscriber device receives from the communications network authorization for the second subscriber device to join the communications network. The authorization includes a set of connection parameters. The first subscriber device sends the set of connection parameters to the second subscriber device, over the wireless link. The second subscriber device joins the communications network using the connection parameters.
A method of constructing an antenna (105) of a portable communication device (100). The method includes wrapping a conductive element (210) around a flexible support (215), coupling the conductive element (210) and the flexible support (215) to a rigid connector (230) to assemble an antenna core (205), and coating the antenna core (205) with a room temperature vulcanizing (RTV) silicone layer (705). The method further includes fitting a first half (200A) of a silicone rubber sheath (200) and a second half (200B) of a silicone rubber sheath (200) around the antenna core (205), compression molding the first half (200 A) of the silicone rubber sheath (200) and the second half (200B) of the silicone rubber sheath (200) around the antenna core (205), and bonding, by the RTV silicone layer (705), the silicone rubber sheath (200) to the antenna core (205).
A method of constructing an antenna of a portable communication device. The method includes wrapping a conductive element around a flexible support, coupling the conductive element and the flexible support to a rigid connector to assemble an antenna core, and coating the antenna core with a room temperature vulcanizing (RTV) silicone layer. The method further includes fitting a first half of a silicone rubber sheath and a second half of a silicone rubber sheath around the antenna core, compression molding the first half of the silicone rubber sheath and the second half of the silicone rubber sheath around the antenna core, and bonding, by the RTV silicone layer, the silicone rubber sheath to the antenna core.
A process of updating workflows associated with a user based on a change in user's location. The workflow indicates that a trigger and a responsive action are respectively executed on a first physical device and a second physical device while the user is assigned to or physically present at a first location. The server detects that there is a change in user's location to a second location and responsively determines that a physical device selected from one of the first and second physical devices is no longer available for executing the workflow at the second location. The server identifies a third physical device capable of executing a workflow function previously executed by the selected physical device at the first location. The server then implements an updated workflow by replacing the selected physical device indicated in the workflow with the third physical device.
A method and system of engaging civilian participation in an incident scene investigation are provided, by registering a civilian communication device with a public safety server of a public safety agency; and granting access permission, from the PS server, for the registered civilian device to remotely control activation of a deactivated public safety communication device, such as a public safety body worn camera (PS BWC) at the incident scene.
H04W 76/50 - Connection management for emergency connections
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
H04W 12/082 - Access security using revocation of authorisation
82.
ELECTRONIC MEDIA REDACTION SYSTEM INCLUDING PERFORMANCE ANALYTICS
The present specification provides an electronic media redaction system including performance analytics. In an embodiment, a baseline redacted version of a media file is received, and a comparative redacted version of the media file is also received. A comparison is made between the comparative redacted version of the media file and the baseline redacted version of the media file. As a result of the comparison, a performance ranking is determined and a display is controlled to cause the performance ranking to be generated on the display.
The present specification provides an electronic media redaction system including performance analytics. In an embodiment, a baseline redacted version of a media file is received, and a comparative redacted version of the media file is also received. A comparison is made between the comparative redacted version of the media file and the baseline redacted version of the media file. As a result of the comparison, a performance ranking is determined and a display is controlled to cause the performance ranking to be generated on the display.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Techniques for dynamic redaction are provided. At least one object within a video to be redacted is identified. At least one region including the at least one object is redacted. The at least one redacted region including the at least one object and being larger than the at least one object. A tracked region being separate from the at least one object is identified. When the tracked region intersects with the at least one redacted region, the at least one redacted region is modified to un-redact portions of the at least one redacted region that overlap the tracked region.
A computer-implemented method and system for observation management of a drone is disclosed. The computer-implemented method includes generating suitability scores for at least first and second of potential drone flight paths that correspond to first and second out-of-Line Of Sight (LOS) time intervals. The computer-implemented method also includes generating a recommendation message that recommends one of the first and second potential drone flight paths as more suitable than one or more others of a plurality of potential flight paths for the drone.
A system for securely managing a plurality of hardware security modules (HSMs). One example provides a host device, a first HSM, and a second HSM. The host device is configured to designate the first HSM as a primary HSM, and activate a security association mode in the primary HSM. The first HSM is configured to generate a multi-HSM exchange key (“MEK”), and encrypt the MEK using a temporary key generated with a key agreement protocol between the first HSM and the second HSM. The first HSM shares the encrypted MEK with the second HSM via the host device. The host device deactivates the security association mode, and the first HSM receives a traffic encryption key (“TEK”). The first HSM encrypts the TEK using the MEK, and shares the encrypted TEK with the second HSM via the host device. The second HSM decrypts the TEK using the MEK.
A method, communication system, and two-way radio provide for improved voice controlled channel change through detection of a voice command input at the two-way radio to change a dispatch communication channel from a current channel to a target channel, the voice command including a target channel name. A computed channel change confidence level is compared to a channel change confidence threshold. The channel change confidence threshold(s) may be adaptively configured based on channel context parameters monitored by two-way radio itself and/or monitored by the system. User alerts, inquiries, and/or confirmation request are generated in response to m moderate channel change confidence levels.
Peak maximum current control for a wireless communication device. One example provides a radio including a radio frequency power amplifier (RFPA) (104) and a current measuring circuit (208) configured to sense a current provided to the RFPA (104). A comparator (212) is connected to the current measuring circuit (208). The comparator (212) is configured to compare a value indicative of the current provided to the RFPA (104) to a threshold and provide an output indicative of the comparison. The radio includes a switching circuit (224) configured to receive the output from the comparator (212) and generate an amount of attenuation based on the output. A Cartesian feedback loop is configured to receive the amount of attenuation and control the output of the RFPA (104).
An electronic processor (305) that is configured to perform a first voiceprint analysis of first audio data of a first call from a first caller to determine a first voiceprint of the first caller, and determine that the first voiceprint matches a first previously-stored voiceprint. The first previously-stored voiceprint identifies and is associated with first previously-stored information regarding a previous call from the first caller that is anonymized so as not to include a name of the first caller or a phone number of the first caller. The electronic processor (305) receives a permission command based on a user input from the first caller to indicate that a call taker handling the first call is allowed to have access to the first previously-stored information. The electronic processor (305) outputs the first previously-stored information on a call taker device (110) in response to receiving the permission command.
A method and apparatus for identifying an object type under a person's clothing is provided herein. During operation, an anomaly is detected and imaged by a camera based on a wrinkle pattern of a person's clothing. A distance, angle, and height are determined between the camera and the anomaly. Once the distance, angle, and height are determined, multiple images are generated that model various weapons under cloth for the particular distance, angle, and height. The various generated images are compared to an image of the detected anomaly to determine an image having a best match.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
Peak maximum current control for a wireless communication device. One example provides a radio including a radio frequency power amplifier (RFPA) and a current measuring circuit configured to sense a current provided to the RFPA. A comparator is connected to the current measuring circuit. The comparator is configured to compare a value indicative of the current provided to the RFPA to a threshold and provide an output indicative of the comparison. The radio includes a switching circuit configured to receive the output from the comparator and generate an amount of attenuation based on the output. A Cartesian feedback loop is configured to receive the amount of attenuation and control the output of the RFPA.
A method, communication system, and two-way radio provide for improved voice controlled channel change through detection of a voice command input at the two-way radio to change a dispatch communication channel from a current channel to a target channel, the voice command including a target channel name. A computed channel change confidence level is compared to a channel change confidence threshold. The channel change confidence threshold(s) may be adaptively configured based on channel context parameters monitored by two-way radio itself and/or monitored by the system. User alerts, inquiries, and/or confirmation request are generated in response to m moderate channel change confidence levels.
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
93.
METHOD AND APPARATUS FOR IDENTIFYING ITEMS UNDER A PERSON'S CLOTHING
A method and apparatus for identifying an object type under a person's clothing is provided herein. During operation, an anomaly is detected and imaged by a camera based on a wrinkle pattern of a person's clothing. A distance, angle, and height are determined between the camera and the anomaly. Once the distance, angle, and height are determined, multiple images are generated that model various weapons under cloth for the particular distance, angle, and height. The various generated images are compared to an image of the detected anomaly to determine an image having a best match.
Techniques for inter-agency recommended course of action are provided. An indication of an incident requiring a response from a first and a second public safety agency is received. An expected incident response based on standard operating procedures of the first and the second public safety agency is retrieved from a machine learning engine. A deviation from the expected incident response attributable to the second public safety agency is identified. A recommended course of action for the first public safety agency is retrieved from the machine learning engine. The recommended course of action based at least in part on historical incident responses. The recommended course of action is sent to the first public safety agency. Feedback related to the incident that includes when the recommended course of action was accepted and an incident outcome is received. The machine learning engine is updated based on the feedback.
Systems and methods for automated caller profile generation and identification. One example method includes receiving, from a service answering point, a service call from a caller. The method includes determining, with an electronic processor, based on a content of the service call, a call characteristic. The method includes generate a preliminary caller profile based on the call characteristic. The method includes comparing the preliminary caller profile to each of a plurality of existing caller profiles retrieved from a database storing caller profile data for a plurality of callers to generate, for each of the plurality of existing caller profiles, an association score based on the comparison. The method includes presenting data about the caller from the existing caller profile on a call-taking terminal of the service answering point assigned to the service call when the association score for one of the plurality of existing caller profiles exceeds an association threshold.
A communication system and method provide for tracking emotional state of a caller during a call center communication using artificial intelligence. A mental health answering point (102) interoperates with an artificial intelligence server (108) wherein the AI server is configured to: extract audio and text features from the call in real time. The AI server calculates and stores stress levels associated with the caller, from the extracted audio features, over time and synchronizes the stored stress levels with the extracted text features from the call. The stress levels are monitored during the call, and visual indicators are provided for high/increasing stress levels and low/decreasing stress levels.
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
An electronic processor that may be configured to perform a first voiceprint analysis of first audio data of a first call from a first caller to determine a first voiceprint of the first caller, and determine that the first voiceprint matches a first previously-stored voiceprint. The first previously-stored voiceprint may identify and be associated with first previously-stored information regarding a previous call from the first caller that is anonymized so as not to include a name of the first caller or a phone number of the first caller. The electronic processor may also receive a permission command based on a user input from the first caller to indicate that a call taker handling the first call is allowed to have access to the first previously-stored information. The electronic processor may output the first previously-stored information on a call taker device in response to receiving the permission command.
A retainer (10) includes a main body (26) having a top wall (30), a first side wall (34), a second side wall (38) spaced opposite the first side wall (34), a front wall (42), and a rear wall (46) spaced opposite the front wall (42) along a longitudinal axis. The walls define an interior cavity (50) sized and shaped to receive an accessory plug (14). The front wall (42) defines a front opening (58) that extends into the interior cavity (50) and is sized and shaped to receive a portion of a cable (18). The front wall (42) also includes a first hook (62) and a second hook (66) each positioned below the front opening (58). The rear wall (46) includes a third hook (70) extending forward into the interior cavity (50). The retainer (10) is moved forward linearly, and parallel to the longitudinal axis, to secure the hooks (62) to a portable communications device.
A computer-implemented method includes making an analytics-based determination that a water vessel has moved from one region to another region. The computer-implemented method also includes changing, within a security system and responsive to the determining, security monitoring of the water vessel from a first monitoring mode to a second monitoring mode, and the second monitoring mode being more sensitive than the first monitoring mode in relation to a measured velocity of the water vessel being a conditionally defined trigger for at least one analytics-based alarm within the security system.
Device, system and method for automatically replying to public-safety or enterprise-safety text messages is provided. A device receives, from a communication device, a text message indicative of: a given public-safety or enterprise-safety incident type; data documenting the given public-safety or enterprise-safety incident type; and a requested public-safety or enterprise-safety action associated with the given public-safety or enterprise-safety incident type. The device determines an implementable public-safety or enterprise-safety action for the given public-safety or enterprise-safety incident type based on the data. In response to determining, at the device, a difference between the requested public-safety or enterprise-safety action and the implementable public-safety or enterprise-safety action, the device: generates a reply text message identifying one or more of the implementable public-safety or enterprise-safety action and the difference; and transmits, to the communication device, the reply text message.