G08B25/006

Real time camera map for emergency video stream requisition service
20230079451 · 2023-03-16 ·

A system provides a transformed video stream from, a publicly or privately owned and operated camera bearing on an in-scope location vicinity, to, a responding emergency service agency (ESA). A request from an emergency services agent's display terminal includes location indicia and elicits a map of cameras bearing on the location vicinity as well as other display terminals in the area. Upon request, an application programming interface enables a video stream to comply with the privacy and access settings of the camera owner/operators. A plurality of private and public security surveillance cameras is coupled to a server. Exterior/street view video images are streamed to the server which may contact an owner for emergency access. An emergency agency vehicle at a location has a display for a selected gallery of obfuscated exterior/street views from cooperative networks of public and private security cameras bearing on the vicinity of an incident.

Method and system for situational awareness for emergency response

Disclosed are systems and methods for sending emergency alerts. In some embodiments, sensors and wearable devices may trigger and send the emergency alerts and/or warning signals via available communication devices. Multi-media emergency alerts are also disclosed that include situational awareness information for effective and efficient emergency response.

Emergency information delivery

Various systems described herein may allow a user's personal information, such as their medical history, to be automatically delivered to appropriate emergency personnel in response to a reported emergency, such as a 911 call, activation of a smoke alarm or security system, or other emergency. Various items of personal and confidential information may be stored in a secure location, and the user may provide advanced approval to have the information automatically delivered to emergency responders in response to a request for emergency assistance. For example, after the user initiates a request for emergency assistance, a computing device may determine whether the user has granted approval for emergency delivery of the user's confidential information, and if such approval has been granted, the computing device may request the delivery of the user's confidential information to the emergency responders.

Event-based responder dispatch

Dispatch-aiding communications between computing devices of a responder and a dispatch unit include a computing device of the responder determining that an event occurred, automatically sending an indication of the event to a computing device of the dispatch unit, receiving a request for information from the computing device of the dispatch unit, obtaining the information requested by the computing device of the dispatch unit, and sending the information requested by the computing device of the dispatch unit to the computing device of the dispatch unit. The computing device of the dispatch unit sends the request for information to the computing device of the responder in response to receiving the indication of the event.

Autonomous vehicle DoS resistant communication system using acoustic communications
11637860 · 2023-04-25 · ·

A method includes determining, by a vehicle, a failure with a computer or telecommunications system operating in the vehicle and when a failure is detected, activating an acoustic system on the vehicle, detecting a vibration by the vehicle; and transmitting an audible signal responsive to the detecting step. The audible signal may include words in a human vocabulary.

Systems to infer identities of persons of interest rapidly and alert first responders

Systems, devices, and technical methods of the present disclosure leverage digital visitor logs from confinement facilities to identify people of interest that may be involved in incidents to which first responders are dispatched. When a phone call is received at phone public safety access point, a first query including a name associated with the call is transmitted to a digital visitor log for a confinement facility. A digital response to the first query identifies a visitee who was visited by a visitor by that name while the visitee was in confinement. The visitee's name is then transmitted in a second query to a digital repository containing release records; a digital response indicates the visitee was released before the call was received. An electronic notification that identifies the visitee is transmitted to a device associated with an agent who is responding to the call.

DETECTING LIFE BY MEANS OF CO2 IN AN ENCLOSED VOLUME
20230123053 · 2023-04-20 ·

In a system and method for detecting carbon dioxide in an enclosed volume, a CO2 detection system is triggered to awaken from a deep sleep state. Once awake, the system queries system sensors to determine the current system parameters, including current CO2 level and temperature. Current and expected CO2 decay rates are calculated, and the system determines whether the current CO2 decay rate is within an expected normal range for an unoccupied enclosed volume. If the volume is static, i.e., not moving, and the CO2 rate is rising and the temperature is rising, a series of alerts are sent to contacts previously set up by the user. If the alerts are not cleared by a user, emergency management personnel are notified.

Occurrence-record driven monitoring system and method of use thereof
11600166 · 2023-03-07 ·

Systems and methods for monitoring event through the use of occurrence records in order to take one or more actions are described herein. An occurrence record is received and processed. The occurrence record includes one or more parameters and are indicative of an event of a given type. The received occurrence record is compared to one or more trigger-based rules. When a trigger condition of a trigger-based rule is met, the trigger-based rule is executed. When one or more other conditions of the executed trigger-based rule is met, a command for an action is generated.

INDIVIDUALIZED REAL-TIME USER INTERFACE FOR EVENTS
20230113078 · 2023-04-13 ·

A computing system can determine a subset of users being affected by an event occurring in a given area based on data received from one or more monitoring services. For each respective user of the subset of users, the system can generate a live dashboard providing real-time, localized contextual information of the event for a location corresponding to the respective user. The system can further transmit content data to the computing device of the respective user, the content data causing the live dashboard to be presented on a computing device of the respective user.

Community-based security system

A server accesses a security system profile of a first security system. The security system profile identifies a plurality of sensors connected to the first security system. The server identifies a second security system based on at least a first sensor of the plurality of sensors coupled to the first security system. The server then generates a notification sharing profile for the first security system based on the security system profile. The notification sharing profile indicates that the second security system corresponds to the first sensor. A first event triggered by the first sensor causes a first notification to the second security system.