Patent classifications
G06Q50/26
PRIORITIZING UTILITIES INFRATRUCTURE
A method of maintaining a plurality of infrastructure components as part of a transmission network for a utility service in a defined geographic region having associated environmental characteristics, wherein each infrastructure component is deployed at a location in the region having associated one or more location characteristics and is of a component type having associated one or more infrastructure characteristics. The method including for each infrastructure component, executing a classifier based on one or more of the infrastructure characteristics, the location characteristics, and the environmental characteristics to forecast a measure of susceptibility of the infrastructure component to one or more operational impediments. The method further includes selecting an infrastructure component based on the forecast susceptibilities and deploying one or more mitigation measures for the selected infrastructure component to mitigate one or more operational impediments to which the selected component is determined to be susceptible based on the forecast susceptibilities.
PRIORITIZING UTILITIES INFRATRUCTURE
A method of maintaining a plurality of infrastructure components as part of a transmission network for a utility service in a defined geographic region having associated environmental characteristics, wherein each infrastructure component is deployed at a location in the region having associated one or more location characteristics and is of a component type having associated one or more infrastructure characteristics. The method including for each infrastructure component, executing a classifier based on one or more of the infrastructure characteristics, the location characteristics, and the environmental characteristics to forecast a measure of susceptibility of the infrastructure component to one or more operational impediments. The method further includes selecting an infrastructure component based on the forecast susceptibilities and deploying one or more mitigation measures for the selected infrastructure component to mitigate one or more operational impediments to which the selected component is determined to be susceptible based on the forecast susceptibilities.
DIGITAL CONSOLIDATION
The invention relates to information representation, exchange, validation, and utilization. Embodiments of the invention enable a fully digital shared information reality: an information fabric, in which unlimited numbers of participants can all permanently access (with access controls) information objects that all participants can trust and verify, according to a universal set of protocols that are logically complete, address all stages of information exchange, and enable convincing, persuasive user experience. We disclose foundational embodiments that include methods to properly record, store, communicate and display information in digital form; computational verification and validation of information; and foundational concepts in human-information interaction. The invention teaches that by using unique digital objects, numerous difficulties and inefficiencies in state-of-the-art information exchange are overcome, and the next stage of digital transformation is enabled. Embodiments discussed include Next-Generation Digital Documents, Universal User Interface and Application Programming Interface for physical objects and devices, and user-friendly digital signatures.
DIGITAL CONSOLIDATION
The invention relates to information representation, exchange, validation, and utilization. Embodiments of the invention enable a fully digital shared information reality: an information fabric, in which unlimited numbers of participants can all permanently access (with access controls) information objects that all participants can trust and verify, according to a universal set of protocols that are logically complete, address all stages of information exchange, and enable convincing, persuasive user experience. We disclose foundational embodiments that include methods to properly record, store, communicate and display information in digital form; computational verification and validation of information; and foundational concepts in human-information interaction. The invention teaches that by using unique digital objects, numerous difficulties and inefficiencies in state-of-the-art information exchange are overcome, and the next stage of digital transformation is enabled. Embodiments discussed include Next-Generation Digital Documents, Universal User Interface and Application Programming Interface for physical objects and devices, and user-friendly digital signatures.
SYSTEM AND METHOD FOR DETERMINING AN INTERIM LIFE SAFETY MEASURE (ILSM) FOR ONE OR MORE SMOKE COMPARTMENTS IN A FACILITY
A system and method for determining an interim life safety measure (ILSM) for one or more smoke compartments in the facility is disclosed. The system analyzes potential risk factors associated with individuals in one or more smoke compartments of facility, based on type of smoke compartments. Further, the system classifies assets associated with smoke compartments into risk levels, based on asset classes and/or location environment associated assets comprising risk levels. Additionally, system assigns risk assessment scores to inspection points corresponding to classified assets. Furthermore, the system determines ILSMs. The ILSM is health and safety measure to protect individuals at facility. Additionally, system creates maintenance work orders and/or corrective work orders, based on determined ILSMs. Further, system outputs, to user device, notifications corresponding to status of created maintenance work orders and/or corrective work orders. The notifications inform user to provide instructions for creating order and inform user to monitor status.
METHODS AND SYSTEMS FOR FACILITATING LOCATING AN INDIVIDUAL BASED ON UHF RFID TAGS
The present invention provides a method and a system for receiving a search request from at least one user device associated with at least one user; generating a search command based on the search request; transmitting the search command to the server to and return data associated with at least one RFID reader device; receiving the response data from the at least one RFID reader device; processing at least one of the response data and the search request; determining a location data associated with at least one individual based on the processing; generating an alarm based on the location data; transmitting at least one of the location data and the alarm to the at least one user device; and storing the search request, the search command, the response data, and the location data.
911 Call Enhancement
Novel tools and techniques are provided for implementing enhanced 911 call functionalities. In various embodiments, in response to receiving a 911 call request from a caller using a calling device associated with an originating telephone number (“TN”), a computing system may determine whether a user profile associated with the caller and/or the originating TN contains registered third parties on a 911 call notification list. Based on a determination that the user profile contains at least one registered third party on the 911 call notification list associated with the caller and/or the originating TN, the computing system may send a message to each of the at least one registered third party indicating that the caller has called 911, and/or may establish a listen-in only bridged connection, a full bridge connection, or a shared communication to the 911 call for each registered third party.
911 Call Enhancement
Novel tools and techniques are provided for implementing enhanced 911 call functionalities. In various embodiments, in response to receiving a 911 call request from a caller using a calling device associated with an originating telephone number (“TN”), a computing system may determine whether a user profile associated with the caller and/or the originating TN contains registered third parties on a 911 call notification list. Based on a determination that the user profile contains at least one registered third party on the 911 call notification list associated with the caller and/or the originating TN, the computing system may send a message to each of the at least one registered third party indicating that the caller has called 911, and/or may establish a listen-in only bridged connection, a full bridge connection, or a shared communication to the 911 call for each registered third party.
Application marketplace for transportation services platform
A transportation platform interfaces with various entities of a transportation system, which may execute instances of a common transportation operating systems. Third-party applications access data and other transportation systems subject to regulatory restrictions of a government agency. Third party applications may perform useful functions and provide interfaces to users of the transportation system or administrators. Data from third-party applications may be added to a transportation database and used by other applications, such as according to purchase agreements.
Application marketplace for transportation services platform
A transportation platform interfaces with various entities of a transportation system, which may execute instances of a common transportation operating systems. Third-party applications access data and other transportation systems subject to regulatory restrictions of a government agency. Third party applications may perform useful functions and provide interfaces to users of the transportation system or administrators. Data from third-party applications may be added to a transportation database and used by other applications, such as according to purchase agreements.