AU2013201326B2 - A Method and System for Generating a Report - Google Patents

A Method and System for Generating a Report

Info

Publication number
AU2013201326B2
AU2013201326B2 AU2013201326A AU2013201326A AU2013201326B2 AU 2013201326 B2 AU2013201326 B2 AU 2013201326B2 AU 2013201326 A AU2013201326 A AU 2013201326A AU 2013201326 A AU2013201326 A AU 2013201326A AU 2013201326 B2 AU2013201326 B2 AU 2013201326B2
Authority
AU
Australia
Prior art keywords
incident
report
details
processing system
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Revoked
Application number
AU2013201326A
Other versions
AU2013201326A1 (en
Inventor
Joseph Anthony Disano
Raymond John Touma
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CITY LIVE Pty Ltd
RCM GROUP Pty Ltd
Original Assignee
CITY LIVE Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=51583171&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=AU2013201326(B2) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by CITY LIVE Pty Ltd filed Critical CITY LIVE Pty Ltd
Priority to AU2013201326A priority Critical patent/AU2013201326B2/en
Assigned to CITY LIVE PTY LIMITED, RCM GROUP PTY LIMITED reassignment CITY LIVE PTY LIMITED Amend patent request/document other than specification (104) Assignors: RCM GROUP PTY LIMITED
Publication of AU2013201326A1 publication Critical patent/AU2013201326A1/en
Application granted granted Critical
Publication of AU2013201326B2 publication Critical patent/AU2013201326B2/en
Priority to AU2015213351A priority patent/AU2015213351A1/en
Priority to AU2017245284A priority patent/AU2017245284A1/en
Revoked legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method for generating an incident report associated with an incident, the method including the steps of, in a first processing system: receiving incident details; associating the incident details with a unique incident identifier; and, generating an incident report for authentication, the incident report including the unique incident identifier and the incident details. Figure 1 Receive Incident Details Associate Incident Details with Unique Incident 110 Identifier Generate Incident Report

Description

1 A Method and System for Generating a Report Field of the invention [001] The present invention relates to a method and system for generating a report. In particular, the method and system described herein relates to generating an incident report for emergency personnel such as police officers, or the like. Background of the invention [002] It is become apparent that many systems related to emergency responses such as systems that police officers, ambulance officers, fire fighters, and other emergency personnel use, are a combination of disparate systems which can cause errors to occur. [003] Thus for example, a police officer who is called out to an incident such as a traffic incident or the like will typically head out to the incident and make notes on a notepad and collect various evidence (if required) at the scene. The police officer must then go back to the office and write a report about the incident. To complete the report, the police officer will need to finalise witness statements and other information in relation to the incident before the report is then authenticated by a supervising officer and then filed against the case. [004] Thus, the report takes a long time to prepare and as the report is often completed some time after the incident, mistakes are common. In one example, some court cases have failed due to evidence not being complete or incorrectly compiled at the scene of the crime. Furthermore, Court records often include incorrect dates, missing charges, as well as incorrect criminal records of the people involved in particular incidents. This can have significant consequences and risks for the public as it can affect due process and the application of the rules of law and evidence. [005] Thus, there is required a system and method for generating a report which seeks to ameliorate or provide an alternative to existing arrangements. [006] Any reference herein to known prior art does not, unless the contrary indication appears, constitute an admission that such prior art is commonly known by those skilled in the art to which the invention relates, at the priority date of this application. Summary of the invention [007] There is provided herein, a method for generating an incident report associated with an incident, the method including the steps of, in a first processing system: receiving incident details; associating the incident details with a unique incident identifier; and, generating an incident report for authentication, the incident report including the unique incident identifier and the incident details.
2 [008] In one example, the unique incident identifier can be generated upon receipt of incident details. [009] The method can include receiving the incident details from a second processing system. [010] The second processing system can be a mobile device and the incident details are received in real-time. [011] The method can include receiving communication from the mobile device in relation to the incident details, the mobile device acting as a dumb-terminal. [012] The method can include receiving at least some of the incident details in a predetermined form, the predetermined form being generated in accordance with legislative requirements. [013] The method can further include: receiving a selection of an incident type or category; and, generating the form in accordance with the selection. [014] The incident can be related to a criminal or traffic offence. [015] The incident details can include any one or a combination of: Incident location information; and, personal information for one or more persons associated with the incident; [016] The one or more persons can include any one or combination of: one or more incident witnesses; one or more incident causers; and, one or more incident victims. [017] The location information can be automatically generated in accordance with a signal received in relation to the second processing system's global positioning system. [018] The personal information can include any one or a combination of: voice recordings; signed statements; image recordings; and, identification information. [019] The method can further include: requesting authentication of the incident report from an authenticator; and, receiving authentication of the report. [020] The method can further include requesting user identification information from a user second processing system, the user identification information being included in the incident report. [021] The method can further include: receiving a captured photographic image of a person; determining identification information associated with the person in accordance with the received photographic image, and, transmitting the identification information to a second processing system. [022] The method can include generating an authenticated report.
3 [023] The method can include receiving one or more requests for the authenticated report from one or more users. [024] There is further provided herein a system for generating an incident report associated with an incident, the system including a processing system, the processing system being configured to: receive incident details; associate the incident details with a unique incident identifier; and, generate an incident report for authentication, the incident report including the unique incident identifier and the incident details. [025] It will be appreciated that any of the features of the systems and methods described above can be provided in any manner of combinations. Brief description of the drawings [026] A detailed description of a preferred embodiment of a connection system and of a connector according to the invention is given hereinafter, while referring to figures 1 and 2. [027] Figure 1 is an example flow diagram which can give effect to an embodiment of the present invention; [028] Figure 2 is an example diagram of a distributed system which can give effect to an embodiment of the present invention; [029] Figures 3A and 3B are further examples of flow diagrams which can give effect to an embodiment of the present invention; [030] Figure 4 is a schematic of another example process of the present invention; and, [031] Figure 5 is an example schematic of a pre-determined form which can be used in the process of Figures 1, 3A or 3B. Detailed description of the embodiment or embodiments [032] Figure 1 shows an example of a method for generating an incident report. [033] The example of Figure 1 shows that at step 100 incident details (which can include one or more details associated with an incident) can be received. At Figure 110, the incident details are associated with the unique incident identifier. At step 120, an incident report is generated, which can include the unique incident identifier and the incident details. [034] The process of Figure 1 is typically implemented using a distributed system including a first processing system and a second processing system. An example of a distributed system is shown in Figure 2.
4 [035] In this example, a base station/server 201 is connected to a number of end or user stations 205 via a communications network 204 such as the internet, local area networks (LANs), wide area networks (WANs), computing clouds, or the like. Thus, the communication network 204 can allow the device 205 to communicate with the processing system 210 provided in a base station. [036] The base station 201 typically includes one or more processing systems 210, which can include one or more databases/data stores 211. In use, the process system 210 can be configured to allow the users of the device 205 to access particular information/data stored in the database 211. Notably, the database/data store 211 can be any form of data store such as, for example, cloud storage. [037] It will be appreciated that any form of suitable processing system 210/205 may be used. Typically, the processing systems 210, 205 may include a processor, a memory device, an input output device such as a keyboard and a display device, or the like. The processing systems 205, 210 may be in the form of large servers or small tablet or mobile devices such as (and not limited to) phone devices, laptops, server systems, desktop computers, camera (which can transmit images directly to the first processing system), or the like. It will also be appreciated that the processing systems 210, 205 may work independently or a part of the distributed system shown in Figure 2, when required. [038] In the examples which follow, the processing systems 210, 205 are typically one or more mobile devices and are referred to herein as the second processing system. The base station 201 is referred to herein as the first processing system. [039] Notably, according to one particular example, the mobile device used can be a dumb-terminal which communicates directly with the first processing system. Thus, the mobile device may not store any information (such as incident details or the like) on a memory device (such as a hard drive or cache) of the mobile device. It will be appreciated that this can improve the security of the system as no information is stored on the mobile device. [040] In one specific example, the process of Figure 1 is implemented by a device including the first processing system. The first processing system is typically a server system and the second processing system is typically a mobile device such as a mobile phone, a tablet, or any other mobile device which emergency personnel such as a police officer or the like can carry with them. [041] Thus, the generated incident report including the unique incident identifier and the incident details can be generated by the first processing system, where the first processing system is configured to store the incident report in a data store (such as the data store 211).
5 The first processing system is typically a server system or the like which can be back at the police station or part of a police distributed network. [042] Notably, in one particular example, the forms which are posted (via the mobile device) to the database (or data store as referred to herein) of the server, can be translated into several different classifications. Thus the incident report which is generated can include an evidence report, a statement, and any other type of report which may be required. [043] The unique incident identifier can be determined by the first processing system. In one particular example, a request can be sent from the user device to the first processing system in order to determine the unique incident identifier. Thus for example, if a police officer arrives at a scene where an incident has occurred, they can request a unique incident identifier from the first processing system, or be provided with a unique identifier associated with the incident, from the first processing system. In an alternative example, the police officer's own mobile device can provide the unique incident identifier in accordance with the particular incident which has occurred. Thus, any incident which occurs which is being recorded by a particular police officer, is associated with a unique incident identifier. [044] The method and systems described herein can also include requesting incident details in a predetermined form, where the predetermined form is generated in accordance with the legislative requirements. Thus for example the mobile device can request information from the user in accordance with the type of incident which has occurred. Thus, the user can select a type or category of incident which has occurred and the predetermined form will then be generated which requires the user to complete details in accordance with particular legislative requirements. [045] For example, if the incident is a traffic offence, the police officer on the scene can select the particular type or category of offence (or multiples offences) which may apply at that particular time. The mobile device can then generate a form that the police officer must then complete in order for the person to be charged with the particular traffic offence. Thus, as the predetermined form has been previously determined in accordance with legislative requirements, the police officer may then issue an infringement notice or the like at the site of the particular incident. Accordingly, the system and method described herein can include receiving a selection of a particular type or category of form depending on the incident type, generating a form in accordance with legislative requirements, completing the form and submitting the form accordingly. [046] Notably, the pre-determined form generated can include one or more check items, drop down menus for selecting various incident categories or types, legislation 6 guidelines, or the like. It will be appreciated that the form can be displayed to the user in any format. An example screenshot of a form which can be used is shown in Figure 5. [047] Thus for example, the incident details requested by the mobile device (and entered by a user) can include incident location information and personal information for one or more persons involved in the incident, in accordance with certain legislative requirements. [048] The one or more persons involved in the incident can be one or more incident witnesses, one or more incident causers, and or one or more incident victims. [049] The personal information included within the report can include voice recordings, signed statements, image recordings, and identification information in relation to the people involved in the incident. [050] Thus for example if a traffic offence has occurred, a police officer is able to use their mobile device to record the exact events which occurred at that particular time, witness information details including contact information, victim information details and the incident causes information details including license and registration information. [051] This can also include capturing photographic image of a person which was involved in the incident, transmitting the photographic image to the second processing system and receiving identification information associated with the person. Thus for example, the first processing system can be connected to a police database which includes information in relation to past personal records for a particular person. Accordingly, this can include photos of people which may have committed offences in the past. Thus, once the first processing system receives photographic information from the mobile device, the first processing system can proceed to compare the photographic image with other images in the data store and if matched to a particular image, provide identification information in relation to the person of concern. [052] Once an incident report is received by the first processing system, the first processing system can be configured to send a request for authentication of the incident report to an authenticator. The authenticator can be for example a supervising police officer who can read the report and authenticate the report and thus the first processing system can generate an authenticated report for storing in a data store. Thus, the first processing system can receive requests for the authenticated report from one or more users. This can include for example requests from lawyers, insurance firms, and Courts. [053] Notably, location information in relation to the location of the incident can be automatically generated in accordance with the signals received in relation to first global positioning systems.
7 [054] Alternatively, when an incident occurs, the first processing system may receive a notification that an incident has occurred. Thus, the first processing system can also receive incident location information and determine the unique incident identifier accordingly. The first processing system can also request the location of the second processing system, which is determined by the second processing system's global positioning system and thus the second processing system can respond to the first processing systems location request. Thus for example, if an incident occurs and this incident is called into the police station, the first processing system can determine the closest available mobile device to the incident and thus generate the unique incident identifier and send a notification to the mobile device that an incident has occurred. [055] Notably, the system and method can include requesting user identification information from a user of the device. Thus for example if a police officer is using a mobile device to entering incident information, the mobile device may first ask a police officer to enter in their user account details and password and may authorise and authenticate the police officer before they are able to use the device to record an incident. [056] Thus it will be appreciated that the presently described system and method can provide numerous advantages. In one particular example, when it comes to police officers and police stations, there is no need for a police officer to go back to the station to type out reports. The reports generated include real-time information and evidence is taken and put into the system at that particular time. Furthermore, the incident report is stored on a centralised system which can be accessed by various users at a later date, such as, for example, human resource professionals, investigators, insurance companies, legal and security professionals, court officers, and the like. Additionally, the system/method described herein can generate statistical data reports such as, for example, data in relation to a particular individual (for example data in respect of a police officer and how many arrests they have made, or alternatively in relation to particular victims, witnesses or criminals, various city locations and crime rates, and the like). [057] Thus for example, the report generated can include a plurality of different types of reports for different purposes and needs. Accordingly, once the incident details are received. Accordingly, an official police report can be generated, or an official insurance report or a report which can be used in a court case. [058] Thus, it will be appreciated that the presently described system and method can reduce costs and errors which are typically being introduced through complicated systems at police stations. [059] It will further be appreciated that although the examples used herein include examples related to police officers and police stations (and thus criminal or traffic offences), the 8 system described herein can be used by other industry groups such as in healthcare by hospitals, ambulance officers, fire-fighters, and the like. [060] Figure 3A shows a further example of how a police officer can interact with the system/method described herein. [061] At step 300, an incident occurs which is typically called into a police station or the like. At step 305, the first processing system (that is, the base station) checks via a location determination means who is the closest police officer to the location of the incident. In one particular example, the location determination means includes the mobile device's own global positioning system (GPS) signal to position the closest police officer. Once the GPS data is received by the system, latitude and longitude information can be determined to then determine the closest police officer to the location of the incident. Accordingly, the system can ping all mobile devices for GPS coordinates so that the closest device can be notified of the incident. [062] Thus, in one particular example, once it has been determined by the first processing system who the closest police officer is, the first processing system sends to that officer an incident notification, which can include basic details such as what has happened and the specific location of the incident. [063] Once at the location of the incident, the police offer can log into the system at step 315. At step 320, authorisation can be received from the server that the police officer who is accessing the system is allowed to access the system at that particular level. [064] At step 325, the officer can then select the type of incident which has occurred. The specific type of incident is typically aligned with an offence under legislation. Thus, this can include traffic or criminal offences. Once the selection of the type of incident has occurred, at step 330, the selection causes the creation of a predetermined form with specific requests of data from the police officer. The requests for data are required such that the evidentiary and factual requirements for the offence (as required by legislation and case law) are met. [065] At step 335, the officer completes the form together with the evidence required. This can include, attaching to the incident report witness statements, victim statements, the offender's statements, photographs of the incident and or people involved, voice recordings, and the like. [066] Thus, at step 340 the incident details are sent to the base station and at step 345 the details can be authenticated and stored, and a unique incident identifier is associated with the incident.
9 [067] Figure 3B is another example of a process which can be implemented by the system/method described herein. In this example, at step 350 a user of the system logs onto the system and is authorised and allowed access at step 355. [068] As described herein, the processes of Figures 1, 3A and 3B can be implemented via a distributed network as shown in Figure 2. It will be further appreciated that in one particular example, the data which is accessed by the user's mobile device 205 is not stored on the user's mobile device 205. That is, the data is immediately uploaded onto the server/ base station 201 in real-time. This can provide added security in relation to the data which is uploaded. Thus, for example, if the user's mobile device is misplaced or stolen, access to the data can only occur if authenticated by the server. The user's device does not, itself, hold any of the sensitive data. [069] Figure 4 shows another example of the system/method described herein. The example of Figure 4 shows a device at 400 which can request login authorisation from a user. The user is authorised access by the device 400 communicating with the server to determine whether the user is allowed access to the data at the server end by requesting user identification and password (or the like) and checking the user ID and password with the server. At step 410, an event manager (or user as described herein) can have different access levels for different modules depending on their specific user permissions. Thus, a user may be able to add, delete or view an event (referred to herein as an incident), run a person facial recognition search, run reports or message other users. At 420 an example of an event manager view is shown where an event can be added, edited or viewed. [070] At step 430 the event submission occurs by requesting certain details, images, voice recordings as evidence. The event is submitted, in this example, with user identification details which is connected to the user account of the event manager. The server can acknowledge the receipt of the submission, request authentication by an authenticator and allocate a unique event (or incident) identifier accordingly. Once the added incident is acknowledged and authenticated, the incident can be stored at the server for access by various users of the system. [071] At 440 an example of a base station is shown which can include an application servicer, an authentication server, a database server, and a hardware security module. Typically, the application data is sent to the application server where the data is checked and stored. Notably, once stored, the incident details can be date and time stamped at the server such that it can be determined at a later time, when the incident details were entered. [072] At step 470 an example is shown where the application data can be made available and used on a desktop computer (although it will be appreciated that any type of third party processing system can be used to view and access the report).
10 [073] Steps 460 and 470 show examples of facial recognition technology which can be used by the system/method described herein. In this example at 460, an event manager can access different modules, such as the facial recognition technology to access personal information in respect of a person. Thus, at 470 an example person search is carried out using license records of a person. [074] Accordingly, in Figure 4, at step 400, a user of the system logs onto the server via a hand held device such as a mobile device or the like. In this particular example, information is sent to the server. At 440 the server authenticates the user. At 410 the user now has access to security levels to enable add, delete, edit and view data. At 420 the user then adds, deletes, edits or views data via use of facial recognition, personal history, reports, location and messenger applications and submits to server 440, where at 440 the database acknowledges receipt of submission and authenticates with number allocation back to user. At 430 the user receives authentication and number allocation and at 440 server stores data and access allowed by valid users. [075] Thus, it will be appreciated that the system/method described herein can provide the following advantages: 1. Record intelligence - capture all core information, including nominal's, vehicles, locations and organisations. Additional information can be attached including images and video files 2. Management of Intelligence - manage intelligence in line with the Management of Police Information. 3. Linking - Easily link intelligence information with nominals, crimes, associates and other entities. Links can be viewed on a graphical chart to improve understanding of the situation. Accordingly, linking typically includes analysing the data in the database and drawing key lines with events, people, and the like. 4. Repeat Victims & Locations - the system and method described herein identifies repeat victims and locations in accordance with the victim's charter. This allows the agency to improve strategic planning and resource deployment to target nominals and addresses of particular interest. Accordingly, data posted in relation to various events/incidents can be gathered in a data base which can be searched across fields and data relationships. 5. Overt & Covert Tagging - tag individuals, vehicles, locations, organisations and groups to make sure they are monitored or that officers are alerted to pertinent issues surrounding the entity. Accordingly, the system and method described herein can allow for tagging of data records in the system and creating an electronic log book.
11 6. System Reporting - Improve workload and performance monitoring of individuals, officer submissions internally and produce reports or statistics required for electronic court and motor vehicle organisation submissions. 7. The system and method described herein can support the full crime investigation life cycle from recording and allocation through to investigation and filing. 8. Crime Recording - record all details relating to a crime, including all entities involved (nominals, locations, vehicles, organisations, property) and all other pertinent information. 9. Predetermined forms can speed up crime entry and improves data quality by guiding call handlers through the input process. 10. Modus Operandi recording - allows monitoring of criminal trends to help identify gang and criminal organisation grouping across the approved 1-5 classification. Accordingly, the database can draw upon various fields and data within the database and produce reports on various people and associations between the data fields. 11. Repeat Victims & Locations - the system and method described herein can identify repeat victims and locations in line with the victim's charter. This allows the agency to improve strategic planning and resource deployment to target nominals and addresses of particular interest. 12. Workload Management - customised workflow allows the system and method described herein to match any law enforcement agency's processes and procedures, speeding up the flow of information to the relevant personnel. 13. Command & Control integration - the system and method described herein integrates with third party Command & Control systems to allow the seamless transfer of incident information directly to the system, reducing duplication of response times. It will be appreciated that this can be provided as the server database can be linked to all systems at any point in time. 14. Reporting and statistics - The crime management software produces all necessary statistics. [076] Where ever it is used, the word "comprising" is to be understood in its "open" sense, that is, in the sense of "including", and thus not limited to its "closed" sense, that is the sense of "consisting only of". A corresponding meaning is to be attributed to the corresponding words "comprise", "comprised" and "comprises" where they appear.
12 [077] It will be understood that the invention disclosed and defined herein extends to all alternative combinations of two or more of the individual features mentioned or evident from the text. All of these different combinations constitute various alternative aspects of the invention. [078] While particular embodiments of this invention have been described, it will be evident to those skilled in the art that the present invention may be embodied in other specific forms without departing from the essential characteristics thereof. The present embodiments and examples are therefore to be considered in all respects as illustrative and not restrictive, and all modifications which would be obvious to those skilled in the art are therefore intended to be embraced therein.
AU2013201326A 2013-03-06 2013-03-06 A Method and System for Generating a Report Revoked AU2013201326B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
AU2013201326A AU2013201326B2 (en) 2013-03-06 2013-03-06 A Method and System for Generating a Report
AU2015213351A AU2015213351A1 (en) 2013-03-06 2015-08-13 A Method and System for Generating a Report
AU2017245284A AU2017245284A1 (en) 2013-03-06 2017-10-09 A Method and System for Generating a Report

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2013201326A AU2013201326B2 (en) 2013-03-06 2013-03-06 A Method and System for Generating a Report

Related Child Applications (1)

Application Number Title Priority Date Filing Date
AU2015213351A Division AU2015213351A1 (en) 2013-03-06 2015-08-13 A Method and System for Generating a Report

Publications (2)

Publication Number Publication Date
AU2013201326A1 AU2013201326A1 (en) 2014-09-25
AU2013201326B2 true AU2013201326B2 (en) 2015-06-11

Family

ID=51583171

Family Applications (3)

Application Number Title Priority Date Filing Date
AU2013201326A Revoked AU2013201326B2 (en) 2013-03-06 2013-03-06 A Method and System for Generating a Report
AU2015213351A Abandoned AU2015213351A1 (en) 2013-03-06 2015-08-13 A Method and System for Generating a Report
AU2017245284A Abandoned AU2017245284A1 (en) 2013-03-06 2017-10-09 A Method and System for Generating a Report

Family Applications After (2)

Application Number Title Priority Date Filing Date
AU2015213351A Abandoned AU2015213351A1 (en) 2013-03-06 2015-08-13 A Method and System for Generating a Report
AU2017245284A Abandoned AU2017245284A1 (en) 2013-03-06 2017-10-09 A Method and System for Generating a Report

Country Status (1)

Country Link
AU (3) AU2013201326B2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12094323B2 (en) * 2013-06-12 2024-09-17 Emergency Services Group International Inc. Mobile collection of sensitive information including tracking system and method
US11386514B2 (en) * 2020-05-20 2022-07-12 Motorola Solutions, Inc. Device, system and method for electronically requesting and storing missing digital evidentiary items

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120322401A1 (en) * 2011-06-20 2012-12-20 Lee Collins Method and application for emergency incident reporting and communication

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120322401A1 (en) * 2011-06-20 2012-12-20 Lee Collins Method and application for emergency incident reporting and communication

Also Published As

Publication number Publication date
AU2013201326A1 (en) 2014-09-25
AU2015213351A1 (en) 2015-09-03
AU2017245284A1 (en) 2017-11-02

Similar Documents

Publication Publication Date Title
US20150317368A1 (en) Computerized systems and methods for documenting and processing law enforcement actions
US8041743B2 (en) Systems and methods for providing semantically enhanced identity management
US6408304B1 (en) Method and apparatus for implementing an object oriented police patrol multifunction system
US9787849B2 (en) Public safety information management system with web-enabled devices
US20180197145A1 (en) Multi-stage service record collection and access
Ferguson Big data prosecution and brady
US20060271549A1 (en) Method and apparatus for central master indexing
US20140244312A1 (en) Systems and methods for providing insurance information exchange
Hollywood et al. Improving Information-Sharing Across Law Enforcement: Why Can't We Know?
US11348367B2 (en) System and method of biometric identification and storing and retrieving suspect information
US10880241B2 (en) Methods and systems for providing mobile consent verification
EP3479270A1 (en) Incident response analytic maps
WO2019200737A1 (en) Real estate data uploading method and apparatus, computer device, and storage medium
Zaytsev et al. Formation of a new strategy for crime investigation in the era of digital transformation
CN117273429A (en) Event monitoring method, system, electronic equipment and storage medium
WO2022221037A1 (en) Predictive response-generation systems to facilitate timely compliance with information-disclosure laws
Joh The Unexpected Consequences of Automation in Policing
AU2017245284A1 (en) A Method and System for Generating a Report
Machina et al. Crime analysis and intelligence system model design using Big Data
US10904720B2 (en) Deriving signal location information and removing private information from it
US20070061338A1 (en) System and method for countering abusive law enforcement and maintaining, managing and distributing information and reports regarding same
Ioimo Introduction to Criminal Justice Information Systems
KR101212730B1 (en) A system and method for protecting customers' security 24 hours a day through the use of a carry-on wireless data transmitting device and the data recording system of the company which is accessible through the internet.
US20230036423A1 (en) Method and Apparatus for Obtaining Identifying Information from Biometric Data
Halder Crowdsourcing crisis management platforms: a privacy and data protection risk assessment and recommendations

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
MAK Offer to surrender letters patent
MAL Surrender and revocation of letters patent

Effective date: 20171109