WO2000050983A1 - Incident reporting system and method - Google Patents

Incident reporting system and method Download PDF

Info

Publication number
WO2000050983A1
WO2000050983A1 PCT/US2000/004191 US0004191W WO0050983A1 WO 2000050983 A1 WO2000050983 A1 WO 2000050983A1 US 0004191 W US0004191 W US 0004191W WO 0050983 A1 WO0050983 A1 WO 0050983A1
Authority
WO
WIPO (PCT)
Prior art keywords
incident
witness
set forth
report
authority
Prior art date
Application number
PCT/US2000/004191
Other languages
French (fr)
Inventor
Marshall A. Sloo
Original Assignee
Sloo Marshall A
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sloo Marshall A filed Critical Sloo Marshall A
Priority to AU35995/00A priority Critical patent/AU3599500A/en
Priority to EP00914632A priority patent/EP1183592A4/en
Priority to CA002371898A priority patent/CA2371898A1/en
Publication of WO2000050983A1 publication Critical patent/WO2000050983A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99937Sorting

Definitions

  • the program preferably prompts the witness to enter the time and date the incident occurred, a full description of the incident, several key words that best describe the incident such as "robbery”, “speeding violation”, or “bad service”, the exact or general location of the incident, and an indication of whether physical or financial harm was done to the witness or others
  • the program may also prompt the witness to identify which law or rule the witness believes was violated as a result of the incident, or the program may automatically identify which law or rule was violated based on the other information entered by the witness or from other information such as information from past incident reports or even data that is collected independently by the system such as by video surveillance equipment.
  • the central computer 10 sends the supplemented incident report to the witness so that the witness can once again verify the accuracy of the report as depicted in step 108. If the witness wishes to further modify the report, the steps described above may be repeated as depicted in step 110.
  • the authority may be selected by the witness, automatically by the program, or a combination of the two. For example, if the witness observes a criminal activity such as a robbery, he or she may request that the incident report be sent to the local police. Or, if the witness does not know who the appropriate authority is, the program may automatically select the authority based on the information entered by the witness. For example, if the incident report involves a traffic violation, the program may automatically send the report to the traffic violations bureau of the local police. Similarly, if the witness requests to send the incident report to a particular authority such as the local police, the program may evaluate the information entered by the witness and determine that the incident report should also be sent to another authority such as the FBI.
  • the central computer 10 periodically contacts the authority through the communication network 14 to inquire whether the authority has acted on the incident report and to obtain information regarding the action taken. This information is then added to the incident report as depicted in step 126.
  • the program and the central computer 10 may also allow authorities to rule or take action on an incident report while on-line. For example, if the selected authority is a police officer or judge, that police officer or judge can review the incident report along with all other supporting reports as described below and then post a decision or issue an arrest warrant that is posted on a file in the central computer.
  • the program may also prompt the authority to enter a fine or judgment against the offending party in response to the authority's decision regarding the incident report.

Abstract

A computer-based method of collecting and processing incident reports received from witnesses (102) who observe incidents such as criminal acts and legal violations. The method automates the collection and processing of the incident reports and automatically sends the incident reports to the appropriate authority (116) so that the observed incidents can be acted on in an appropriate manner (124).

Description

WO 00/50983 PCTtUSOO/04191
INCIDENT REPORTING SYSTEM AND METHOD
BACKGROUND OF THE INVENTION
1. FIELD OF THE INVENTION
The present invention relates to a computer-based method of collecting and processing incident reports filed by witnesses who observe incidents such as criminal acts and legal violations. The method automates the collection and processing of the incident reports and automatically sends the incident reports to the appropriate authority so that the observed incidents can be acted on in an appropriate manner.
2. DESCRIPTION OF THE PRIOR ART
Citizens frequently observe criminal acts, legal violations, and other incidents that they wish to report to the appropriate authority or authorities. However, many people do not know who the appropriate authority is or how to contact them and therefore either report the incident to the wrong authority or fail to report the incident at all. Even when people know who the appropriate authority is, they often decide not to report their observations for fear of getting involved in a criminal matter. The 911 emergency telephone system has been developed in the United
States to provide a convenient way for citizens to report emergencies. However, this system is intended for use in emergencies only, not for reporting incidents in general.
Moreover, the 911 system is geographically limited in that each city or zone in the country must set up and operate its own emergency phone system. Moreover, 911 systems are expensive to operate because they rely upon human operators. Another problem with reporting incidents by telephone is that witnesses often fail to provide complete information about their observations because they are excited or in a hurry, making it difficult for the appropriate authority to accurately act on the observations.
OBJECTS AND SUMMARY OF THE INVENTION
The present invention solves the above-described problems and provides a distinct advance in the art by providing a computer-based method for receiving, collecting, and processing incident reports provided by witnesses. The method broadly includes the steps of receiving into a computer system an incident report from a witness who observed an incident committed by an offender; prompting the witness to provide certain types of information about the incident; selecting an appropriate authority to whom the incident report should be sent; and sending the incident report to the selected authority so that the authority can respond to the incident report. In preferred forms, additional information is added to the incident report either automatically by the computer system, by the authority to whom the incident report was sent, or by other persons who are allowed to access the incident report by way of a publicly searchable database.
The present invention encourages witnesses to submit incident reports because it allows them to remain anonymous and does not require them to know or identify to whom the incident report should be sent. Moreover, the invention improves the accuracy of incident reports because it does not rely upon human operators to collect the information and automatically prompts the witness to provide certain types of information about the incident that is needed to properly act on the incident. The invention further improves the reporting and processing of incidents by adding additional information to the incident report from other sources based on the information entered into the report by the witness to automatically obtain a more complete report of the incident.
BRIEF DESCRIPTION OF THE DRAWING FIGURES A preferred embodiment of the present invention is described in detail below with reference to the attached drawing figures, wherein:
Fig. 1 is a schematic representation of computer and communications equipment used to implement some of the steps of the present invention; and Fig. 2 is a flow chart illustrating the primary steps of the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
As illustrated in Fig. 1 , the method of the present invention is preferably implemented with a central computer 10, a plurality of user computers 12, and a communications network 14 for routing communications therebetween. The central computer is preferably a conventional file-server microcomputer such as those manufactured by Digital Equipment Corporation. The central computer includes conventional memory, input and output ports, and a modem or other communication device and is operable for receiving, storing and retrieving data and files as described below.
The user computers 12 are preferably personal computers such as IBM compatible microcomputers containing Intel Pentium type microprocessors but may also be "dumb" terminals with communication capabilities. Each user computer includes conventional memory, input and output ports, a modem and software for communicating with and interpreting data sent from the central computer 10. Those skilled in the art will appreciate that any number of user computers may be used with the present invention. The communications network 14 is preferably a conventional telecommunications network including a pluralityofswitches connected to corresponding local exchange carriers. The network may also be a local area network, wide area network, wireless network, voice network, or any other type of network operable for coupling the user computers 12 to the central computer 10. Private communications may be encrypted or otherwise protected before being transmitted over the communications network using available technology.
Those skilled in the art will appreciate that the method of the present invention may be implemented with virtually all types of hardware and that the preferred central computer 10, user computers 12 and communications network 14 are described merely to set forth one best mode of the invention. The method of the present invention is preferably implemented with a computer program that controls the operation of the central computer 10. The computer program may be stored in the read-only-memory (ROM) or hard drive memory of the central computer or on conventional external disks for transfer to the memory of the central computer. The data records including the incident reports associated with the method of the present invention are preferably stored in the hard drive memory of the central computer.
The computer program interface is preferably written in a Standard Generalized Mark-up Language (SGML) such as Hypertext language. The mark-up language cooperates with a standard server language such as Common Gateway Interface (CGI) or Practical Extraction and Report Language (PERL) for handling the various operating functions of the central computer 10. Those skilled in the art will appreciate that the computer program can be written in other computer languages as a matter of design choice. The steps in the method of the present invention are broadly illustrated in Fig. 2. The method permits a person who witnesses an incident to report the incident so that it can be acted on by the appropriate authority. The incident may be a criminal act such as the commission of a robbery, a legal violation such as a traffic violation, a consumer offense such as the sale of a defective product or the rendering of an unsatisfactory service by a business or restaurant, or any other observation made by a witness that the witness wishes to report. As described below, several witnesses may report information regarding the same incident.
The method begins when a witness uses one of the user computers 12 to contact the central computer 10 via the communication network 14 to report an incident. The initial access depicted in step 100 may include conventional log-on or connection for data transfer procedures. The central computer 10 then displays or transmits an initial message to the appropriate user computer 12 describing the function and capabilities of the automated incident reporting system. The computer program operating the central computer 10 next prompts the witness to fill out a complete incident report so that the central computer can process the report as depicted in step 102. For example, the program preferably prompts the witness to enter the time and date the incident occurred, a full description of the incident, several key words that best describe the incident such as "robbery", "speeding violation", or "bad service", the exact or general location of the incident, and an indication of whether physical or financial harm was done to the witness or others The program may also prompt the witness to identify which law or rule the witness believes was violated as a result of the incident, or the program may automatically identify which law or rule was violated based on the other information entered by the witness or from other information such as information from past incident reports or even data that is collected independently by the system such as by video surveillance equipment.
The program also preferably prompts the witness to identify any other potential witnesses who may also have observed the incident. If other potential witnesses are identified, the central computer attempts to contact them via the communications network and requests that they complete a separate incident report as described above. If other potential witnesses submit additional incident reports, all of the incident reports are combined into a single case as described in more detail below. To encourage the entry of accurate and honest information, the program may also ask the witness if he or she is willing to testify that the entered information is true and accurate and asks the witness if he or she is willing to be contacted about the incident report. To encourage the use of the incident reporting system by persons who do not wish to be known, the program also allows witnesses to remain anonymous, to designate portions of their witness report that they do not want disclosed to others, or to identify certain persons such as the perpetrator of the incident who they do not want to allow access to the incident report.
After the incident report has been fully completed, the program next prompts the witness to identify the offender or perpetrator of the incident as depicted in step 104. For example, when the incident is a criminal act or legal violation committed by an offender, the program preferably prompts the witness to enter identifying information such as the offender's name, address, physical description, license plate number, phone number, etc. Similarly, when the witness is a complaint against a company or other entity, the program preferably prompts the witness to enter identifying information such as the company's name, address, phone number, etc.
The program then attempts to make a positive identification of the offender based on the information entered by the witness. For example, if the witness enters the name and address of the offender, the central computer may access proprietary or publicly available databases such as phone directories, government databases, or Internet directories to confirm that the identified offender actually exists and that the information entered by the witness is accurate. The program may also use the information entered by the witness to collect additional identification information from these databases to supplement the incident report as depicted in step 106. If additional information is found, the program displays the information to the witness and prompts the witness to confirm that the correct person has been identified.
If the witness was not able to enter the name, address, or other information that would permit a positive identification of the offender, the program may access the above-described databases in an attempt to gather additional information that would permit a positive identification. For example, if the witness merely entered physical description information and the general vicinity of the incident, the program may search databases to identify persons who match the physical description and that live in the general vicinity of the incident. The program then displays a list of all persons matching the entered description, possibly including photographs of the persons, and asks the witness if any of the persons is the offender.
Even if the witness does not enter enough information and the program cannot discover enough additional information to permit a positive identification of the offender, the above identification processes are performed to obtain as much information as possible regarding the offender and to possibly narrow the list to include certain characteristics. For example, the identification process may narrow the list of suspected offenders to include only Caucasian males between the ages of 30 and 40 that are under 6' tall. As described in more detail below, this information may be used in connection with other information to make a positive identification of the offender.
The program may also supplement the incident report with other useful information such as addresses, names, etc. For example, if the witness reported an incident involving a company in a particular city but did not know the exact address and phone number of the company, the program may search the above-described databases to obtain the exact addresses and phone number of the company.
Each time the program supplements the incident report, the central computer 10 sends the supplemented incident report to the witness so that the witness can once again verify the accuracy of the report as depicted in step 108. If the witness wishes to further modify the report, the steps described above may be repeated as depicted in step 110.
After the witness and the program have entered all possible information into the incident report, the authority to whom the incident report should be sent is selected as depicted in step 112. The authority may be a local police department or prosecutors office, the FBI, CIA or other federal or governmental agency, a consumer group like the Better Business Bureau or any other group or agency that regularly receives such information.
The authority may be selected by the witness, automatically by the program, or a combination of the two. For example, if the witness observes a criminal activity such as a robbery, he or she may request that the incident report be sent to the local police. Or, if the witness does not know who the appropriate authority is, the program may automatically select the authority based on the information entered by the witness. For example, if the incident report involves a traffic violation, the program may automatically send the report to the traffic violations bureau of the local police. Similarly, if the witness requests to send the incident report to a particular authority such as the local police, the program may evaluate the information entered by the witness and determine that the incident report should also be sent to another authority such as the FBI. The program next contacts the appropriate authority via the communications network 14 and sends or otherwise makes the incident report available to the authority as depicted in steps 114 and 116. The authority may then supplement the incident report based on the information entered by the witness and the program to make the incident report more complete as depicted in step 118. The supplemented information may include information that is contained in proprietary databases available only to the authorities.
In addition to notifying specific authorities, the program may enable a witness to indicate that their report may be accessible by any and all qualified authorities. Interested authorities can then search the program for any and all reports that they are qualified to receive.
After the authority has supplemented the incident report, the authority is requested to send the supplemented report back to the central computer 10. Alternatively, the authority may be requested to supplement the report while on-line with the central computer 10 so that the master copy of the incident report always remains on the central computer. The central computerthen sends or otherwise makes available to the witness the supplemented incident report as depicted in step 120 so that the witness can once again verify the accuracy of the report, especially the supplemented information. If the witness wishes to further modify the report, the steps described above may be repeated as depicted in step 122. The authority then acts upon the incident report in a conventional manner as depicted by step 124. For example, the authority may build a case against the offender and arrest or penalize the offender once the authority has sufficient information and believes that the incident report involves a punishable matter.
The central computer 10 periodically contacts the authority through the communication network 14 to inquire whether the authority has acted on the incident report and to obtain information regarding the action taken. This information is then added to the incident report as depicted in step 126. The program and the central computer 10 may also allow authorities to rule or take action on an incident report while on-line. For example, if the selected authority is a police officer or judge, that police officer or judge can review the incident report along with all other supporting reports as described below and then post a decision or issue an arrest warrant that is posted on a file in the central computer. The program may also prompt the authority to enter a fine or judgment against the offending party in response to the authority's decision regarding the incident report. The program then automatically contacts the offending party and instructs the offending party how to pay the fine or meet the obligations of the judgment. The program may post the fine or judgment on a publicly searchable database as described below and may monitor whether the fine is paid or judgment is satisfied. If the offender who must pay the fine is a registered user as described below, the program may automatically debit the user's account in the amount of the fine.
The central computer 10 and corresponding program are also configured to permit third parties to obtain information about incidents reported by witnesses. To this end, and as depicted in step 128, the central computer stores incident reports in a publicly-searchable database to enable persons to monitor incidents in their communities and to encourage more witnesses to add information to an incident report. For example, if numerous persons witness an incident, the first witness to access the central computer 10 will file an incident report as described above. Then, as additional witnesses access the central computer to file an incident report, the central computer will recognize, based on the information entered, that the new incident reports involve the same incident as the first filed incident report. The central computer will then combine the information entered by the various witnesses into a single case and then allow all the witnesses to access the information in the case. This results in a more complete description of the incident because the information entered by one witness may refresh the memory of another, and vice versa, thus resulting in more accurate and complete incident reports.
The central computer 10 and corresponding computer program may also provide a warning system that alerts users to certain dangerous conditions based on incident reports and other information that has been previously entered and stored into the system. For example, if numerous incident reports have been filed regarding criminal activities in a certain geographic area, the central computer identifies this trend and posts a notice on a searchable database alerting persons who access the central computer to avoid the geographical area.
The computer program is also configured to encourage or discourage witnesses from submitting reports by predicting the outcome of an incident before the incident has actually been handled by a selected authority. To this end, the computer program may compare the information entered into an incident report to the information entered into past incident reports that have already been resolved. If the new incident report has similar facts as past incident reports, the program alerts the witness that he or she is likely to obtain a similar outcome as the past, similar incidents. In addition to allowing and encouraging witnesses to file incident reports, the present invention may obtain information regarding incidents by other means such as with surveillance cameras to supplement the incident reports and to provide confirmation of the observations of the witnesses. Use of video surveillance for compilation of information allows the gathering of information without requiring disclosure of certain personal information to other users. For example, a witness may be equipped with a video input system such as a personal surveillance camera and a display. When the witness encounters an incident such as a suspect committing a crime, the video input system would automatically recognize the suspect from the video input and could then display records for the suspect on the witness's hand held readout without revealing the suspect's identity. The witness would not need to know the identity of the suspect to observe the incident relating to the suspect. Such a system may overcome some of the problems associated with publicly revealing personal data.
To encourage the input of accurate and honest information regarding incidents, the central computer 10 may require that witnesses become registered users of the system before submitting incident reports. This permits the central computer to monitor and evaluate the submission of incident reports by each registered user to determine if any particular witness is filing false or misleading reports. For example, if a registered user continually files incident reports containing facts that cannot be verified or confirmed, the central computer may restrict that user's access to the system. The central computer and corresponding program may also calculate and record success rates or validity ratings for each user of the system and post these ratings in the searchable database to enable third parties and the selected authorities to assess the credibility of reports or other information reported by each particular user. The program may also rate authorities based on their actions or responses to incident reports to encourage them to participate in this system. Users of the system other than authorities may be prompted by the program to rate or indicate their satisfaction level with authorities and this information may be posted on the publicly searchable database to encourage accurate an honest participation by the authorities. Users may register with the central computer and still remain anonymous by being assigned a code or password. The code or password must be tied to some official identification such as the user's social security number so that the user cannot simply request new codes or passwords; however, the official identification is not provided to others accessing the central computer including the authorities and the other users of the system.
The central computer 10 and the corresponding computer program may provide private and anonymous communication between users of the system. For example, the system may include e-mail evidence capabilities that enable certified and anonymous communication between users that can be used as evidence to support an incident report or case. To provide accurate witnessing of reports, users who utilize the communication will have their regular e-mail address correspondence detoured through the system so that the central computer can identify the real e-mail address of the users. The central computer and corresponding program may also provide an "action processing interface" that is accessible only by authorities who have registered with the central computer. These authorities can access this interface and add notes and other communications to incident reports to assist the authority that is selected to respond to the incident reports as discussed above. A similar interface may be provided to allow other participants to add notes and other information to assist the select authority in responding to an incident report.
The central computer 10 preferably records the exact date and time that all incident reports and other data is entered so that the date and time of the information is certified by the central computer. Users may be charged a fee for submitting an incident report. This fee may be charged up-front or deducted from a user's account or shown in the account as due for later payment. Similarly, the system may pay rewards to users for the submission of certain types of incident reports. For example, if the authorities indicate that certain information that was submitted by a user was helpful in resolving a case, the central computer 10 may credit an award to the user's account. This reward may be posted on the central computer 10 before such information is submitted to encourage collection of the information. The rewards may be offered by anyone, including crime victims, authorities, orthe operator of the system of the present invention. Although the invention has been described with reference to the preferred embodiment illustrated in the attached drawing figures, it is noted that equivalents may be employed and substitutions made herein without departing from the scope of the invention as recited in the claims.
Having thus described the preferred embodiment of the invention, what is claimed as new and desired to be protected by Letters Patent includes the following:

Claims

CLAIMS:
1. A computer-based method of collecting and processing incidents observed by witnesses comprising the steps of: receiving into a computer system an incident report from a witness who observed an incident committed by an offender; prompting the witness to provide certain types of information about the incident; selecting an authority to whom the incident report should be sent; and sending the incident report to the selected authority so that the authority can respond to the incident report.
2. The method as set forth in claim 1 , the incident being selected from the group consisting of a criminal act, a legal violation, a sale of a defective product, and a rendering of an unsatisfactory service.
3. The method as set forth in claim 1 , further including the step of prompting the witness to enter into the incident report identification information identifying the offender.
4. The method as set forth in claim 1 , further including the step of receiving additional identification information identifying the offender and adding the additional identification information to the incident report.
5. The method as set forth in claim 4, the additional information being obtained by searching files accessible by the computer system based on the identification information entered by the witness.
6. The method as set forth in claim 4, the additional identification information being obtained by receiving the additional identification information from the authority based on the identification information entered by the witness.
7. The method as set forth in claim 1 , wherein the authority is automatically selected by the computer system based on information entered into the incident report by the witness.
8. The method as set forth in claim 1 , wherein the authority is selected by the witness.
9. The method as set forth in claim 1 , further including the step of receiving into the computer system an action report from the authority explaining the action the authority took in response to the incident report.
10. The method as set forth in claim 9, further including the step of storing the action report along with the incident report in a file accessible by the computer system.
11. The method as set forth in claim 1 , wherein incident reports from a plurality of different witnesses are received in the computer system.
12. The method as set forth in claim 11 , further including the step of storing the incident reports in a searchable database.
13. The method as set forth in claim 12, further including the step of permitting persons to access the searchable database to view the incident reports.
14. The method as set forth in claim 13, further including the step of receiving additional incident information from the persons that access the searchable database and adding the additional incident information to the incident reports to assist the authorities.
15. The method as set forth in claim 14, further including the step of sending the additional identification information to the witness.
16. The method as set forth in claim 15, further including the step of prompting the witness to update the incident report based on the additional identification information.
PCT/US2000/004191 1999-02-26 2000-02-17 Incident reporting system and method WO2000050983A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
AU35995/00A AU3599500A (en) 1999-02-26 2000-02-17 Incident reporting system and method
EP00914632A EP1183592A4 (en) 1999-02-26 2000-02-17 Incident reporting system and method
CA002371898A CA2371898A1 (en) 1999-02-26 2000-02-17 Incident reporting system and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/259,427 US7379879B1 (en) 1999-02-26 1999-02-26 Incident reporting system and method
US09/259,427 1999-02-26

Publications (1)

Publication Number Publication Date
WO2000050983A1 true WO2000050983A1 (en) 2000-08-31

Family

ID=22984903

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/004191 WO2000050983A1 (en) 1999-02-26 2000-02-17 Incident reporting system and method

Country Status (5)

Country Link
US (1) US7379879B1 (en)
EP (1) EP1183592A4 (en)
AU (1) AU3599500A (en)
CA (1) CA2371898A1 (en)
WO (1) WO2000050983A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100379773B1 (en) * 2000-05-03 2003-04-14 주식회사 인스아이닷컴 Method for providing accident witness information in insurance transaction on Internet and website system therefor
US8250025B2 (en) 2001-11-06 2012-08-21 Business Controls, Inc. Anonymous reporting system
WO2013093933A1 (en) * 2011-09-29 2013-06-27 Tata Consultancy Services Limited Rogue vehicle detection
DE102013007248A1 (en) 2013-04-19 2014-10-23 Rainer Lutze A procedure for collecting, aggregating, updating and disseminating post-paid, assessable, content-correctable and verifiable messages on public events of general interest
US9135598B2 (en) * 2001-11-06 2015-09-15 Excel Communications Anonymous reporting system
WO2019190725A1 (en) * 2018-03-30 2019-10-03 Captis Intelligence, Inc. Internet-based criminal investigation
US11409776B2 (en) 2002-11-05 2022-08-09 OneTrust, LLC Anonymous reporting system

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7493366B1 (en) * 2001-03-01 2009-02-17 Verizon Laboratories, Inc. System and method for processing customer requests relating to unsolicited commercial email and other service disruptions
US20040249701A1 (en) * 2003-04-22 2004-12-09 Schwarz Daniel A. Industry injury/safety, reporting and investigative system and method
US7469114B2 (en) 2005-01-18 2008-12-23 Seiko Epson Corporation Image forming apparatus and sheet feeding device in which weight exerted on lifting handles is equalized
CN101861579A (en) * 2007-11-17 2010-10-13 潘世爵 Apparatus, method and system for subsequently connecting people
US20090248643A1 (en) * 2008-03-26 2009-10-01 Wasson Leon F Crime information coordination system and method
US10943694B2 (en) * 2008-04-30 2021-03-09 Vitalclick Llc Automated incident response method and system
CA2897462A1 (en) 2009-02-11 2010-05-04 Certusview Technologies, Llc Management system, and associated methods and apparatus, for providing automatic assessment of a locate operation
US20120066139A1 (en) * 2010-09-09 2012-03-15 At&T Intellectual Property I, Lp Methods, Systems, and Processes for Identifying Affected and Related Individuals During a Crisis
US20120066345A1 (en) * 2010-09-14 2012-03-15 Cyril Rayan Emergency communications platform
US20120322401A1 (en) * 2011-06-20 2012-12-20 Lee Collins Method and application for emergency incident reporting and communication
US9773405B2 (en) 2013-03-15 2017-09-26 Cybersponse, Inc. Real-time deployment of incident response roadmap
US10063450B2 (en) * 2013-07-26 2018-08-28 Opentv, Inc. Measuring response trends in a digital television network
US10084995B2 (en) 2014-04-10 2018-09-25 Sensormatic Electronics, LLC Systems and methods for an automated cloud-based video surveillance system
US9426428B2 (en) 2014-04-10 2016-08-23 Smartvue Corporation Systems and methods for automated cloud-based analytics and 3-dimensional (3D) display for surveillance systems in retail stores
US9407881B2 (en) 2014-04-10 2016-08-02 Smartvue Corporation Systems and methods for automated cloud-based analytics for surveillance systems with unmanned aerial devices
US10217003B2 (en) 2014-04-10 2019-02-26 Sensormatic Electronics, LLC Systems and methods for automated analytics for security surveillance in operation areas
US9420238B2 (en) 2014-04-10 2016-08-16 Smartvue Corporation Systems and methods for automated cloud-based 3-dimensional (3D) analytics for surveillance systems
US11093545B2 (en) 2014-04-10 2021-08-17 Sensormatic Electronics, LLC Systems and methods for an automated cloud-based video surveillance system
US10057546B2 (en) 2014-04-10 2018-08-21 Sensormatic Electronics, LLC Systems and methods for automated cloud-based analytics for security and/or surveillance
US11120274B2 (en) 2014-04-10 2021-09-14 Sensormatic Electronics, LLC Systems and methods for automated analytics for security surveillance in operation areas
US9407880B2 (en) 2014-04-10 2016-08-02 Smartvue Corporation Systems and methods for automated 3-dimensional (3D) cloud-based analytics for security surveillance in operation areas
US9405979B2 (en) 2014-04-10 2016-08-02 Smartvue Corporation Systems and methods for automated cloud-based analytics and 3-dimensional (3D) display for surveillance systems
US9407879B2 (en) 2014-04-10 2016-08-02 Smartvue Corporation Systems and methods for automated cloud-based analytics and 3-dimensional (3D) playback for surveillance systems
US9686514B2 (en) 2014-04-10 2017-06-20 Kip Smrt P1 Lp Systems and methods for an automated cloud-based video surveillance system
US10643458B2 (en) 2014-11-18 2020-05-05 William Michael Smith Emergency service provision with destination-specific information
US10024684B2 (en) * 2014-12-02 2018-07-17 Operr Technologies, Inc. Method and system for avoidance of accidents
US20170316424A1 (en) * 2016-04-28 2017-11-02 1 Source OHS, Inc. Management solutions and related methods
US20170323232A1 (en) * 2016-04-29 2017-11-09 Lexmark International Technology Sarl System and Methods for Reporting and Managing Incidents Using Electronic Devices
US10074368B2 (en) 2016-08-17 2018-09-11 International Business Machines Corporation Personalized situation awareness using human emotions and incident properties
US10118612B2 (en) 2017-03-02 2018-11-06 Toyota Motor Engineering & Manufacturing North America, Inc. Vehicles, electronic control units, and methods for effecting vehicle changes based on predicted actions of target vehicles
US20220350969A1 (en) * 2018-12-06 2022-11-03 Motorola Solution, Inc. Method and system to ensure a submitter of an anonymous tip remains anonymous
US20220366141A1 (en) * 2021-05-13 2022-11-17 Motorola Solutions, Inc. System and method for predicting a penal code and modifying an annotation based on the prediction

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6043813A (en) * 1992-08-06 2000-03-28 Raytheon Company Interactive computerized witness interrogation recording tool
US6065000A (en) * 1996-07-19 2000-05-16 Star Solutions & Consulting Services Computer-implemented process of reporting injured worker information

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4458109A (en) 1982-02-05 1984-07-03 Siemens Corporation Method and apparatus providing registered mail features in an electronic communication system
US4582959B1 (en) 1984-06-05 2000-02-01 At & T Information Systems Inc Message waiting alerting method
US5216603A (en) 1985-11-18 1993-06-01 Action Technologies, Inc. Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants
US4750119A (en) 1986-10-10 1988-06-07 Tradevest, Inc. Purchasing system with rebate feature
JPH063934B2 (en) 1986-11-25 1994-01-12 株式会社日立製作所 Automatic reminder system
US4972461A (en) 1989-09-20 1990-11-20 At&T Bell Laboratories Call message delivery system and method
US5185697A (en) * 1989-11-14 1993-02-09 Electronic Warfare Associates, Inc. Apparatus and method for managing crisis situations
US5253165A (en) 1989-12-18 1993-10-12 Eduardo Leiseca Computerized reservations and scheduling system
JP3177684B2 (en) 1991-03-14 2001-06-18 株式会社日立製作所 Email system
US6178413B1 (en) * 1998-05-20 2001-01-23 Technolines, Llc Database program with automatic creation of user features
US5510978A (en) * 1994-01-26 1996-04-23 Vera Institute Of Justice Electronic apparatus for implementing community policing program and method therefor
US5535383A (en) 1994-03-17 1996-07-09 Sybase, Inc. Database system with methods for controlling object interaction by establishing database contracts between objects
US5483442A (en) * 1994-07-12 1996-01-09 Investigator Marketing Inc. Accident documentation system
CA2128122A1 (en) 1994-07-15 1996-01-16 Ernest M. Thiessen Computer-based method and apparatus for interactive computer-assisted negotiations
US5668953A (en) 1995-02-22 1997-09-16 Sloo; Marshall Allan Method and apparatus for handling a complaint
US5812795A (en) * 1996-01-19 1998-09-22 Lucent Technologies Inc. Automatic addressing of messages and message components of different media
US5758328A (en) * 1996-02-22 1998-05-26 Giovannoli; Joseph Computerized quotation system and method
US6173284B1 (en) * 1997-05-20 2001-01-09 University Of Charlotte City Of Charlotte Systems, methods and computer program products for automatically monitoring police records for a crime profile
US6405213B1 (en) * 1997-05-27 2002-06-11 Hoyt M. Layson System to correlate crime incidents with a subject's location using crime incident data and a subject location recording device
US5983238A (en) * 1997-12-26 1999-11-09 Diamond Id Gemstons identification tracking and recovery system
US7330817B1 (en) * 2000-08-11 2008-02-12 Employment Law Compliance, Inc. System and methods for employment law compliance, establishment, evaluation and review
US20020143595A1 (en) * 2001-02-05 2002-10-03 Frank Theodore W. Method and system for compliance management
US20020116247A1 (en) * 2001-02-15 2002-08-22 Tucker Kathleen Ann Public-initiated incident reporting system and method
US9135598B2 (en) * 2001-11-06 2015-09-15 Excel Communications Anonymous reporting system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6043813A (en) * 1992-08-06 2000-03-28 Raytheon Company Interactive computerized witness interrogation recording tool
US6065000A (en) * 1996-07-19 2000-05-16 Star Solutions & Consulting Services Computer-implemented process of reporting injured worker information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1183592A4 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100379773B1 (en) * 2000-05-03 2003-04-14 주식회사 인스아이닷컴 Method for providing accident witness information in insurance transaction on Internet and website system therefor
US8250025B2 (en) 2001-11-06 2012-08-21 Business Controls, Inc. Anonymous reporting system
US9135598B2 (en) * 2001-11-06 2015-09-15 Excel Communications Anonymous reporting system
US11409776B2 (en) 2002-11-05 2022-08-09 OneTrust, LLC Anonymous reporting system
WO2013093933A1 (en) * 2011-09-29 2013-06-27 Tata Consultancy Services Limited Rogue vehicle detection
US9262914B2 (en) 2011-09-29 2016-02-16 Tata Consultancy Services Limited Rogue vehicle detection
DE102013007248A1 (en) 2013-04-19 2014-10-23 Rainer Lutze A procedure for collecting, aggregating, updating and disseminating post-paid, assessable, content-correctable and verifiable messages on public events of general interest
WO2019190725A1 (en) * 2018-03-30 2019-10-03 Captis Intelligence, Inc. Internet-based criminal investigation

Also Published As

Publication number Publication date
AU3599500A (en) 2000-09-14
EP1183592A1 (en) 2002-03-06
US7379879B1 (en) 2008-05-27
EP1183592A4 (en) 2005-11-16
CA2371898A1 (en) 2000-08-31

Similar Documents

Publication Publication Date Title
US7379879B1 (en) Incident reporting system and method
US8086525B2 (en) Methods and systems for providing risk ratings for use in person-to-person transactions
US7689505B2 (en) Card management system and method
US8098804B1 (en) Systems and methods for call treatment using a third party database
US7958032B2 (en) Generating event messages corresponding to event indicators
US10109173B2 (en) Person of interest location confirmation system
US20020069084A1 (en) Method and system for countering terrorism and monitoring visitors from abroad
US20090319361A1 (en) Web-based communication system
WO2010121026A2 (en) Advanced warning
WO2008064467A1 (en) Identity theft protection and notification system
WO2007002089A2 (en) Identity information services, methods, devices, and systems
US8380589B2 (en) Methods and apparatus for real estate foreclosure bid computation and presentation
US8027916B2 (en) Method and apparatus for screening financial transactions
JP2016151894A (en) Corporation information creation device, corporation information providing device, corporation information recording medium, and corporation information providing system
Federal Trade Commission Data Breach Response: A Guide for Business (2021)
CN1719480A (en) Finance account safety system
US20020059246A1 (en) Method of distributing information to emergency personnel
KR100368921B1 (en) method for providing credit information management service using an internet
WO2001055921A1 (en) Personal information data storage system and its uses
CN110210989A (en) A kind of security risk reporting system and its method
WO2006053398A1 (en) Time and attendance management system
DIRECTORS KCJIS NEWS
JP2015179531A (en) system and method for managing parking rights
Carey Probation Terms
JP2002183367A (en) Method and device for processing personal information protecting service business

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2371898

Country of ref document: CA

Ref country code: CA

Ref document number: 2371898

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 2000914632

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2000914632

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2000914632

Country of ref document: EP