Browse Prior Art Database

Method to automatically setup a defensive Geofence for vulnerable objects nearby an event

IP.com Disclosure Number: IPCOM000247203D
Original Publication Date: 2016-Aug-16
Included in the Prior Art Database: 2016-Aug-16
Document File: 3 page(s) / 570K

Publishing Venue

Motorola

Related People

Kangkai Zhao: AUTHOR [+5]

Abstract

When an event happens, some vulnerable objects should be well protected. In this publication, we provide a method to identify and set up a precautionary Geofence for vulnerable locations according to an event type and evolve the precautionary Geofence into a defensive Geofence once the event Geofence affects it.

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 60% of the total text.

Method to automatically setup a defensive Geofence for vulnerable objects nearby an event

By Zhao Kangkai, Tian Yong, Zhao Dong, Fei Xun, Chen Dajun

Motorola Solutions

 

ABSTRACT

When an event happens, some vulnerable objects should be well protected. In this publication, we provide a method to identify and set up a precautionary Geofence for vulnerable locations according to an event type and evolve the precautionary Geofence into a defensive Geofence once the event Geofence affects it.

PROBLEM

Some events, like a riot, a wildfire, or a flood can spread.

However, some locations near the event require additional protection. For example, a wildfire should be kept away from an oil refinery; a riot must be kept away from a hospital, a national museum, gun shop, etc.

There is a need to automatically set up a Geofence for vulnerable objects according to an event type that is in close proximity to an event, and evolve the Geofence according to changes in the event makeup.

SOLUTION

1.    Correlate event type and corresponding vulnerable objects.

2.    Identifying vulnerable objects when an event happens.

3.    Setting up a precautionary Geofence for vulnerable objects.

4.    When the precautionary Geofence is affected by the event, it evolves into a defense Geofence.

OPERATION

1.    Build a correlation table of incident type and corresponding vulnerable objects. Vulnerable objects can be created and updated from history data, big data analysis and live feedback according to incident type.

Incident Type

Vulnerable objects

Riot

Gun Shop, Bank, Museum, Luxury store

Fire

Gas station, Oil refinery, Chemical factory

Flood

Hospital, School, Museum

…….

2.    When an event happens, vulnerable objects in the vicinity will be identified according to the above table.

Vicinity range of the event is determined by event severity. More serious concerns will result in a larger range.

For example, a riot happens: 50 people with knives. Gun Shop, Bank, Museum, Luxury stores within 2 miles are vulnerable objects. They will be identified on the map.

3.    A precautionary Geo...