Technique for creating incident-specific credentials at the scene of a large-scale incident or WMD event
First Claim
Patent Images
1. An incident management system, comprising:
- a check-in computer system, wherein the check-in computer system is utilized to read information from a plurality of pre-existing identification (ID) cards, and wherein the check-in computer system utilizes at least a portion of the information read to create personal, portable incident-specific credentials for persons responding to an incident; and
a portable data terminal configured to read the personal, portable incident-specific credentials, wherein the terminal communicates with the check-in computer system to provide current assignments of personnel responding to an incident such that the personnel can be tracked.
2 Assignments
0 Petitions
Accused Products
Abstract
An incident management system includes a check-in computer system and a portable data terminal. The check-in computer system is utilized to read information from a plurality of pre-existing identification (ID) cards and utilize at least a portion of the information to create an incident-specific credential for each person responding to an incident. The portable data terminal is configured to read the incident-specific credentials and communicate with the check-in computer system to provide current assignments of personnel responding to an incident such that the personnel can be tracked.
110 Citations
29 Claims
-
1. An incident management system, comprising:
-
a check-in computer system, wherein the check-in computer system is utilized to read information from a plurality of pre-existing identification (ID) cards, and wherein the check-in computer system utilizes at least a portion of the information read to create personal, portable incident-specific credentials for persons responding to an incident; and a portable data terminal configured to read the personal, portable incident-specific credentials, wherein the terminal communicates with the check-in computer system to provide current assignments of personnel responding to an incident such that the personnel can be tracked. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An incident management system, comprising:
-
a check-in computer system, wherein the check-in computer system is utilized to read information from a plurality of pre-existing identification (ID) cards, and wherein the check-in computer system utilizes at least a portion of the information read to create personal, portable incident-specific credentials for persons responding to an incident; a portable data terminal configured to read the personal, portable incident-specific credentials; and a command computer system in communication with the terminal, wherein the terminal communicates with the command computer system to provide current assignments of personnel responding to an incident such that the personnel can be tracked. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An incident management system, comprising:
-
a check-in computer system, wherein the check-in computer system is utilized to read information from a plurality of pre-existing identification (ID) cards, and wherein the check-in computer system utilizes at least a portion of the information read to create personal, portable incident-specific credentials for persons responding to an incident; and a portable data terminal configured to read the personal, portable incident-specific credentials, wherein the terminal communicates with the check-in computer system to provide current assignments of personnel responding to an incident such that the personnel can be tracked, and wherein at least a portion of the information stored on the personal, portable incident-specific credentials is stored in a machine-readable format and a text format. - View Dependent Claims (26, 27, 28, 29)
-
Specification