Crime investigation system
First Claim
1. A computer-implemented crime investigation system, comprising:
- at least one computer including a processor, said at least one computer operable to;
receive and store one or more image data items, each of which shows one or more suspects in the process of committing a suspected offence;
authenticate a user belonging to a first access group;
receive, via an application interface, case information from said user;
attach portions of said case information, as indicated by said user using said application interface, to one or more of said image data items, as also indicated by said user using said application interface;
search at least one of;
said image data items or said case information based on search parameters; and
return one or more search result image data items, having at least one of image data or attached case information which matches said search parameters, together with any of said case information attached to said search result image data items;
wherein the system is further operable to;
generate publications based on one or more of said image data items selected, via said application interface, by a user;
authenticate a user belonging to a publication approval access group;
update the case information attached to one or more “
approved for publication”
image data items that are selected by said user belonging to said publication approval access group, via said application interface, from said one or more stored image data items, so as to indicate that the approved image data items and their related case information have been approved for publication by said user belonging to said publication approval access group; and
wherein the system allows the generation of publications based on only image data items that have been approved for publication.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented crime investigation system having a computer including a processor is operable to: receive and store one or more image data items, each of which shows one or more offenders in the process of committing an offence; authenticate a user belonging to a first access group; receive, via an application interface, case information from said user; attach portions of said case information, as indicated by said user using said application interface, to one or more of said image data items, as also indicated by said user using said application interface; search at least one of: said image data items or said case information based on search parameters; and return one or more search result image data items, having at least one of image data or attached case information which matches said search parameters, together with any of said case information attached to said search result image data items.
-
Citations
18 Claims
-
1. A computer-implemented crime investigation system, comprising:
-
at least one computer including a processor, said at least one computer operable to; receive and store one or more image data items, each of which shows one or more suspects in the process of committing a suspected offence; authenticate a user belonging to a first access group;
receive, via an application interface, case information from said user;
attach portions of said case information, as indicated by said user using said application interface, to one or more of said image data items, as also indicated by said user using said application interface;search at least one of;
said image data items or said case information based on search parameters; andreturn one or more search result image data items, having at least one of image data or attached case information which matches said search parameters, together with any of said case information attached to said search result image data items; wherein the system is further operable to; generate publications based on one or more of said image data items selected, via said application interface, by a user; authenticate a user belonging to a publication approval access group; update the case information attached to one or more “
approved for publication”
image data items that are selected by said user belonging to said publication approval access group, via said application interface, from said one or more stored image data items, so as to indicate that the approved image data items and their related case information have been approved for publication by said user belonging to said publication approval access group; andwherein the system allows the generation of publications based on only image data items that have been approved for publication. - View Dependent Claims (2, 7, 8, 9, 10, 11, 12)
-
-
3. A computer-implemented crime investigation system, comprising:
-
at least one computer including a processor, said at least one computer operable to; receive and store one or more image data items, each of which shows one or more suspects in the process of committing a suspected offence; authenticate a user belonging to a first access group;
receive, via an application interface, case information from said user;
attach portions of said case information, as indicated by said user using said application interface, to one or more of said image data items, as also indicated by said user using said application interface;search at least one of;
said image data items or said case information based on search parameters; andreturn one or more search result image data items, having at least one of image data or attached case information which matches said search parameters, together with any of said case information attached to said search result image data items; wherein the system is further operable to; receive information relating to the possible identification of a plurality of suspects; attach the possible suspect identification information for each suspect to one of more of said image data items, which are indicated by a user using said application interface, so as to create one or more intelligence reports, each of which includes one or more image data items, any case information attached thereto, and possible suspect identification information, as indicated by the user, the system thereby creating a plurality of intelligence reports in response to said possible suspect identification information for said plurality of suspects; authenticate a user belonging to a distribution approval access group; and update one or more “
approved for distribution”
intelligence reports that are selected, via said application interface, by said user belonging to said distribution approval access group to indicate that they have been approved for distribution.- View Dependent Claims (4, 5, 6, 13, 14, 15, 16, 17, 18)
-
Specification