SlideShare une entreprise Scribd logo
1  sur  21
Deployed with various government security agencies, including:- Police, Border
control, Highway Patrol, Covert Intelligence & Army
Android feature rich mobile security
application suite, with:-
•Encrypted Voice & SMS calls
•SOS Alerts
•Photo & Video auto-upload evidence
gathering
•Location & tracking
•ANPR – Automatic Number Plate
Recognition
•Fingerprint recognition
•CCTV integration
All linked to a central PC base and / or
mobile tablet based Command Portal
ROK Mobile Group Ltd 2013 Confidential
ENCRYPTED COMMUNICATIONS
SITUATIONAL AWARENESS
INFORMATION SHARING
OFFICER SAFETY & SECURITY
INCREASED EFFICIENCY & PRODUCTIVITY
ROK Mobile Group Ltd 2013 Confidential
RHS is specifically built for Android devices to create:
- a ‘future-proof’ service with continuity of technology
avoiding manufacturer ties
- simple to use application with easy user acceptance
- an application that runs securely on standard consumer
devices enabling both overt and covert usage
Command Portal
(Web Based Admin Portal)Application
ROK HOMELAND SECURITY
RHS consists of two, fully integrated parts:
ROK Mobile Group Ltd 2013 Confidential
ROK HOMELAND SECURITY
APPLICATION SUITE
ROK Mobile Group Ltd 2013 Confidential
A suite of mobile applications combining multiple
technologies to securely share information in video,
photo, voice and text formats instantly.
Delivering tamper proof evidence in photo and video
format to HQ and colleagues in real time.
Providing Fingerprint and Number Plate database
searches immediately to the mobile.
Improving safety and positional awareness of
colleagues with locate and SOS functions and aiding
deployment of individuals and teams.
Increasing efficiency, productivity, resource
deployment.......resulting in time and cost savings
ApplicationFunctionality
SOS ALERTS
Alerts
SOS Alerts created with a
single touch of the SOS
button on the application
interface.
SOS function then instantly
transmits alert to all
colleagues and HQ,
including:
- a map showing officer location
& directions
- longitude and latitude co-
ordinates.
-An ‘open channel’ voice message
of up to 500 seconds – started
automatically when the SOS
is pressed
ROK Mobile Group Ltd 2013 Confidential
ApplicationFunctionality
Photo and video evidence is automatically
uploaded from the RHS app.
Images include location, date / time stamp.
Securely stored in access controlled tamper
proof vaults on the Command Portal.
Images can be exported into separate case
and evidence files
Evidence Gathering
& Scenes of crime
ROK Mobile Group Ltd 2013 Confidential
- RHS handsets integrate
with existing video surveillance systems, providing real-time
situational awareness
- Camera list updated depending on location
- Cameras selectable from a map or a list view
- ‘Frame grab’ can be taken from CCTV feeds.
ApplicationFunctionality
CCTV
ROK Mobile Group Ltd 2013 Confidential
Secure voice and text features
allows for confidential discussions
between groups.
This mitigates the risk of highly
sensitive telephone
communications being intercepted.
Encrypted to 128 bit or 256 bit
AES level
The groups can be easily
configured for pre-defined teams
and colleagues .
ApplicationFunctionality
Encrypted Voice
& Text Communications
ROK Mobile Group Ltd 2013 Confidential
- Mobile-to-mobile live video streaming
- Any mobile can stream video to pre-defined colleague
teams in high quality and real time
- RHS also streams live video back to Command Portal
-
ApplicationFunctionality
Live Video Streaming
ROK Mobile Group Ltd 2013 Confidential
ApplicationFunctionality
ROK Locate
Handsets provide real-time
positions to colleagues and
Command Portal / HQ on
an interactive map display.
Virtual breadcrumbs can be
dropped at points of
interest to be revisited at a
later date.
Enables locating &
tracking of officers to aid
deployment, incident
response and officer safety.
ROK Mobile Group Ltd 2013 Confidential
ApplicationFunctionality
Automatic Number Plate
Recognition
• Server side functionality compares number plate data
against a ‘hot list’ and returns vehicle status to the
handset user
• Short and long range features available
• Manual number plate entry option for low light conditions
Scan vehicle number plates and query against
a connected or on-device vehicle number plate
database
ROK Mobile Group Ltd 2013 Confidential
ApplicationFunctionality
Fingerprints
Connected bluetooth reader transmits fingerprint to the
mobile for scrutiny and database check
Server side functionality compares fingerprint data
against a criminal (or other) database and returns
information to the handset user.
Enabling quick and efficient roadside or location
based identifying of individuals.
Fingerprints can be scanned
and checked against a
connected database
ROK Mobile Group Ltd 2013 Confidential
Accessed using a PC, laptop or mobile tablet,
the Command Portal allows complete access
management and visibility of information and
communications over a highly encrypted link.
Command Portal access can be based on
hierarchical permissions to allow multiple
layers of control.
Provides communication, deployment ability
and access to information.
Handsets can be located, managed and wiped
of all data from the Command Portal at any
time.
ROK HOMELAND
___SECURITY___
COMMAND PORTAL
ROK Mobile Group Ltd 2013 Confidential
• A map is available showing handset user’s location;
• Alerts provide location via GPS, cellular triangulation
& Wi-Fi;
• RHS also provides an audio recording from the
handset;
• Command Portal secure messaging allows
management to efficiently communicate with the
appropriate support;
• View alert groupings to establish trends and ‘hot
spots’;
RHS SOS
& Alerts
View a log of SOS alerts
with GPS location and audio
CommandPortalFeatures
ROK Mobile Group Ltd 2013 Confidential
• Command Portal users can create incidents
providing detailed reports to users in the field;
• Incident alerts can be sent to individual users,
groups, or users within a radius of a chosen
location;
RHS Raise
Incidents
Create and send incident alerts to
individuals or groups
Enabling deployment of individuals.
CommandPortalFeatures
ROK Mobile Group Ltd 2013 Confidential
RHS Locate
CommandPortalFeatures
• Handset users can be located from the
Command Portal;
• Location data can be filtered by user,
date, accuracy and more;
• Location can show map or satellite
views;
Locate single handset
users or groups
ROK Mobile Group Ltd 2013 Confidential
RHS Tracking
CommandPortalFeatures
• Track users’ location via GPS, cellular triangulation
& Wi-Fi;
• View user defined position markers (breadcrumbs);
• Tracking may be disabled;
• Command Portal can filter tracking by user, date,
and location accuracy;
ROK Mobile Group Ltd 2013 Confidential
• Upload of third party media to the Command Portal;
• Media can be securely transmitted to individual users
or groups.
RHS Media Push
Send media (images, video, sound
files) directly to the handset from
the Command Portal
Command Portal allows:
CommandPortalFeatures
ROK Mobile Group Ltd 2013 Confidential
• Geo Monitoring audibly notifies and zooms in
to users location when SOS is raised
• Google Earth provides detailed and accurate
locations
Geo Monitoring
CommandPortalFeatures
ROK Mobile Group Ltd 2013 Confidential
A real-time Geo Monitoring solution
allowing Command Portal operatives to
receive status and positional updates
from handset users
• Activate audio recordings from the handset
• Remotely activate handset to record audio from the
Command Portal
• Concealed application to ensure the safety of handset
users
Covert
CommandPortalFeatures
Disguised app on device enables locate
and track, SOS and audio recording from
the handset.
ROK Mobile Group Ltd 2013 Confidential
RHS
Administration
Full control of handsets,
users and groups from
the Command Portal
From the Command Portal:
CommandPortalFeatures
• Add / remove RHS handsets
to the system;
• Remotely wipe RHS handsets;
• Allocate RHS handsets to
users;
• Assign users to individual or
multiple groups;
• Define group administration
access and settings;ROK Mobile Group Ltd 2013 Confidential

Contenu connexe

Tendances

Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenspjpallen
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocationmoduledesign
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
Wave oncloud 5000_customer_presentation_greg_parker_6.7.17
Wave oncloud 5000_customer_presentation_greg_parker_6.7.17Wave oncloud 5000_customer_presentation_greg_parker_6.7.17
Wave oncloud 5000_customer_presentation_greg_parker_6.7.17Greg Parker
 
Wave oncloud customer_presentation_6.7.17
Wave oncloud customer_presentation_6.7.17Wave oncloud customer_presentation_6.7.17
Wave oncloud customer_presentation_6.7.17Greg Parker
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Kabilen Sornum
 
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessJosef Noll
 
Vampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetVampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetBooz Allen Hamilton
 
Near field communication
Near field communicationNear field communication
Near field communicationanshu kumari
 
Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition) Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition) Massimiliano Pellegrini
 
802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentationAdvantec Distribution
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009servicesmobiles.fr
 
Application of near field communication (nfc)
Application of near field communication (nfc)Application of near field communication (nfc)
Application of near field communication (nfc)Vijay Thakkar
 
SOTP_Introduction
SOTP_IntroductionSOTP_Introduction
SOTP_IntroductionJohnson Wu
 

Tendances (19)

Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Lecture 6 geolocation
Lecture 6 geolocationLecture 6 geolocation
Lecture 6 geolocation
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Wave oncloud 5000_customer_presentation_greg_parker_6.7.17
Wave oncloud 5000_customer_presentation_greg_parker_6.7.17Wave oncloud 5000_customer_presentation_greg_parker_6.7.17
Wave oncloud 5000_customer_presentation_greg_parker_6.7.17
 
Wave oncloud customer_presentation_6.7.17
Wave oncloud customer_presentation_6.7.17Wave oncloud customer_presentation_6.7.17
Wave oncloud customer_presentation_6.7.17
 
Cl matrix-comsec-pvt-ltd
Cl  matrix-comsec-pvt-ltdCl  matrix-comsec-pvt-ltd
Cl matrix-comsec-pvt-ltd
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new business
 
Vampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product SheetVampire Tactical Forensic Device - Product Sheet
Vampire Tactical Forensic Device - Product Sheet
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Hotel Technology
Hotel TechnologyHotel Technology
Hotel Technology
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition) Introducing SAFR (Secure Accurate Face Recognition)
Introducing SAFR (Secure Accurate Face Recognition)
 
802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation802.11ac 5th gen_channel_presentation
802.11ac 5th gen_channel_presentation
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009
 
Sentry PODS
Sentry PODSSentry PODS
Sentry PODS
 
Application of near field communication (nfc)
Application of near field communication (nfc)Application of near field communication (nfc)
Application of near field communication (nfc)
 
Nfc
NfcNfc
Nfc
 
SOTP_Introduction
SOTP_IntroductionSOTP_Introduction
SOTP_Introduction
 

En vedette

La_Pyayt_Win_Yee_RHCSA
La_Pyayt_Win_Yee_RHCSALa_Pyayt_Win_Yee_RHCSA
La_Pyayt_Win_Yee_RHCSAdavid win
 
Lecheria latinoamericana principales drivers
Lecheria latinoamericana principales driversLecheria latinoamericana principales drivers
Lecheria latinoamericana principales driversFedegan
 
Evaluation Excercise
Evaluation ExcerciseEvaluation Excercise
Evaluation Excercisepereznelson
 
Frc comm stem event
Frc comm stem eventFrc comm stem event
Frc comm stem eventtshannon49
 
John 6 commentary
John 6 commentaryJohn 6 commentary
John 6 commentaryGLENN PEASE
 
Social media strategy (1107 0500)
Social media strategy (1107 0500)Social media strategy (1107 0500)
Social media strategy (1107 0500)yuki_shino
 
Stages of Recovery
Stages of RecoveryStages of Recovery
Stages of RecoverySoberlink
 
Ley 1273 2009
Ley 1273 2009 Ley 1273 2009
Ley 1273 2009 wipise
 
Cadena lactea uruguay
Cadena lactea uruguayCadena lactea uruguay
Cadena lactea uruguayFedegan
 
24 Hours of Reality - Talking Points
24 Hours of Reality - Talking Points24 Hours of Reality - Talking Points
24 Hours of Reality - Talking PointsMarkus Lang
 
Inge G. A. Herbert Hearing Notice
Inge G. A. Herbert Hearing NoticeInge G. A. Herbert Hearing Notice
Inge G. A. Herbert Hearing NoticeJohn Rust
 

En vedette (17)

La_Pyayt_Win_Yee_RHCSA
La_Pyayt_Win_Yee_RHCSALa_Pyayt_Win_Yee_RHCSA
La_Pyayt_Win_Yee_RHCSA
 
Lecheria latinoamericana principales drivers
Lecheria latinoamericana principales driversLecheria latinoamericana principales drivers
Lecheria latinoamericana principales drivers
 
Evaluation Excercise
Evaluation ExcerciseEvaluation Excercise
Evaluation Excercise
 
Replica Arequipa 1
Replica Arequipa 1Replica Arequipa 1
Replica Arequipa 1
 
Frc comm stem event
Frc comm stem eventFrc comm stem event
Frc comm stem event
 
dispositivos
 dispositivos dispositivos
dispositivos
 
Formato laboratorios01
Formato laboratorios01Formato laboratorios01
Formato laboratorios01
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
Proyecto de vida
Proyecto de vidaProyecto de vida
Proyecto de vida
 
Politica educativa
Politica educativaPolitica educativa
Politica educativa
 
John 6 commentary
John 6 commentaryJohn 6 commentary
John 6 commentary
 
Social media strategy (1107 0500)
Social media strategy (1107 0500)Social media strategy (1107 0500)
Social media strategy (1107 0500)
 
Stages of Recovery
Stages of RecoveryStages of Recovery
Stages of Recovery
 
Ley 1273 2009
Ley 1273 2009 Ley 1273 2009
Ley 1273 2009
 
Cadena lactea uruguay
Cadena lactea uruguayCadena lactea uruguay
Cadena lactea uruguay
 
24 Hours of Reality - Talking Points
24 Hours of Reality - Talking Points24 Hours of Reality - Talking Points
24 Hours of Reality - Talking Points
 
Inge G. A. Herbert Hearing Notice
Inge G. A. Herbert Hearing NoticeInge G. A. Herbert Hearing Notice
Inge G. A. Herbert Hearing Notice
 

Similaire à ROK Homeland Security App Suite

Omniscout Corporate Overview
Omniscout Corporate OverviewOmniscout Corporate Overview
Omniscout Corporate OverviewDavidGimza
 
The Mobile Worker / The Mobile Enterprise
The Mobile Worker / The Mobile EnterpriseThe Mobile Worker / The Mobile Enterprise
The Mobile Worker / The Mobile Enterprisehwarfield
 
Leantegra Real-Time Location System
Leantegra Real-Time Location SystemLeantegra Real-Time Location System
Leantegra Real-Time Location SystemJulia Danby
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile IntelligenceRichard Blech
 
Proximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceProximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceRichard Blech
 
Secure it mobile_comms
Secure it mobile_commsSecure it mobile_comms
Secure it mobile_commswangqiang6100
 
Nightingale_Security_Digital_Brochure
Nightingale_Security_Digital_BrochureNightingale_Security_Digital_Brochure
Nightingale_Security_Digital_BrochureTal Turner
 
Cognia mobile recording information sheet
Cognia mobile recording information sheetCognia mobile recording information sheet
Cognia mobile recording information sheetCognia
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solutionHexnode
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingSaraPia5
 
2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - AvayaMark Fletcher, ENP
 
AnyConnect Gateway by Eyeball Networks
AnyConnect Gateway by Eyeball NetworksAnyConnect Gateway by Eyeball Networks
AnyConnect Gateway by Eyeball NetworksEyeball Networks
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways Array Networks
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 

Similaire à ROK Homeland Security App Suite (20)

Omniscout Corporate Overview
Omniscout Corporate OverviewOmniscout Corporate Overview
Omniscout Corporate Overview
 
Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)
 
The Mobile Worker / The Mobile Enterprise
The Mobile Worker / The Mobile EnterpriseThe Mobile Worker / The Mobile Enterprise
The Mobile Worker / The Mobile Enterprise
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
Finance
FinanceFinance
Finance
 
Leantegra Real-Time Location System
Leantegra Real-Time Location SystemLeantegra Real-Time Location System
Leantegra Real-Time Location System
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile Intelligence
 
Proximity LLC Mobile Intelligence
Proximity LLC Mobile IntelligenceProximity LLC Mobile Intelligence
Proximity LLC Mobile Intelligence
 
Android project-APP ENFORCEMENT LOCK
Android project-APP ENFORCEMENT LOCKAndroid project-APP ENFORCEMENT LOCK
Android project-APP ENFORCEMENT LOCK
 
Secure it mobile_comms
Secure it mobile_commsSecure it mobile_comms
Secure it mobile_comms
 
Nightingale_Security_Digital_Brochure
Nightingale_Security_Digital_BrochureNightingale_Security_Digital_Brochure
Nightingale_Security_Digital_Brochure
 
Cognia mobile recording information sheet
Cognia mobile recording information sheetCognia mobile recording information sheet
Cognia mobile recording information sheet
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya
 
AnyConnect Gateway by Eyeball Networks
AnyConnect Gateway by Eyeball NetworksAnyConnect Gateway by Eyeball Networks
AnyConnect Gateway by Eyeball Networks
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

ROK Homeland Security App Suite

  • 1. Deployed with various government security agencies, including:- Police, Border control, Highway Patrol, Covert Intelligence & Army Android feature rich mobile security application suite, with:- •Encrypted Voice & SMS calls •SOS Alerts •Photo & Video auto-upload evidence gathering •Location & tracking •ANPR – Automatic Number Plate Recognition •Fingerprint recognition •CCTV integration All linked to a central PC base and / or mobile tablet based Command Portal ROK Mobile Group Ltd 2013 Confidential
  • 2. ENCRYPTED COMMUNICATIONS SITUATIONAL AWARENESS INFORMATION SHARING OFFICER SAFETY & SECURITY INCREASED EFFICIENCY & PRODUCTIVITY ROK Mobile Group Ltd 2013 Confidential RHS is specifically built for Android devices to create: - a ‘future-proof’ service with continuity of technology avoiding manufacturer ties - simple to use application with easy user acceptance - an application that runs securely on standard consumer devices enabling both overt and covert usage
  • 3. Command Portal (Web Based Admin Portal)Application ROK HOMELAND SECURITY RHS consists of two, fully integrated parts: ROK Mobile Group Ltd 2013 Confidential
  • 4. ROK HOMELAND SECURITY APPLICATION SUITE ROK Mobile Group Ltd 2013 Confidential A suite of mobile applications combining multiple technologies to securely share information in video, photo, voice and text formats instantly. Delivering tamper proof evidence in photo and video format to HQ and colleagues in real time. Providing Fingerprint and Number Plate database searches immediately to the mobile. Improving safety and positional awareness of colleagues with locate and SOS functions and aiding deployment of individuals and teams. Increasing efficiency, productivity, resource deployment.......resulting in time and cost savings
  • 5. ApplicationFunctionality SOS ALERTS Alerts SOS Alerts created with a single touch of the SOS button on the application interface. SOS function then instantly transmits alert to all colleagues and HQ, including: - a map showing officer location & directions - longitude and latitude co- ordinates. -An ‘open channel’ voice message of up to 500 seconds – started automatically when the SOS is pressed ROK Mobile Group Ltd 2013 Confidential
  • 6. ApplicationFunctionality Photo and video evidence is automatically uploaded from the RHS app. Images include location, date / time stamp. Securely stored in access controlled tamper proof vaults on the Command Portal. Images can be exported into separate case and evidence files Evidence Gathering & Scenes of crime ROK Mobile Group Ltd 2013 Confidential
  • 7. - RHS handsets integrate with existing video surveillance systems, providing real-time situational awareness - Camera list updated depending on location - Cameras selectable from a map or a list view - ‘Frame grab’ can be taken from CCTV feeds. ApplicationFunctionality CCTV ROK Mobile Group Ltd 2013 Confidential
  • 8. Secure voice and text features allows for confidential discussions between groups. This mitigates the risk of highly sensitive telephone communications being intercepted. Encrypted to 128 bit or 256 bit AES level The groups can be easily configured for pre-defined teams and colleagues . ApplicationFunctionality Encrypted Voice & Text Communications ROK Mobile Group Ltd 2013 Confidential
  • 9. - Mobile-to-mobile live video streaming - Any mobile can stream video to pre-defined colleague teams in high quality and real time - RHS also streams live video back to Command Portal - ApplicationFunctionality Live Video Streaming ROK Mobile Group Ltd 2013 Confidential
  • 10. ApplicationFunctionality ROK Locate Handsets provide real-time positions to colleagues and Command Portal / HQ on an interactive map display. Virtual breadcrumbs can be dropped at points of interest to be revisited at a later date. Enables locating & tracking of officers to aid deployment, incident response and officer safety. ROK Mobile Group Ltd 2013 Confidential
  • 11. ApplicationFunctionality Automatic Number Plate Recognition • Server side functionality compares number plate data against a ‘hot list’ and returns vehicle status to the handset user • Short and long range features available • Manual number plate entry option for low light conditions Scan vehicle number plates and query against a connected or on-device vehicle number plate database ROK Mobile Group Ltd 2013 Confidential
  • 12. ApplicationFunctionality Fingerprints Connected bluetooth reader transmits fingerprint to the mobile for scrutiny and database check Server side functionality compares fingerprint data against a criminal (or other) database and returns information to the handset user. Enabling quick and efficient roadside or location based identifying of individuals. Fingerprints can be scanned and checked against a connected database ROK Mobile Group Ltd 2013 Confidential
  • 13. Accessed using a PC, laptop or mobile tablet, the Command Portal allows complete access management and visibility of information and communications over a highly encrypted link. Command Portal access can be based on hierarchical permissions to allow multiple layers of control. Provides communication, deployment ability and access to information. Handsets can be located, managed and wiped of all data from the Command Portal at any time. ROK HOMELAND ___SECURITY___ COMMAND PORTAL ROK Mobile Group Ltd 2013 Confidential
  • 14. • A map is available showing handset user’s location; • Alerts provide location via GPS, cellular triangulation & Wi-Fi; • RHS also provides an audio recording from the handset; • Command Portal secure messaging allows management to efficiently communicate with the appropriate support; • View alert groupings to establish trends and ‘hot spots’; RHS SOS & Alerts View a log of SOS alerts with GPS location and audio CommandPortalFeatures ROK Mobile Group Ltd 2013 Confidential
  • 15. • Command Portal users can create incidents providing detailed reports to users in the field; • Incident alerts can be sent to individual users, groups, or users within a radius of a chosen location; RHS Raise Incidents Create and send incident alerts to individuals or groups Enabling deployment of individuals. CommandPortalFeatures ROK Mobile Group Ltd 2013 Confidential
  • 16. RHS Locate CommandPortalFeatures • Handset users can be located from the Command Portal; • Location data can be filtered by user, date, accuracy and more; • Location can show map or satellite views; Locate single handset users or groups ROK Mobile Group Ltd 2013 Confidential
  • 17. RHS Tracking CommandPortalFeatures • Track users’ location via GPS, cellular triangulation & Wi-Fi; • View user defined position markers (breadcrumbs); • Tracking may be disabled; • Command Portal can filter tracking by user, date, and location accuracy; ROK Mobile Group Ltd 2013 Confidential
  • 18. • Upload of third party media to the Command Portal; • Media can be securely transmitted to individual users or groups. RHS Media Push Send media (images, video, sound files) directly to the handset from the Command Portal Command Portal allows: CommandPortalFeatures ROK Mobile Group Ltd 2013 Confidential
  • 19. • Geo Monitoring audibly notifies and zooms in to users location when SOS is raised • Google Earth provides detailed and accurate locations Geo Monitoring CommandPortalFeatures ROK Mobile Group Ltd 2013 Confidential A real-time Geo Monitoring solution allowing Command Portal operatives to receive status and positional updates from handset users
  • 20. • Activate audio recordings from the handset • Remotely activate handset to record audio from the Command Portal • Concealed application to ensure the safety of handset users Covert CommandPortalFeatures Disguised app on device enables locate and track, SOS and audio recording from the handset. ROK Mobile Group Ltd 2013 Confidential
  • 21. RHS Administration Full control of handsets, users and groups from the Command Portal From the Command Portal: CommandPortalFeatures • Add / remove RHS handsets to the system; • Remotely wipe RHS handsets; • Allocate RHS handsets to users; • Assign users to individual or multiple groups; • Define group administration access and settings;ROK Mobile Group Ltd 2013 Confidential