Intelligent formation and management of dynamic talk groups

ABSTRACT

Embodiments include a system, method, and computer program product that enable intelligent formation and management of dynamic talk groups. Embodiments include a discretionary sharing mechanism based on invitation and acceptance that allows for dynamic publication or sharing of information in real time among agencies responding to an incident, where the agencies may establish secure communications. Additional embodiments include establishing and associating geographic boundaries of incident sites with talk groups, monitoring conditions that trigger warning messages sent to talk group members, and subscriptions to information channels that allow multimedia information to flow into talk groups.

BACKGROUND

Field

The embodiments generally relate to electronic communications betweensecure communities, and more particularly, to providing intelligentformation and management of dynamic talk groups for push to talk (PTT)service among secure communities, including incident communicationsnetworks.

Background

Presently, a plethora of disparate communications resources existincluding resources using private wireless communications (e.g., publicsafety and first responder communications networks), public switchednetwork communications resources, public wireless networks, networks ofvideo surveillance devices, private security networks, and the like.Additionally, millions of consumers and public officials are nowequipped with smartphone devices that include multiple communicationsabilities including both voice and video communications.

Often these communications resources cannot communicate with each other.For example, private wireless communication networks, such as those usedby public safety or commercial users, are typically isolated from oneanother and often utilize different and incompatible technologies. Whileinteroperability products are available to interconnect such diversesystems, cooperation among the entities involved is often a barrier tofull and scalable implementation. Thus, prior art first respondercommunication systems exist (e.g., silo-ed communications systems)wherein control of the resources of each organization coupled to thesystem is controlled by a central commander or controller. Eachorganization providing resources to the system must relinquish controlof its resources to the central commander. The organization responsiblefor the operation of its radio system(s) may be unable or unwilling togrant control of its resources either to peer organizations or to ahigher-level organization.

U.S. Pat. No. 7,643,445, entitled Interoperable Communications Systemand Method of Use, issued on Jan. 5, 2010, and U.S. Pat. No. 8,320,874,entitled System and Method for Establishing an Incident CommunicationsNetwork, issued on Nov. 27, 2012, both of which are incorporated byreference in their entirety, describe systems and methods for providingan interoperable communications system (“interop system,” also referredto as an Incident Communications Network) including a plurality ofotherwise disjunct or disparate communications systems that addressedthe deficiencies of prior art systems. The '445 and '874 patentsspecifically describe methods for establishing an incidentcommunications network that enables interoperable communications amongcommunications resources controlled by multiple organizations during anincident involving emergency or pre-planned multi-organizationcommunications wherein a communications resource is controlled by anadministrator within an organization.

Additionally, U.S. Pat. No. 8,364,153, entitled Mobile InteroperabilityWorkstation Controller Having Video Capabilities within an IncidentCommunications Network, issued on Jan. 29, 2013, (“Mobile IWCApplication”) which is also incorporated herein by reference in itsentirety, extends the concepts of the '445 and '874 patents. Namely, theMobile IWC Application includes enhanced video capture and streamingcapabilities that are integrated with incident information and events tofacilitate improved management and analysis of incidents or events inwhich an incident communications network is employed.

Additionally, U.S. Pat. No. 8,811,940, entitled Dynamic AssetMarshalling Within an Incident Communications Network, issued on Aug.19, 2014, (“Marshalling Application”) which is also incorporated hereinby reference in its entirety, extends the concepts of the '445 and '874patents. Namely, the Marshalling Application provides systems andmethods that marshal resources into an incident communications networkbased on a variety of factors, such as the type of incident and the typeof resource being marshaled.

U.S. Patent Publication 2013/0198517, entitled Enabling Ad Hoc TrustedConnections Among Enclaved Communication Communities, filed on Mar. 13,2013, (“Enclaved Application”) which is also incorporated herein byreference in its entirety, extends the concepts of the '445 and '874patents. Namely, the Enclave Application presents systems and methodsfor dynamic access among secure communities, such as incidentcommunications networks, that enables communication resources of a firstsecure community to securely access and/or utilize communicationresources within other secure communities.

Inadequate Push to Talk (PTT) Services

When an emergency occurs requiring multiple public safety agencies torespond, a joint incident command structure may be established wheredesignated commanders from each agency coordinate activities ofresponding personnel. These scenarios are often chaotic and the impactedareas usually have personnel from many agencies present on site. It isoften a complex, manual, and time consuming process to issue credentialsto personnel, to manage their check-in for duty, and to keep track ofwho is on site. Further, when an incident response requires a specificskill-set, expertise, and/or knowledge of how a specific type ofequipment operates, determining and identifying the requisite personnelhaving the necessary skills and/or equipment can be time consuming, andcan require complex and multiple communication messages being relayedbetween agencies.

In addition, disaster areas often have various levels of restricted orlimited access areas for personnel, due to environmental hazards or forfacilitating ease of movement of personnel and equipment or theperformance of certain unimpeded operational tasks. Communicatingrestricted access information, including the description of geographicboundaries, communicating access credential levels, and interrogatingthe validity of access credentials with respect to various personnel canbe a complex, cumbersome and time-consuming process, thereby alsopotentially contributing to time-delays and negative impact on lifesafety and overall incident response.

Typical Push to Talk (PTT) services support the exchange voicecommunications using half-duplex communication methods, e.g., a two-wayradio. A PTT talk group is a logically defined voice communicationsgroup defined by a PTT user or PTT administrator that allows users tosend and receive voice messages from other member users in the talkgroup. In conventional PTT systems, such as land mobile radio systems,only one member of a group can transmit and speak at a time, and theremaining members listen. When the transmit channel is released, othermembers may push to talk (e.g., key a radio) and seize control of thetransmitting function until the transmit function is released. Thetransmit control function may be accomplished through control signalingwhich blocks other PPT users from acquiring control of the sharedtransmit function, or may be accomplished through other means such avoice activated detection (VAD) coupled with in-band or out of bandcontrol signaling which blocks transmission by other users while a voicecommunication is being transmitted. Internet protocol systems usingVoice over IP (VOIP) and other digital voice transmission over datanetwork technologies enable client software operated on computingdevices such as mobile smartphones to simulate PTT type functionalityamong a group of users. This IP based PTT technology enables users witha defined talk group to transmit and receive voice communications on apersistent basis subject to a user's PTT application client beingactively run and being in active state such as being in the applicationforeground of an operating system. IP PTT may employ half duplex or fullduplex communications, and may impose floor control using means similarto radio-based PTT systems. In either radio or IP based PTT systems, acentral administrator function serves to register and administer membersof a talk group and a talk group is typically limited to enterprise use(members within the same agency or enterprise) or user-defined where anauthorized user may establish a talk group and invite members via thecentral administrator.

Embodiments address, among other things, the problem that conventionalPTT services are inadequate because the published information aboutpotential talk group members in different agencies is static andincludes limited information such as a name, job title, and anassociated agency. As a result, talk groups may be large and cumbersomeand include a generalized membership which makes it difficult to addressspecific needs during an incident. Alternatively, the talk groups may besmaller and include and rely upon a dispatch unit from each of theresponding agencies to relay communications to respective agencymembers. Both alternatives are complex and time-consuming. In addition,conventional PTT services do not consider geographic boundaries.

BRIEF SUMMARY OF THE INVENTION

What is needed is a system, method, and computer program product thatenable intelligent formation and management of dynamic talk groups.Embodiments include a discretionary sharing mechanism based oninvitation and acceptance that allows for dynamic publication or sharingof information in real time among agencies responding to an incident,where the agencies may establish secure communications. Embodiments alsoinclude establishing and associating geographic boundaries of incidentsites with talk groups, monitoring conditions that trigger warningmessages sent to talk group members, and managing subscriptions toinformation channels that allow multimedia information to flow into talkgroups.

Embodiments include a system, method, and computer medium storage forintelligent formation and management of dynamic push to talk (PTT) talkgroups among members of two or more agencies associated with anincident, where the two or more agencies communicate securely, and wherean agency includes a collection of communication resources having anadministrator that maintains control over each such agency. Embodimentsinclude creating an incident control area associated with a geographicdemarcation of the incident area, and electronically transmittinginformation about the incident control area to the two or more agencies.A talk group permission rule associated with the incident control areais established for automatically creating an invitation to join a PTTgeotalk group. A joint invitation is electronically transmitted to thetwo or more agencies for access to PTT mobile unit users that meetcriteria, where the joint invitation includes a request for locationinformation. An acceptance to the joint invitation is electronicallyreceived that includes a User Identity and Credentials of a first PTTmobile unit user, where a dynamic access permission managed by the firstagency determines what information associated with the User Identity andCredentials of the first PTT mobile unit user are available, and wherethe dynamic access permission changes in real time.

Further embodiments include obtaining a location of the first PTT mobileunit user in real time, where the obtaining is based on the dynamicaccess permission. When the first PTT mobile unit user is in proximityto the incident control area or is present in the incident control area,embodiments include determining whether the first PTT mobile unit useris authorized to enter the incident control area based on the dynamicaccess permission, and when the first PTT mobile unit user is authorizedto enter the incident control area and the talk group permission rule issatisfied, the invitation to join the geotalk group is sent to the firstPTT mobile unit user.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are included to provide a furtherunderstanding of the invention and are incorporated in and constitute apart of this specification, illustrate embodiments of the invention andtogether with the description serve to explain the principles of theinvention. In the drawings:

FIG. 1 is a block diagram of a system for intelligently forming andmanaging dynamic talk groups according to an embodiment of theinvention.

FIG. 2 is a block diagram of a joint agency server according to anembodiment.

FIG. 3 is a flow chart of a method for intelligently forming andmanaging dynamic talk groups according to an embodiment.

FIG. 4 is a diagram including an incident control area according to anembodiment.

FIG. 5 is an example system useable to implement embodiments.

DETAILED DESCRIPTION

Overview

When an incident occurs, an incident communications network and/orsecure communications may be established among two or more agenciesresponding to an incident. Each agency may have a push to talk (PTT)administrator that creates and manages PTT user data, and each agencypublishes information about their PTT users. The information publishedtypically includes static and limited information. PTT administratorsmay create an inter-agency PTT talk group based on the publishedinformation. But, the inter-agency PTT talk group may be monolithic, andresponding agencies typically experience time delays as they engage incomplex coordination and relaying of multiple communications to issuecredentials to responding agency personnel, manage their check-in forduty, and track the personnel on the incident site. The situationbecomes even more difficult to determine and identify respondingpersonnel having particular skills and/or equipment, let alonecommunicate geographic boundaries associated with the incident.

In an embodiment, two or more agencies may establish securecommunications, support push to talk services among their members, andrespond to an incident. Each agency creates and stores a User Identityand Credentials that includes a unique identity for each PTT user in anagency host directory. Each User Identity and Credentials is associatedwith dynamic access permissions that determine what subset ofinformation, or all information of a User Identity and Credentials arepublished and made visible to or discoverable by the other agencies. Ajoint agency application server is a multi-agency node that is a peer toeach agency (e.g., not a central command control) that can invite one ormore agencies to make more information visible (e.g., may request achange to a dynamic access permission). Each agency is in logical andphysical control of their resources and information, and may choose toaccept, partially accept, or decline the invitation. When an agencyaccepts the invitation, the agency can manually or automatically changea dynamic access permission to increase the level of detail about theirPTT mobile unit users (e.g., Emergency Medical Services certifications)that is made visible to the other agencies, or provide some of theinformation requested. The ability to dynamically change the informationvisible to agencies and joint agency servers responding to an incidentallows agencies to quickly and automatically create and manage talkgroups tailored to perform specific tasks. In addition, agencies(including via a joint agency server) may create and associategeographic boundaries of an incident site called an incident controlarea. Members of a talk group may also subscribe to information channelsto electronically receive multimedia data or warning messages.

System

FIG. 1 is a block diagram of a system 100 for intelligently forming andmanaging dynamic PTT talk groups according to an embodiment of theinvention. For ease of discussion and without limitation, FIG. 1 will bedescribed with reference to elements from FIG. 4. FIG. 1 illustrates twosecure communities, Agency A System 105 and Agency B System 120, thathave established secure communications over a network such as IP Network135 as described in the Enclaved Application. A secure community oragency includes a collection of communication resources having anadministrator that maintains control over the agency. Agency A andagency B support PTT services among members of the agencies respondingto an incident.

Each agency includes an agency PTT application server that connects,routes, and exchanges voice and data messages among PTT applicationclients on computing devices whose users are members of a talk group. APTT application is a two-way push to talk voice communication and datacommunications sharing application. The PTT application enables thetransmission and receipt of real time voice communications, videostreams, files, text, and other data between and among PTT users who aremembers of a talk group. A talk group is a logically definedcommunications group comprised of PTT users that are invited to join,and accept the invitation to join the talk group. For example, if a PTTadministrator of agency A (not shown) and a user associated with PTTmobile unit 140 are members of a talk group, agency server 107 connects,routes, and exchanges voice and data messages between them via IPnetwork 135 and radio network A 145. Likewise, agency B system 120includes agency server 125 that supports PTT communications with aclient PTT application on PTT mobile unit 155 over IP network 135 andradio network B150. In addition to a user associated with a PTT mobileunit, a PTT user may include an agency dispatch unit (not shown) using acomputing device with a PTT application, and/or a PTT administrator (notshown) using a PTT application on a server.

A talk group may include members from one or more agencies as well asmembers of different networks such as the public switched telephonenetwork, other land mobile radio networks, mobile telephone networks,and private multimedia broadband networks. An agency server (e.g.,agency server 107) directly receives and transmits PTT messages fromtalk group members that are associated with the same agency (e.g.,agency A). The agency server (e.g., agency server 107) receives andtransmits PTT messages from the remaining talk group members that arenot associated with the same agency (e.g., not associated with agency A)via an interoperability gateway (e.g., interoperability gateway 170).Likewise, agency B includes interoperability gateway 175 that hasequivalent functions of interoperability gateway 170.

Databases 109, 180, and 165 may be any type of structured data store,including a relational database that stores information associated witha respective agency or joint agency operation (e.g., joint agency server160).

Agency A system 105, agency B system 120, and joint agency server 160include a variety of network interfaces, that may include an Ethernetinterface, as well as wireless or wireline network interfaces thatsupport a variety of networking protocols.

A PTT mobile unit (e.g., PTT mobile unit 140/155) may be a mobilecomputing device (e.g., a smart phone, a tablet, a personal digitalassistant (PDA), or a laptop computer) that includes a client PTTapplication. In an embodiment, a PTT user may interface with PTT mobileunit 140/155 through a client PTT application. In an embodiment, aclient PTT application on PTT mobile unit 140/155 may have access to thecapabilities of the mobile computing device that may include but not arenot limited to a touchscreen, a camera/scanner, and a locationdeterminer (e.g., a Global Positioning System (GPS) determiner), aspeech recognizer, or a voice recorder. Information generated from thesecapabilities such as location information in space and time may betransmitted to other PTT users including PTT mobile unit 155/140, agencyserver 107/125, and joint agency server 160.

Agency servers 107 and 125 may be implemented on one or more differentcomputing devices having server capabilities. Such a computing devicemay include, but is not limited to, a device having a processor andmemory, including a non-transitory memory, for executing and storinginstructions. The memory may tangibly embody data and programinstructions. Software may include one or more applications and anoperating system. Hardware can include, but is not limited to, aprocessor, memory, and graphical user interface display. The computingdevice may also have multiple processors and multiple shared or separatememory components. For example, the computing device may be a part of orthe entirety of a clustered computing environment or server farm.

In the embodiment of FIG. 1, agency server 107 includes six modules.Each module is described below in turn:

Administrative Module: An administrative module such as AdministrativeModule 111 includes a data input mechanism and is configured to enablethe creation, storage, modification, and/or deletion of PTT userinformation.

As mentioned earlier, with regards to FIG. 11, each secure community(e.g., agency) or set of secured communities may administer its owndirectory control authority or directory of members. Thus, each agencyor set of agencies has a PTT administrator that validates the identityand authority of each PTT mobile unit user associated with their agencyor agencies. The PTT administrator registers PTT applications with PTTmobile units and users. For example, The PTT administrator may useAdministrative Module 111 to create, store, modify, and/or delete aunique user ID such as a PTT Application user name and a user passwordthat is assigned to a PTT mobile unit user. The user name and userpassword may be created by the user and approved by the PTTAdministrator, or created by the PTT administrator and assigned to theuser. The unique user ID may be relationally associated with a mobilecomputing device (e.g., a mobile radio unit such as a cellular phone) byreference to a mobile computing device ID including but not limited toat least one of: an electronic serial number (ESN), a MAC address, anequipment serial number, a mobile identification number (MIN), a callsign, an encryption key certificate, or a file installed on the mobilecomputing device, or other information assigned or associated with themobile computing device.

Information about a PTT mobile unit user, User Identity and Credentials,includes but is not limited to at least one of: a unique user ID (e.g.,user name and user password), an identification photo of the user, anagency employer, a title, a position, a rank, a task group, a departmentor division, a function, an assignment, a badge number, an employeeidentification number, an incident access level, a birth date, a gender,skill set, an equipment certification, a professional qualification, anaccreditation, a license, an experience, a telephone number, a password(e.g., incident control area password), an email address, a mobilecomputing device ID, or an availability status.

Administrative Module 111 stores User Identity and Credentials of thePTT mobile unit 140 user in a host directory in an agency database suchas Database 109. Additionally, the User Identity and Credentials of eachPTT mobile unit user is stored in their respective PTT mobile unit andis called a Mobile ID card.

Recall that secure community membership directory module 1110 includes aset of policies that govern the membership information that is madeavailable (e.g., is published) to secure communities (e.g., agencies)with whom a secure communication is established. As described earlier,the membership information is typically static and limited. In anembodiment, the PTT administrator may use Administrative Module 111 tocreate a dynamic access permission associated with each PTT mobile unituser. The dynamic access permission includes multi-dimensional andmulti-parameter rules based on a set of policies of the agency. When arule is satisfied, the corresponding dynamic access permission changesin real time. The dynamic access permission determines what information,updates, or changes associated with a User Identity and Credentials,Mobile ID card, or field information (e.g., a location) of a PTT mobileunit user are made available to members of the agencies including usersof a joint agency server 160, with whom secure communications areestablished. The dynamic access permission may change automatically,semi-automatically, or manually (e.g., via a PTT administrator) in realtime.

In an embodiment, the dynamic access permission of a PTT mobile unituser may include one or more parameters that include at least one of: aseverity of the incident, a viewer's proximity to the PTT mobile unituser, the viewer's proximity to an incident control area, the viewer'spresence in the incident control area, the PTT mobile unit user'sproximity to the incident control area, or the PTT mobile unit user'spresence in the incident control area, and the viewer's informationincluding but not limited to: identity, position, task, job, title,agency affiliation, group affiliation, access privilege status, orcommon talk group membership. Further, the one or more parameters may beindexed.

In embodiments, the one or more parameters may dynamically change inreal time, thus the dynamic access permission(s) change accordingly.Therefore, the information that is made available to other agencies withwhom secure communication is established, viewers, or recipients of aUser Identity and Credentials, Mobile ID card, and/or field informationof a PTT mobile unit user can also dynamically change. A manual changemay be made by an agency PTT administrator. An automatic change may bemade by logic in software, hardware, or a combination thereof thatrecognizes when a rule of the dynamic access permission has beensatisfied, and makes a change to the dynamic access permissionaccordingly. A semi-automatic change may be a combination of the manualand automatic change.

In an embodiment, the User Identity and Credential information, MobileID card information, and field information about a first PTT mobile unituser that is available to a requesting PTT user depends upon the dynamicaccess permission of the first PTT mobile unit user that is establishedby the first PTT mobile unit user's agency. The requesting PTT user maybe a PTT mobile unit user or a PTT user utilizing a computing deviceconnected to the internet such as a PTT administrator or a joint agencyPTT administrator. Further, the requesting PTT user may not be aware ofthe degree of the authority bestowed to them based on the dynamic accesspermission when the request is made to access the first PTT mobile unituser's information. A requesting PTT user may electronically transmit anelectronic request to agency server 107 query a host directory indatabase 109 to obtain data to create a directory of PTT mobile unitsbased on the respective dynamic access permissions. In addition, arequesting PTT user may query the first PTT mobile unit (e.g., Mobile IDcard) to obtain data to create a directory of PTT mobile units. In anembodiment, the directory of PTT mobile units may be stored in a localmemory of the requesting PTT mobile unit, in an agency database, or ajoint agency database of the requesting PTT user. The directory of PTTmobile units may be displayed and selectable on a graphical userinterface (GUI) on a touch screen, for example. Further, the directoryof PTT mobile units may be automatically synchronized with a hostdirectory when the PTT mobile unit or PTT user makes a request to theagency server associated with the host directory. Thus, a PTT user mayautomatically receive information associated with a User Identity andCredentials, a Mobile ID card, or field information, associated with thePTT mobile unit user, such as location information of a PTT mobile unituser based on the PTT mobile unit user's dynamic access permission. Whena dynamic access permission changes (e.g., a parameter changes and adifferent rule is satisfied) a PTT user may begin to electronicallyreceive or view additional data such as a location of a PTT mobile unituser in real time. Also, a PTT user may also electronically receive orview less information when a different rule is satisfied.

For example, PTT mobile unit 155 may query a host directory in adatabase such as database 180, obtain User Identity and Credentialsbased on the respective dynamic access permissions, and store the UserIdentity and Credentials in a directory of PTT mobile units in a localmemory such as the memory of PTT mobile unit 155. PTT mobile unit 155user may view PTT mobile unit 140 user's identity and agencyaffiliation, based on the dynamic access permission associated with PTTmobile unit 140. The directory of PTT mobile units in the memory of aPTT mobile unit 155 may be automatically synchronized with a hostdirectory when PTT mobile unit 155 makes a request to agency server 125via IP network 135. When PTT mobile unit 155 comes within a givenproximity of PTT mobile unit 140 (e.g., a parameter such as the viewer'sproximity to PTT mobile unit 140 changes and another rule has beensatisfied), the data associated with PTT mobile unit 140 user nowavailable to PTT mobile unit 155 may dynamically change (e.g.,increase), and PTT mobile unit 155 user may now view more of PTT mobileunit 140 user's credentials and information such as equipmentcertifications, emergency medical training, and current location.Because of the additional data that is now visible to PTT mobile unit155 user, PTT mobile unit 155 user may now electronically transmit atalk group invitation to PTT mobile unit 140 user. When the PTT mobileunit user 155 is no longer in proximity to PTT Mobile Unit 140, adifferent rule may satisfied and PTT mobile unit 155 user may view lessinformation about PTT mobile unit 140 user.

Talk group module: A talk group module such as talk group module 113 maybe configured to create and store talk groups and talk group memberidentities. A talk group module may be configured to electronicallyreceive a request to create, modify, and delete a talk group. Therequest may be from the agency's PTT administrator or a PTT mobile unituser associated with the same agency. When a talk group is created, anassociated talk group permission rule is established that may indicatethe authority of each member. For example, one or more members may begiven delegation authority to invite, add or delete members of a talkgroup. For example, a PTT user such as a dispatch unit may be a delegateof a talk group who is authorized to invite or add members from anotherland radio network to the talk group. The talk group module creates atalk group, talk group permission rules, assigns the talk group to aradio channel, and sends invitations to PTT users and PTT mobile unitusers accordingly to join the talk group.

An invitation (e.g., to a talk group, information channel subscription,or joint incident) may be an audio and/or visual message displayed on agraphical user interface of a PTT mobile unit. In addition, theinvitation may be sent via other communications networks or means,including email, short message service (SMS), a voice mail whichcontains a hyperlink or other executable function, command or promptthat invites the enabled user to accept an invitation.

A talk group module may also be configured to establish an informationchannel permission rule for automatically creating and electronicallytransmittingan invitation to subscribe to an information channelassociated with the incident control area, where the information channelpermission rule is based on at least one of: a talk group membership ofa PTT mobile unit user, the dynamic access permission associated withthe PTT mobile unit user, the identity of the PTT mobile unit user, acredential of the PTT mobile unit user, a proximity to or a presence inan incident control area of the PTT mobile unit user, or a proximity toor a presence in an incident control area of another PTT mobile unituser. The information channel includes but is not limited to at leastone of: weather information, traffic information, bio-hazard alerts,operational status, updates, or other announcements. When theinformation channel permission rule is satisfied, the talk group modulesends the invitation to subscribe to the information channel to the PTTmobile unit user, and may electronically receive an acceptance from thePTT mobile unit user.

In an embodiment, an agency PTT administrator or a PTT mobile unit userwith delegation authority (e.g., authority to add/delete members of talkgroup) may invite users with mobile computing devices (e.g., a smartphone or a land mobile radio device) that are not associated with theagencies that have established a secure communication (e.g., a userwhose agency is not a member of an interoperability network), to join atalk group. The invitation may be an email message or an SMS messagethat contains a hyperlink with access to a client PTT application of theinviting agency. The invitation or a subsequent invitation may invitethe user to subscribe to an information channel. If the user accepts thetalk group invitation, the user may download the agency's client PTTapplication to their mobile computing device, enter User Identity &Credentials in an acceptance email, and electronically transmit theacceptance email response to the inviting agency's agency PTTadministrator. In an embodiment, several exchanges may take placebetween the agency PTT administrator and the accepting user to obtainthe User Identity & Credentials information which included theassociated mobile computing device ID (e.g., radio device identity). Theagency PTT administrator may use an administrative module to create,store, modify, and/or delete User Identity & Credentials for theaccepting user in the inviting agency's database based on the receivedinformation. In an embodiment, the User Identity & Credentials for theaccepting user may be stored in a separate database and is relationallycoupled to the inviting agency's database. The agency PTT administratormay use a talk group module to add the accepting user to the talk groupand/or and add the accepting user to the subscription to electronicallyreceive any subscribed information. Once the accepting user is added tothe talk group, the accepting user may electronically transmitcommunications to and electronically receive communications from thetalk group. The accepting user may also electronically receiveinformation as subscribed via the information channel.

For example, Agency A PTT administrator or a PTT mobile unit user ofAgency A with delegation authority may electronically transmit aninvitation to a mobile computing device whose user is not associatedwith agencies responding to an incident (e.g., Agency C (not shown) thathas a complementary radio system (e.g., a cellular network) or that hasa separate land mobile radio system (e.g., an emergency first responderradio network). The invitation may be an email message that includes ahyperlink to a web page that allows the user to download Agency A'sclient PTT application to their mobile computing device (e.g., smartphone). The user enters required User ID & Credentials information alongwith any subscription information channel acceptances in an acceptanceresponse sent to Agency A PTT administrator. Once the user is added tothe talk group, the user may electronically transmit communications toand electronically receive communications from the talk group as well aselectronically receive subscribed information.

Geographical Information System (GIS) Module: In an embodiment, a GISmodule is configured to create an incident control area, a geographicaldemarcation of the incident site that indicates areas of restrictedaccess. An incident access level may be assigned to an incident controlarea. The incident access level may be used in conjunction with otherUser Identity Credentials to determine whether a PTT mobile unit user isauthorized to enter an incident control area. Incident control areainformation may be transmitted to the agencies, members of the agencies,and joint agency servers associated with the incident. The assignment ofan incident access level for each PTT mobile unit user is determined byan agency PTT administrator and is included in a User Identity andCredential.

FIG. 4 is a diagram 400 including an incident control area according toan embodiment. Incident control area information may be displayed on aPTT mobile unit or a computing device with at PTT application. Incidentcontrol Area 420 may be assigned a restricted incident access levelwhere only PTT mobile unit users with a restricted incident access levelor higher (e.g., all or unrestricted incident access level) may beauthorized to enter. Incident control Area 410 may be assigned anon-restricted area.

When an incident control area is associated with a talk group, the talkgroup is called a geotalk group. One or more talk groups may be createdand assigned to an incident control area by various agencies respondingto the incident creating one or more geotalk groups. A PTT administratormay also use the talk group module to create, store, modify, and/ordelete one or more pre-established talk group permission rules toautomatically create and electronically transmit an invitation to join atalk group when the one or more talk group permission rules issatisfied. A pre-established talk group permission rule may beestablished and associated with an incident control area toautomatically send invitations to PTT mobile unit users to join ageotalk group. When a PTT mobile unit user is authorized to enter anincident control area and satisfies a pre-established talk grouppermission rule, an invitation may be automatically generated and sentto the PTT mobile unit user. For example, when PTT mobile unit 140 useris authorized to enter an incident control area and a pre-existing talkgroup permission rule is satisfied (e.g., PTT mobile unit 140 user is ahazardous materials technician), an invitation may be automaticallycreated and sent to PTT mobile unit 140.

Presence and Check-in Module: In an embodiment, a presence and check-inmodule such as presence and check-in module 119 is configured todetermine whether the PTT mobile unit user is authorized to enter anincident control area based on the PTT mobile unit user's dynamic accesspermission. The presence and check-in module may be configured toautomatically send an audio or visual prompt to the PTT mobile unit userto enter a password or a credential to check-in to the incident controlarea, and electronically receive the password or the credential from thePTT mobile unit user.

The presence and check-in module may be configured to log, record,store, and retrieve at least one of: recording at least one of: alocation of the PTT mobile unit user, a check-in date and time of thePTT mobile unit user entering the incident control area, a check-outdate and time of the PTT mobile user departing the incident controlarea, a message content received by the PTT mobile unit user, a messagecontent transmitted by the PTT mobile unit user, an identifier of thetalk group, a descriptor of the incident, or an event criteria. Theinformation may be stored in a local database.

In addition, the presence and check-in module is also configured totrack the location of the PTT mobile unit user in real time, where thePTT mobile unit user is represented by a visual icon displayed on agraphical user interface with respect to the PTT mobile unit user'sproximity to, or presence in the incident control area. The presence andcheck-in module is also configured to associate the visual icon with aselectable command for sending, selecting and displaying informationassociated with the PTT mobile unit user. For example, in FIG. 4,responder Joe Smith is represented by a black circle and responder JohnDoe is represented by a patterned circle with respect to a map thatincludes incident control areas. Selecting John Doe's patterned circleon a GUI presents a portion of John Doe's Mobile ID card 440. Further,selecting the information icon 460 on Mobile ID card 440 results in amore details 450 from John Doe's Mobile ID card to be presented. Theinformation presented complies with the dynamic access permissionestablished by the agency with which John Doe is associated, theHartford Fire Dept.

In an embodiment, the visual icon displayed on the graphical userinterface may be associated with a second selectable command (not shown)that allows a push to talk voice message to be sent privately to the PTTmobile unit user that joined the talk group without a remaining memberof the talk group hearing the voice message. Thus a private voicemessage may be sent to Joe Smith that would not be audible to John Doe.

Monitoring Module: In an embodiment, a monitoring module such asMonitoring Module 117 is configured to establish a warning messagetrigger rule for electronically transmitting a warning message to a PTTmobile unit user and/or one or more other PTT mobile units. Themonitoring module may be configured to create, store, modify andassociate pre-recorded and/or store-and-forward based warning messagesand associate the warning message with a warning message trigger rule. Awarning message may also be manually initiated via a dispatch unit whomay or may not be a member of a talk group. The warning message may bean audible or a visual message. Further, the warning message may beassociated with an identifying sound or visual alarm that may be heardor seen by one or more PTT mobile units in one or more PTT talk groups.

A warning message trigger rule may be based on location based ornon-location based triggers, field information values received from aPTT mobile unit, or a combination thereof. For example, the monitoringmodule may be configured to electronically receive a field informationvalue via a PTT mobile unit associated with the PTT mobile unit userthat joined the talk group, where the field information value includesat least one of: an identity; a field information status; a credential;a location; biological sensor monitoring data; detection or presence ofa chemical agent or a biological agent; or detection or presence of aradiological material or a nuclear material. The monitoring modulecompares the field information value received against the warningmessage trigger rule, and when the warning message trigger rule has beensatisfied, sends the associated warning message to the PTT mobile unituser and/or the one or more other PTT mobile units. The monitoringmodule may electronically transmit the warning message to the one ormore other PTT mobile units based on at least one of: common talk groupmembership, proximity to the PTT mobile unit whose field informationtriggered the warning message trigger rule, proximity to an incidentcontrol area, agency or group affiliation, skill set, a severity of anincident, a type of incident, or other criteria.

When a PTT mobile unit user may be in distress, a PTT mobile unit (e.g.,a client PTT application on a mobile computing device) may include amonitoring module configured to detect the distress, and enable distressmessages to be sent to other PTT mobile units (e.g., other client PTTapplications on respective mobile computing devices) that are members ofa common talk group. Further, the PTT mobile unit may electronicallytransmit distress messages to members of other PTT talk groups based ontheir criteria including but not limited to: association with the sameagency, a certain skill, a professional qualification, a certification,or other credential, a severity of the incident (e.g., level ofemergency classification), or a geographic proximity to the distressedPTT mobile unit user. The distress message may be an audio, text orvisual message indication.

When a monitoring module of a PTT mobile unit enables a distress signal,the PTT mobile unit may establish a new talk group (e.g., electronicallytransmit invitations or electronically transmit invitations via theagency PTT administrator). Members of the new talk group may include butare not limited to at least one of: the PTT mobile unit user indistress, other members of preexisting common talk groups (e.g., othermembers of preexisting talk groups of which the distressed PTT mobileunit user is a member), other members outside the preexisting commontalk groups, or those who elect to join the new talk group. In anembodiment, the PTT mobile unit may electronically transmit invitationsto the new talk group to members of other PTT talk groups based on theircriteria including but not limited to: association with the same agency,a certain skill, a professional qualification, a certification, or othercredential, a severity of the incident (e.g., level of emergencyclassification), or a geographic proximity to the distressed PTT mobileunit user.

A distress message transmission may initiated manually by for example, aPTT mobile unit user selecting an item on the PTT mobile unit device(e.g., a button on a graphical user interface on a smart phone).Alternatively, a distress message transmission may be automaticallyinitiated by an associated sensor or other system measuring anddetecting an event when a measurement exceeds a threshold value. Forexample, a bio-sensor may measure, detect, and automatically send adistress message that indicates an extreme body temperature or bloodpressure; an audio sensor may measure, detect, and automatically send adistress message that indicates a gun-shot sound; or an accelerometersensor may measure, detect, and automatically send a distress messagethat indicates a sudden acceleration or deceleration. In an embodiment,different levels, classifications or types of distress messages may beassociated with a type of incident (e.g., emergency) and/or a severityof the incident.

A monitoring module of a PTT mobile unit may also be configured allowremote control of the PTT mobile unit when a defined event occurs or isdetected (e.g., a distress event is detected) or a PTT mobile unit userdoes not respond to a confirmation message. For example, after the PTTmobile unit sends a distress signal, the PTT mobile unit mayelectronically receive and respond to messages (e.g., remote controlsignals) to activate a microphone, a video camera, or other capabilityof the PTT mobile unit, client PTT application, or other application onthe PTT mobile unit to monitor a distressed PTT mobile unit user, orexecute functions for an impaired PTT mobile unit user.

In an embodiment, a monitoring module of a PTT mobile unit may also beconfigured to respond to a confirmation message. For example, an agencyserver may include an automated confirmation function (e.g., configuredby an agency PTT administrator) to generate a periodic confirmationmessage or series of confirmation messages requesting a response from aPTT mobile unit user to confirm a physical presence (e.g., to confirmthat the user is in possession of their PTT mobile unit or to confirmthat the user is physically safe (e.g., conscious and responsive in adangerous environment)). A response may include a voice response, aformatted data signal, an email response, a SMS response, a selection onthe PTT mobile unit (e.g., selectable item on a touchscreen of a smartphone) or other message response to confirm a presence. The response maybe sent in the clear, encoded or encrypted. In the event a response isnot received, a PTT administrator may remotely control the PTT mobileunit including but not limited to: activate and control certainfunctions (e.g., microphone, camera) described above, disable all orpart of the client PTT application, or erase (e.g., clean or wipe) alldata from the PTT mobile unit by overwriting, randomizing, encryptingand locking, or revoking an encryption key associated with encryptedstored data.

Interop Gateway Module: An interop gateway module such as InteropGateway Module 109 may be configured to control a transmission andreceipt of a set of voice and data messages from PTT mobile unit usersnot associated with the agency that established the talk group. That setof voice and data messages are received via an interoperability gateway,and the interop gateway module may route the set of voice and datamessages based on an established talk group permission rule.

A joint agency server such as joint agency server 160 may be used by oneor more designated commanders from each agency to coordinate activitiesof responding personnel. Unlike conventional central commands where anagency must relinquish control of its resources to a central commander,a joint agency application server is a multi-agency application server,where each agency determines the dynamic access permission for each ofthe PTT users in their agency. A user of the joint agency PTTapplication (e.g., a joint agency administrator) may use a joint agencyserver to electronically transmit a joint incident invitation or queryto one or more PTT administrators of the agencies responding to theincident. The joint incident invitation may be an alert message which isaudible and visible on a GUI display of an agency server. The jointincident invitation may be accepted or rejected by a PTT administrator.When a PTT administrator accepts the joint incident invitation, thequeried information may be provided based on the agency's dynamic accesspermission. For example, User Identity and Credentials of PTT mobileunit users may be provided. Subsequently, the joint agency servertransmits and receives communications and information from one or morePTT mobile units and dispatch units associated with the agency thataccepted the joint incident invitation.

FIG. 2 is a block diagram 200 of a joint agency server according to anembodiment. A joint agency server may be a joint agency PTT applicationhosted by a third party provider or one or more agencies of the agenciesresponding to the incident (e.g., emergency event, planned or unplannedevent, or other common purpose). A joint agency server may be accessedor operated from one or more client computing devices connected via anIP network, and may be coupled to one or more agency server s such asagency server 107 or 120 via IP Network 135. Joint agency server 160includes talk group module 213, GIS module 215, monitoring module 217,presence and check-in module 219 that perform functions similar toagency server 107 and 125 and are briefly described below.

Joint credential management module 211 generates joint invitations toPTT administrators of the agencies responding to the incident requestinginformation and permission to access more details regarding an agency'sPTT mobile unit user.

Talk group module 213 may establish an information channel permissionrule for automatically creating and electronically transmitting aninvitation to subscribe to an information channel associated with theincident control area, where the information channel permission rule isbased on at least one of: a talk group membership of a first PTT mobileunit user, the dynamic access permission associated with the first PTTmobile unit user, the identity of the first PTT mobile unit user, acredential of the first PTT mobile unit user, a proximity to or apresence in an incident control area of the first PTT mobile unit user,or a proximity to or a presence in an incident control area of anotherPTT mobile unit user, where the information channel includes at leastone of weather information, traffic information, bio-hazard alerts,operational status, updates, or other announcements. When theinformation channel permission rule is satisfied, talk group module 213sends the invitation to subscribe to the information channel to thefirst PTT mobile unit user, and receives an acceptance from the firstPTT mobile unit user.

Presence and check-in module 219 of joint agency server 160 mayelectronically transmit an audio or visual prompt to the first PTTmobile unit user to enter a password or other form of authenticationresponse to check-in to the incident control area; after electronicallyreceiving the password or response from the first PTT mobile unit user,presence and check-in module 219 compares the password or authenticationinformation with data User Identity and Credentials of the first PTTmobile unit user. When the comparing is positive, presence and check-inmodule 219 approves the check-in of the first PTT mobile unit user. Thecomparing may include several interrogation and response steps, and maybe coupled to or with a secure key exchange.

Presence and check-in module 219 also tracks the location of the firstPTT mobile unit user in real time, where the first PTT mobile unit usermay be represented by a visual icon displayed on a graphical userinterface with respect to a map of the incident control area. The visualicon is associated with a selectable command for selecting anddisplaying information associated with the first PTT mobile unit user asdescribed above with regards to FIG. 4. In addition, the visual icondisplayed on the graphical user interface may be associated with asecond selectable command that allows a push to talk voice message to besent privately to the first PTT mobile unit user without a remainingmember of the talk group hearing the voice message.

Monitoring module 217 may establish a warning message trigger rule forelectronically transmitting a warning message to the first PTT mobileunit user. Monitoring module 217 may receive a field information valuevia a PTT mobile unit associated with the first PTT mobile unit user,where the field information value includes at least one of: an identity;a field information status; a credential; a location; biological sensormonitoring data; detection or presence of a chemical agent or abiological agent; or detection or presence of a radiological material ora nuclear material. Monitoring module 217 compares the field informationvalue received with the warning message trigger rule, and when thewarning message trigger rule has been satisfied, monitoring module 217sends the warning message to the first PTT mobile unit user.

GIS module 215 may create incident control areas associated with anincident site to support restricted access.

In another embodiment, joint agency server 160 may log, record, store,and/or delete at least one of the following in database 165: a locationof the first PTT mobile unit user, a check-in date and time of the firstPTT mobile unit user entering the incident control area, a check-outdate and time of the first PTT mobile user departing the incidentcontrol area, a message content received by the first PTT mobile unituser, a message content transmitted by the first PTT mobile unit user,an identifier of the talk group, a descriptor of the incident, or anevent criteria.

Method

FIG. 3 is a flow chart of method 300 for intelligently forming andmanaging dynamic talk groups according to an embodiment. For ease ofdiscussion and without limitation, FIG. 3 will be described withreference to elements from FIG. 1 and FIG. 2.

Method 300 begins and at step 305, joint agency server 160 creates anincident control area associated with a geographic demarcation of theincident area using GIS module 215, and sends information about theincident control area to the two or more agencies.

At step 310, agency server 107 receives the incident control areainformation. agency server 107 may use this information to establishother geotalk groups (e.g., other talk groups associated with theincident control area).

At step 315, joint agency server 160 establishes a talk group permissionrule associated with the incident control area, for automaticallycreating and electronically transmitting an invitation to PTT mobileunit users who satisfy a criteria, join a geotalk group.

At step 320, joint agency server uses joint credential management module211 to create and electronically transmit a joint invitation to the twoor more agencies for access to PTT mobile unit users that meet acriteria, wherein the joint invitation includes a request for locationinformation.

At step 325, agency server 107 receives the joint invitation anddetermines whether to accept or decline the invitation. Thedetermination may be automatic, manual, or semi-automatic. When aninvitation is accepted, a dynamic access permission of one or more PTTmobile unit users associated with agency server 107 may be modified. Inthis example, agency server 107 accepts the joint invitation and sends amessage accordingly. In an embodiment, agency server 107 may alsoelectronically transmit the User Identity and Credentials of the PTTmobile unit users that satisfy the criteria of the joint invitation tojoint agency server 160.

In an embodiment, the dynamic access permission includes one or moreparameters including at least one of: a severity of the incident, aviewer's proximity to the first PTT mobile user, a viewer's proximity tothe incident control area, a viewer's presence in the incident controlarea, a proximity of the first PTT mobile unit user to the incidentcontrol area, or the a presence of the first PTT mobile unit user in theincident control area, or at least one of a viewer's information: commontalk group membership, identity, position, task, job, title, agency orgroup affiliation, or access privilege status.

At step 330, joint agency server 160 receives an acceptance to the jointinvitation that includes a User Identity and Credentials of a first PTTmobile unit user, where a dynamic access permission managed by the firstagency determines what information associated with the User Identity andCredentials of the first PTT mobile unit user are available for viewing,and wherein the dynamic access permission may change in real time. In anembodiment, the information associated with the first PTT mobile unituser includes at least one of: an identification photo, an agencyemployer, a title, a position, a rank, a task group, a department ordivision, a function, an assignment, a badge number, an employeeidentification number, an incident access level, a birth date, a gender,a skill set, an equipment certification, a professional qualification,an accreditation, a license, an experience, a telephone number, an emailaddress, a mobile computing device ID, or an availability status. In anembodiment, joint agency server 160 receives automatic updates, changes,and/or information associated with a User Identity and Credentials, aMobile ID card, or field information, associated with the first PTTmobile unit user based on the dynamic access permission of the first PTTmobile unit user.

At step 335, based on the dynamic access permissions received, jointagency server 160 may obtain a location of the first PTT mobile unituser in real time.

At step 340, when the first PTT mobile unit user is in proximity to theincident control area or is present in the incident control area, jointagency server 160 determines whether the first PTT mobile unit user isauthorized to enter the incident control area based on the dynamicaccess permission.

At step 345, when the first PTT mobile unit user is authorized to enterthe incident control area and the talk group permission rule issatisfied, joint agency server 160 sends the invitation to join thegeotalk group to the first PTT mobile unit user.

At step 350, agency server 107 receives the invitation for the first PTTmobile unit user to join the geotalk group, and sends an acceptance tothe invitation.

At step 355, joint agency server 160 receives the acceptance for thefirst PTT mobile unit user to join the geotalk group. Method 300 ends.

System Implementation

Various aspects of the invention can be implemented by software,firmware, hardware, or a combination thereof. FIG. 5 illustrates anexample system 500 in which the present invention, or portions thereof,can be implemented as computer-readable code and/or text-readable code.After reading this description, it will become apparent to a personskilled in the relevant art how to implement the invention using othersystems and/or processing architectures.

Computer 500 includes one or more processors (also called centralprocessing units, or CPUs), such as processor 510. Processor 510 isconnected to communication bus 520. Computer 500 also includes a main orprimary memory 530, preferably random access memory (RAM). Primarymemory 530 has stored therein control logic (computer software), anddata.

Computer 500 may also include one or more secondary storage devices 540.Secondary storage devices 540 include, for example, hard disk drive 550and/or removable storage device or drive 560. Removable storage drive560 represents a floppy disk drive, a magnetic tape drive, a compactdisk drive, an optical storage device, tape backup, ZIP drive, JAZZdrive, etc.

Removable storage drive 560 interacts with removable storage unit 570.As will be appreciated, removable storage unit 560 includes a computerusable or readable storage medium having stored therein computersoftware (control logic) and/or data. Removable storage drive 560 readsfrom and/or writes to the removable storage unit 570 in a well-knownmanner.

Removable storage unit 570, also called a program storage device or acomputer program product, represents a floppy disk, magnetic tape,compact disk, optical storage disk, ZIP disk, JAZZ disk/tape, or anyother computer data storage device. Program storage devices or computerprogram products also include any device in which computer programs canbe stored, such as hard drives, ROM or memory cards, etc.

In an embodiment, the present invention is directed to computer programproducts or program storage devices having software that enablescomputer 500, or multiple computer 500 s to perform any combination ofthe functions described herein.

Computer programs (also called computer control logic) are stored inmain memory 530 and/or the secondary storage devices 540. Such computerprograms, when executed, direct computer 500 to perform the functions ofthe present invention as discussed herein. In particular, the computerprograms, when executed, enable processor 510 to perform the functionsof the present invention. Accordingly, such computer programs representcontrollers of the computer 500.

Computer 500 also includes input/output/display devices 580, such asmonitors, keyboards, pointing devices, etc.

Computer 500 further includes a communication or network interface 590.Network interface 590 enables computer 500 to communicate with remotedevices. For example, network interface 590 allows computer 500 tocommunicate over communication networks, such as LANs, WANs, theInternet, etc. Network interface 590 may interface with remote sites ornetworks via wired or wireless connections. Computer 500 receives dataand/or computer programs via network interface 590.

CONCLUSION

The invention can be implemented with software, hardware, and operatingsystem implementations other than those described herein. Any software,hardware, and operating system implementations suitable for performingthe functions described herein can be used.

The present invention has been described above with the aid offunctional building blocks illustrating the implementation of specifiedfunctions and relationships thereof. The boundaries of these functionalbuilding blocks have been arbitrarily defined herein for the convenienceof the description. Alternate boundaries can be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

The foregoing description of the specific embodiments will so fullyreveal the general nature of the invention that others can, by applyingknowledge within the skill of the art, readily modify and/or adapt forvarious applications such specific embodiments, without undueexperimentation, without departing from the general concept of thepresent invention. Therefore, such adaptations and modifications areintended to be within the meaning and range of equivalents of thedisclosed embodiments, based on the teaching and guidance presentedherein. It is to be understood that the phraseology or terminologyherein is for the purpose of description and not of limitation, suchthat the terminology or phraseology of the present specification is tobe interpreted by the skilled artisan in light of the teachings andguidance.

Exemplary embodiments of the present invention have been presented. Theinvention is not limited to these examples. These examples are presentedherein for purposes of illustration, and not limitation. Alternatives(including equivalents, extensions, variations, deviations, etc., ofthose described herein) will be apparent to persons skilled in therelevant art(s) based on the teachings contained herein. Suchalternatives fall within the scope and spirit of the invention.

The breadth and scope of the present invention should not be limited byany of the above-described exemplary embodiments, but should be definedonly in accordance with the following claims and their equivalents.

What is claimed is:
 1. A method for management of dynamic Push To Talk(PTT) geotalk groups among members of two or more agencies associatedwith an incident, wherein the two or more agencies communicate securely,wherein an agency includes a collection of communication resourceshaving an administrator, comprising: creating an incident control areaassociated with a geographic demarcation of the incident; electronicallytransmitting information about the incident control area to the two ormore agencies; establishing a talk group permission rule associated withthe incident control area for creating an invitation to join a PTTgeotalk group; electronically transmitting a joint invitation to the twoor more agencies for access to PTT mobile unit users that meet acriteria, wherein the joint invitation includes a request for locationinformation; electronically receiving an acceptance to the jointinvitation that includes a User Identity and Credentials of a first PTTmobile unit user, wherein a dynamic access permission managed by a firstagency determines what information associated with the User Identity andCredentials of the first PTT mobile unit user is made visible to the twoor more agencies, and wherein the dynamic access permission changes inreal time; based on the dynamic access permission, obtaining a locationof the first PTT mobile unit user in real time; determining that thefirst PTT mobile unit user is authorized to enter the incident controlarea based on the dynamic access permission; determining that the talkgroup permission rule is satisfied based on the dynamic accesspermission; and electronically transmitting the invitation to join thePTT geotalk group to the first PTT mobile unit user.
 2. The method ofclaim 1, further comprising: electronically transmitting an audio orvisual prompt to the first PTT mobile unit user to enter a password tocheck-in to the incident control area; and electronically receiving thepassword from the first PTT mobile unit user; comparing the passwordwith the User Identity and Credentials of the first PTT mobile unituser; determining that the comparing is positive; and approving thecheck-in of the first PTT mobile unit user.
 3. The method of claim 1,further comprising: tracking the location of the first PTT mobile unituser in real time, wherein the first PTT mobile unit user is representedby a visual icon displayed on a graphical user interface with respect toa map of the incident control area; and associating the visual icon witha selectable command for electronically transmitting, selecting, anddisplaying information associated with the first PTT mobile unit user.4. The method of claim 3, wherein the information associated with thefirst PTT mobile unit user includes at least one of: an identificationphoto, an agency employer, a title, a position, a rank, a task group, adepartment or division, a function, an assignment, a badge number, anemployee identification number, an incident access level, a birth date,a gender, a skill set, an equipment certification, a professionalqualification, an accreditation, a license, an experience, a telephonenumber, an email address, a mobile computing device ID of the first PTTmobile unit, or an availability status.
 5. The method of claim 3,further comprising: associating the visual icon displayed on thegraphical user interface with a second selectable command that allows aPTT voice message to be sent privately to the first PTT mobile unit userwithout a remaining member of the PTT geotalk group hearing the voicemessage.
 6. The method of claim 1, further comprising: establishing awarning message trigger rule for electronically transmitting a warningmessage; electronically receiving a field information value via a PTTmobile unit associated with the first PTT mobile unit user, wherein thefield information value includes at least one of: an identity; a fieldinformation status; a credential; a location; biological sensormonitoring data; detection or presence of a chemical agent or abiological agent; or detection or presence of a radiological material ora nuclear material; comparing the field information value received withthe warning message trigger rule; determining that the warning messagetrigger rule has been satisfied; and electronically transmitting thewarning message to the first PTT mobile unit user.
 7. The method ofclaim 1, further comprising: establishing an information channelpermission rule for creating an invitation to subscribe to aninformation channel associated with the incident control area, whereinthe information channel permission rule is based on at least one of: atalk group membership of the first PTT mobile unit user, the dynamicaccess permission associated with the first PTT mobile unit user, theidentity of the first PTT mobile unit user, a credential of the firstPTT mobile unit user, a proximity to or a presence in an incidentcontrol area of the first PTT mobile unit user, or a proximity to or apresence in an incident control area of another PTT mobile unit user,wherein the information channel includes at least one of weatherinformation, traffic information, bio-hazard alerts, operational status,updates, or other announcements; determining that the informationchannel permission rule is satisfied; electronically transmitting theinvitation to subscribe to the information channel to the first PTTmobile unit user; and electronically receiving an acceptance from thefirst PTT mobile unit user.
 8. The method of claim 1, furthercomprising: electronically receiving updates, changes, and/orinformation associated with a User Identity and Credentials, a Mobile IDcard, or field information, associated with the first PTT mobile unituser based on the dynamic access permission of the first PTT mobile unituser.
 9. The method of claim 1, further comprising: recording at leastone of: the location of the first PTT mobile unit user, a check-in dateand time of the first PTT mobile unit user entering the incident controlarea, a check-out date and time of the first PTT mobile user departingthe incident control area, a message content received by the first PTTmobile unit user, a message content transmitted by the first PTT mobileunit user, an identifier of the PTT geotalk group, a descriptor of theincident, or an event criteria.
 10. The method of claim 1, wherein thedynamic access permission includes one or more parameters including atleast one of: a severity of the incident, a viewer's proximity to thefirst PTT mobile user, a viewer's proximity to the incident controlarea, a viewer's presence in the incident control area, a proximity ofthe first PTT mobile unit user to the incident control area, or apresence of the first PTT mobile unit user in the incident control area,or at least one of a viewer's information: common talk group membership,identity, position, task, job, title, agency or group affiliation, oraccess privilege status.
 11. A system for management of dynamic Push ToTalk (PTT) geotalk groups among members of two or more agenciesassociated with an incident, wherein the two or more agenciescommunicate securely, wherein an agency includes a collection ofcommunication resources having an administrator, comprising: one or moreprocessors; and a memory coupled to the one or more processors, whereinthe one or more processors are configured to: create an incident controlarea associated with a geographic demarcation of the incident;electronically transmit information about the incident control area tothe two or more agencies; establish a talk group permission ruleassociated with the incident control area, for creating an invitation tojoin a PTT geotalk group; electronically transmit a joint invitation tothe two or more agencies for access to PTT mobile unit users that meet acriteria, wherein the joint invitation includes a request for locationinformation; electronically receive an acceptance to the jointinvitation that includes a User Identity and Credentials of a first PTTmobile unit user, wherein a dynamic access permission managed by a firstagency determines what information associated with the User Identity andCredentials of the first PTT mobile unit user is made visible to the twoor more agencies, and wherein the dynamic access permission changes inreal time; based on the dynamic access permission, obtain a location ofthe first PTT mobile unit user in real time; determine that the firstPTT mobile unit user is authorized to enter the incident control areabased on the dynamic access permission; determine that the talk grouppermission rule is satisfied based on the dynamic access permission; andelectronically transmit the invitation to join the PTT geotalk group tothe first PTT mobile unit user.
 12. The system of claim 11, the one ormore processors further configured to: electronically transmit an audioor visual prompt to the first PTT mobile unit user to enter a passwordto check-in to the incident control area; and electronically receive thepassword from the first PTT mobile unit user; compare the password withthe User Identity and Credentials of the first PTT mobile unit user;determine that the comparing is positive; and approve the check-in ofthe first PTT mobile unit user.
 13. The system of claim 11, the one ormore processors further configured to: track the location of the firstPTT mobile unit user in real time, wherein the first PTT mobile unituser is represented by a visual icon displayed on a graphical userinterface with respect to a map of the incident control area; andassociate the visual icon with a selectable command for electronicallytransmitting, selecting, and displaying information associated with thefirst PTT mobile unit user.
 14. The system of claim 13, wherein theinformation associated with the first PTT mobile unit user includes atleast one of: an identification photo, an agency employer, a title, aposition, a rank, a task group, a department or division, a function, anassignment, a badge number, an employee identification number, anincident access level, a birth date, a gender, a skill set, an equipmentcertification, a professional qualification, an accreditation, alicense, an experience, a telephone number, an email address, a mobilecomputing device ID of the first PTT mobile unit, or an availabilitystatus.
 15. The system of claim 13, the one or more processors furtherconfigured to: associate the visual icon displayed on the graphical userinterface with a second selectable command that allows a PTT voicemessage to be sent privately to the first PTT mobile unit user without aremaining member of the PTT geotalk group hearing the voice message. 16.The system of claim 11, the one or more processors further configuredto: establish a warning message trigger rule for electronicallytransmitting a warning message; electronically receive a fieldinformation value via a PTT mobile unit associated with the first PTTmobile unit user, wherein the field information value includes at leastone of: an identity; a field information status; a credential; alocation; biological sensor monitoring data; detection or presence of achemical agent or a biological agent; or detection or presence of aradiological material or a nuclear material; compare the fieldinformation value received with the warning message trigger rule;determine that the warning message trigger rule has been satisfied; andelectronically transmit the warning message to the first PTT mobile unituser.
 17. The system of claim 11, the one or more processors furtherconfigured to: establish an information channel permission rule forcreating an invitation to subscribe to an information channel associatedwith the incident control area, wherein the information channelpermission rule is based on at least one of: a talk group membership ofthe first PTT mobile unit user, the dynamic access permission associatedwith the first PTT mobile unit user, the identity of the first PTTmobile unit user, a credential of the first PTT mobile unit user, aproximity to or a presence in an incident control area of the first PTTmobile unit user, or a proximity to or a presence in an incident controlarea of another PTT mobile unit user, wherein the information channelincludes at least one of weather information, traffic information,bio-hazard alerts, operational status, updates, or other announcements;determine that the information channel permission rule is satisfied;electronically transmit the invitation to subscribe to the informationchannel to the first PTT mobile unit user; and electronically receive anacceptance from the first PTT mobile unit user.
 18. The system of claim11, the one or more processors further configured to: electronicallyreceive updates, changes, and/or information associated with a UserIdentity and Credentials, a Mobile ID card, or field information,associated with the first PTT mobile unit user based on the dynamicaccess permission of the first PTT mobile unit user.
 19. The system ofclaim 11, the one or more processors further configured to: record atleast one of: the location of the first PTT mobile unit user, a check-indate and time of the first PTT mobile unit user entering the incidentcontrol area, a check-out date and time of the first PTT mobile userdeparting the incident control area, a message content received by thefirst PTT mobile unit user, a message content transmitted by the firstPTT mobile unit user, an identifier of the PTT geotalk group, adescriptor of the incident, or an event criteria.
 20. The system ofclaim 11, wherein the dynamic access permission includes one or moreparameters including at least one of: a severity of the incident, aviewer's proximity to the first PTT mobile user, a viewer's proximity tothe incident control area, a viewer's presence in the incident controlarea, a proximity of the first PTT mobile unit user to the incidentcontrol area, or a presence of the first PTT mobile unit user in theincident control area, or at least one of a viewer's information: commontalk group membership, identity, position, task, job, title, agency orgroup affiliation, or access privilege status.