Proprietary rights statement


Forensic Pathways Limited



Download 1.51 Mb.
Page30/31
Date05.01.2017
Size1.51 Mb.
#7149
1   ...   23   24   25   26   27   28   29   30   31

27.2 Forensic Pathways Limited


Organisation Information


Name of Organisation: Forensic Pathways Limited

Name of Person responsible for completing IPR Report:

Jenny Thomas and Richard Leary



Date Completed: 02/07/2010


Project Software


TITLE: Odyssey Database

DESCRIPTION OF FUNCTIONS:

Data structure identified to store data that will be inputted into the Odyssey Platform.

Design of entity relationship diagram. Implementation of ER diagram to realize the database. The database stores both crime and ballistics data.


DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED:

FPL know how on previous projects. Specifically AGIS but also knowledge gained through business crime work and probation service projects. (I.E storing, organizing and making use of large datasets).

International patent application. Withers and Rodgers. UK patent application Number 0812587.4, “Consolidating Datasets to identify networks of people and the influence of the individual actors in the network over the network.” Date of Filing 20th December 2007.

We also have further patent application in this area – details to follow.



0%



DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS

Microsoft SQL Server – used under appropriate license.



0%



NEW CONTENT

0%

TOTAL

0%



TITLE: Crime Data Visualiser

DESCRIPTION OF FUNCTIONS:

Visualisation of the Crime data that is stored in the Odyssey database. The visualiser takes the data that is stored in the Odyssey database and displays it as a diagram using automated methods. The software enables the user to see on screen crimes, vehicles, weapons and individuals and the ways in which they are linked together. The software also enables the user to see clusters. An example of this might be multiple individuals linked to a single vehicle.

Users can also search the data and then display the results both as a list and also as a graph.

Purpose of the method is to exploit previously unobserved yet emergent properties in homogenous data fed into the system over time and programmed given certain conditions to produce desired, interesting or unexpected results.



DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED:

The crime data visualiser utilises techniques and software of which the Intellectual Property is owned by Forensic Pathways Limited.

The data visualization is built upon proprietary copyright software owned by FPL.

The data visualize is built upon UK Patent Application (subsequent PCT patent application and various international patent applications globally.)

FPL possesses know how and intellectual property concerning optimized methods and techniques for the management, analysis and exploitation of large or complex datasets. These have been widely used by the company in its business operations in the commercial, security, law enforcement and professional services domains.


0%



DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS

As the rights to the software is fully owned by Forensic Pathways there is no third party software.



0%



NEW CONTENT

100%

TOTAL

100%

Other IP created


TITLE: User Requirements

DESCRIPTION OF FUNCTIONS:

The user requirements detail the specific needs of the user community and ultimately what the project aims to produce.

The user requirements are in the form of a document.


DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED:

User requirements developed by the project were based upon domain expertise within FPL regarding the benefits that can be gained by both generating and accessing existing data of various kinds in Ballistics and crime recording and investigation. FPL demonstrated before the project how this can impact upon crime detection and crime reduction. Furthermore, the compounded effect this has when these data flows are automated. In order for this methodology and technique to be realized certain workflow requirements are needed. The user requirements were designed to gain maximum impact from the method.

The user requirements have been drafted using an iterative approach that resulted in ideas being presented to the users prior to the start of the user requirements (these ideas are intellectual property). These ideas were then developed with input from the users thereby developing more intellectual property.


0%



OTHER PARTNERS BACKGROUND USED

%



DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)As referenced in the user requirements document.

%



NEW CONTENT

%

TOTAL

100%



TITLE: Security Requirements


DESCRIPTION OF FUNCTIONS:

The security requirements and architecture describe the specific details of how secure data will be handled by the Odyssey platform and how the security architecture will be organized.



DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED:

Security requirements developed by the project were based upon domain expertise within FPL regarding the benefits that can be gained by both generating and accessing existing data of various kinds in Ballistics and crime recording and investigation. FPL demonstrated before the project how this can impact upon crime detection and crime reduction. Furthermore, the compounded effect this has when these data flows are automated. In order for this methodology and technique to be realized certain workflow requirements are needed. The security requirements were designed to gain maximum impact from the method.

The security requirements have been drafted using an iterative approach that resulted in ideas being presented to the users prior to the start of the security requirements (these ideas are intellectual property). These ideas were then developed with input from the users thereby developing more intellectual property.


0%



OTHER PARTNERS BACKGROUND USED

%



DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN):

The Standard of Good Practice for Information Security was used to guide the drafting of the security requirements. This Standard of Good Practice for Information Security is produced by the Information Security Forum (ISF). The Standard of Good Practice has been made freely available with the following objectives:



  • To promote good practice in information security in all organizations worldwide.

  • To help organizations which are not members of the Information Security Forum to improve their level of security and to reduce their information risk to an acceptable level.

  • To assist in the development of standards that are practical, focused on the right areas and effective at reducing information risk.

%



NEW CONTENT

%

TOTAL

100%



TITLE: Deliverables D2.2 and D3.1. Ballistics Process Model

DESCRIPTION OF FUNCTIONS:

A key element of both deliverables in the ballistics process model. The model in D2.2 shows the process by which ballistics examinations are carried out currently.

The ballistics workflow model in D3.1 shows how ballistics examinations will be carried out with the Odyssey Platform.

Developed from background IP of FPL, 4 pieces of work were created.



  1. A job analysis of the current state of the art of forensic examination of ballistics items.

  2. A job analysis with the future Odyssey platform for ballistics data.

  3. A job analysis of the current state of the art using crime data

  4. A job analysis with the future Odyssey platform using crime data.

DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED:

These process models were built using background IP of FPL. Elements of which were used to write the original proposal.



0%



OTHER PARTNERS BACKGROUND USED

%



DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)

Various sources were used to inform the development of the models. These are all referenced appropriately within the deliverables.



%



NEW CONTENT

%

TOTAL

100%




Download 1.51 Mb.

Share with your friends:
1   ...   23   24   25   26   27   28   29   30   31




The database is protected by copyright ©ininet.org 2024
send message

    Main page