The objective of this proposal is to enhance the proof-of-principle system that was developed in Phase I to manage information delivery to multiple devices. In Phase I, a proof-of-concept prototype was created utilizing several ontologies for devices, data, and communication service providers. As part of this system in Phase II, Vision Systems & Technology, Inc. (VSTI) will enhance the algorithms and software necessary to seamlessly deliver critical information and alerts to the warfighter. Although more information than ever before is available to support the warfighter, the vast proliferation of types of data, devices and protocols makes it increasingly difficult to ensure that the right information is received by the right people at the right time. Warfighters can rapidly shift between information overload and information scarcity depending upon their location and available equipment. The focus for Phase II is to incorporate the ability to handle different security levels. In order to handle many different security levels in an open environment, considering almost all mobile devices communicate on a non-secure network, VSTI will research and implement a secure one-way transfer capability. This will allow messages to be sent from a high-security network to a low-security network, and vice versa. In addition to the focus on security, there will be many enhancements added to the Phase I prototype, including: a. Providing an emergency capability that will disseminate information to all devices regardless of the user preference b. A subscription capability so that the user can subscribe to data that is related to certain topics c. Allow the prototype to handle more service providers, devices and data types d. Allow the prototype to send and receive messages from a secure mobile device, such as: 1. the Sectera Edge Secure Mobile Environment Portable Electronic Device (SME-PED) being developed by General Dynamics 2. the Guardian SME-PED being developed by L3-Communications 3. STU-III Cell Phones e. Research conversion and compression algorithms to analyze whether they will add any benefit to the system The result will be a system that can provide the right information to the right people at the right time efficiently, automatically and reliably regardless of their location or equipment.
Keywords: Information Dissemination, Data Delivery, Device, Communication, Device, Ontology, Data Security, Notification