Low Level Function
7.3.5 Sort Fraud and Violation Notifications
Overview
This Function shall be capable of providing the following facilities:
(1) The ability to carry out the classification of the fraud notifications received from the functionality in other Areas or directly from the Detect Fraud Function.
(2) If the violator's identity is not included in the notification, the ability to send the data that is available to the Identify Violator Function for it to be retrieved.
(3) The ability to carry out the classification according to different criteria: level of seriousness, field (road, financial, commercial...) and repeat offence.
(4) Once the classification has been completed, the ability to send it together with all the other information about the violation to the Establish Prosecution File Function.
Functional Requirements
(a) continuously monitor for the receipt of any fraud (violation) notification sent by the other functionality
(b) when any of the data flows in (a) is received, process it and extract the violator ID
(b) if the violator ID is not in the notification received in (b), extract any elements useful for this identification, and send them to the Identify Violator Function, using the first other output data flow
(c) await receipt of the data resulting from (b) which will arrive in the fifth trigger input data flow
(d) note that the data flow in (c) will be accompanied by the fourth other input data flow
(e) extract from the store of Violations Data the seriousness of the fraud, receiving the data in the third other input data flow
(f) also search in the store of Violations Data to see if the violator has already committed other similar offences before, receiving the data in the second other input data flow
(g) dispatch the notifications according to the format of the fraud in the first trigger output data flow to the Establish Prosecution File Function
(h) send all the data about the fraud (violation) to the Fraud Function, using the second trigger output data flow
(i) where the driver and/or vehicle ID is known, send the data to the Manage Traffic Area, using the appropriate of the first and second trigger output data flows, depending on whether the fraud (violation) was committed in the inter-urban or urban road network.
Diagrams
Parent Higher Level Function
Input logical dataflows
Output logical dataflows
User needs
Number | Description |
| The system shall be able to collect evidence on vehicles that commit traffic signal violations. |
| The system shall be able to collect evidence on vehicles that exceed a local (variable) speed limit. |
| The system shall be able to detect and identify vehicles that exceed the maximum authorised speed limit on selected carriageways. |
| (X)FCD - The system shall be able to match a visual image of a vehicle with the (un-attributable - for privacy protection) identity of a vehicle that is providing FCD and/or XFCD. |