The present disclosure relates generally to building security systems. Particularly, the present disclosure relates to building security systems with false alarm reduction features.
A building security system may receive building data from sensors associated with building equipment. The sensors may trigger an alarm when the building data falls beyond a valid range or indicates an abnormal condition. For an example, an alarm is triggered when one or more outliers are detected in the building data or when building data deviates from normal operating state. However, in some cases, false alarms are triggered due to several factors such as faulty equipment, for example, the equipment may be reaching an end of life state and equipment parts may be wearing out or breaking, misconfigured systems, or behavior of building users such as using an emergency exit as a general exit. Managing such false alarms can be challenging.
One aspect of the present disclosure is a security system of a building. The security system includes a processing circuit configured to detect, based on data of security equipment of the building, that a security alarm of the building is a false alarm. The processing circuit is configured to search, responsive to the detection of the false alarm, a database to identify a past corrective action accepted for implementation and at least one false alarm occurring after the past corrective action was accepted and before detection of the false alarm. The processing circuit is configured to generate a corrective action to reduce an occurrence of the false alarm based on a result of the search. The processing circuit is configured to implement the corrective action to update operation of the security equipment to reduce the occurrence of the false alarm.
In some embodiments, the processing circuit to determine, based on the result of the search, a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm and compare the number of false alarms to a threshold. In some embodiments, the processing circuit is configured to generate the corrective action to reduce the occurrence of the false alarm to be a type the same as the past corrective action responsive to a determination that the number of false alarms is less than the threshold.
In some embodiments, the processing circuit to determine, based on the result of the search, a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm and compare the number of false alarms to a threshold. In some embodiments, the processing circuit is configured to generate the corrective action to reduce the occurrence of the false alarm to be a type different than the past corrective action responsive to a determination that the number of false alarms is greater than the threshold.
In some embodiments, the processing circuit is configured to generate data to cause a graphical user interface to be displayed on a user device, the graphical user interface comprising an indication of the corrective action to reduce the occurrence of the false alarm. In some embodiments, the processing circuit is configured to receive a user interaction to approve or reject the corrective action and update the database to store an indication of the corrective action and the user interaction to approve or reject the corrective action.
In some embodiments, the processing circuit is configured to determine, based on the result of the search, a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm and compare the number of false alarms to a threshold. In some embodiments, the processing circuit is configured to analyze data to determine that the past corrective action was accepted but not implemented and generate the corrective action to reduce the occurrence of the false alarm to be a same type as the past corrective action responsive to a determination that the number of false alarms is greater than the threshold and a determination that the corrective action was not implemented.
In some embodiments, the processing circuit is configured to identify, in the database, a confirmation provided by a user verifying that the past corrective action was implemented. In some embodiments, the processing circuit is configured to compare a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm to a threshold responsive to an identification of the confirmation. In some embodiments, the processing circuit is configured to generate the corrective action to reduce the occurrence of the false alarm to be a same type as the past corrective action responsive to the number of false alarms being less than the threshold.
In some embodiments, the processing circuit is configured to transmit data to an alarm panel located within the building to cause the alarm panel to display an indication of the corrective action. In some embodiments, the processing circuit is configured to receive, from the alarm panel, data indicating whether a user accepted or rejected the corrective action via the alarm panel and update the database with an indication that the corrective action was accepted or rejected by the user.
In some embodiments, the processing circuit is configured to search the database to identify an update to a value of an operating parameter of the security equipment implemented by the corrective action. In some embodiments, the processing circuit is configured to retrieve the value of the operating parameter from the security equipment, determine, based on the value of the operating parameter, whether the update to the value of the operating parameter was implemented, and generate the corrective action based on whether the update to the value of the operating parameter was implemented.
In some embodiments, the processing circuit is configured to implement the corrective action by generating scheduling data to cause a technical to implement the corrective action, generating data to cause a graphical user interface to display instructions to a user to implement the corrective action, or transmitting data to the security equipment updating at least one parameter value of the security equipment causing the security equipment to implement the corrective action.
Another aspect of the present disclosure is a method. The method includes detecting, by one or more processing circuits, based on data of security equipment of a building, that a security alarm of the building is a false alarm. The method includes searching, by the one or more processing circuits, responsive to the detection of the false alarm, a database to identify a past corrective action accepted for implementation and at least one false alarm occurring after the past corrective action was accepted and before detection of the false alarm. The method includes generating, by the one or more processing circuits, a corrective action to reduce an occurrence of the false alarm based on a result of the search. The method includes implementing, by the one or more processing circuits, the corrective action to update operation of the security equipment to reduce the occurrence of the false alarm.
In some embodiments, the method includes determining, by the one or more processing circuits, based on the result of the search, a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm. In some embodiments, the method includes comparing, by the one or more processing circuits, the number of false alarms to a threshold and generating, by the one or more processing circuits, the corrective action to reduce the occurrence of the false alarm to be a type the same as the past corrective action responsive to a determination that the number of false alarms is less than the threshold.
In some embodiments, the method includes determining, by the one or more processing circuits, based on the result of the search, a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm. In some embodiments, the method includes comparing, by the one or more processing circuits, the number of false alarms to a threshold and generating, by the one or more processing circuits, the corrective action to reduce the occurrence of the false alarm to be a type different than the past corrective action responsive to a determination that the number of false alarms is greater than the threshold.
In some embodiments, the method includes generating, by the one or more processing circuits, data to cause a graphical user interface to be displayed on a user device, the graphical user interface comprising an indication of the corrective action to reduce the occurrence of the false alarm. In some embodiments, the method include receiving, by the one or more processing circuits, a user interaction to approve or reject the corrective action. In some embodiments, the method includes updating, by the one or more processing circuits, the database to store an indication of the corrective action and the user interaction to approve or reject the corrective action.
In some embodiments, the method includes determining, by the one or more processing circuits, based on the result of the search, a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm and comparing, by the one or more processing circuits, the number of false alarms to a threshold. In some embodiments, the method includes analyzing, by the one or more processing circuits, data to determine that the past corrective action was accepted but not implemented. In some embodiments, the method includes generating, by the one or more processing circuits, the corrective action to reduce the occurrence of the false alarm to be a same type as the past corrective action responsive to a determination that the number of false alarms is greater than the threshold and a determination that the corrective action was not implemented.
In some embodiments, the method includes identifying, by the one or more processing circuits, in the database, a confirmation provided by a user verifying that the past corrective action was implemented. In some embodiments, the method includes comparing, by the one or more processing circuits, a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm to a threshold responsive to an identification of the confirmation. In some embodiments, the method includes generating, by the one or more processing circuits, the corrective action to reduce the occurrence of the false alarm to be a same type as the past corrective action responsive to the number of false alarms being less than the threshold.
In some embodiments, the method includes transmitting, by the one or more processing circuits, data to an alarm panel located within the building to cause the alarm panel to display an indication of the corrective action. In some embodiments, the method includes receiving, by the one or more processing circuits, from the alarm panel, data indicating whether a user accepted or rejected the corrective action via the alarm panel. In some embodiments, the method includes updating, by the one or more processing circuits, the database with an indication that the corrective action was accepted or rejected by the user.
In some embodiments, the method includes searching, by the one or more processing circuits, the database to identify an update to a value of an operating parameter of the security equipment implemented by the corrective action. In some embodiments, the method includes retrieving, by the one or more processing circuits, the value of the operating parameter from the security equipment. In some embodiments, the method includes determining, by the one or more processing circuits, based on the value of the operating parameter, whether the update to the value of the operating parameter was implemented and generating, by the one or more processing circuits, the corrective action based on whether the update to the value of the operating parameter was implemented.
In some embodiments, the method includes implementing, by the one or more processing circuits, the corrective action by generating scheduling data to cause a technical to implement the corrective action, generating data to cause a graphical user interface to display instructions to a user to implement the corrective action, or transmitting data to the security equipment updating at least one parameter value of the security equipment causing the security equipment to implement the corrective action.
Another aspect of the present disclosure is one or more storage media storing instructions thereon, that, when executed by one or more processors, cause the one or more processors to detect, based on data of security equipment of a building, that a security alarm of the building is a false alarm. The instructions cause the one or more processors to search, responsive to the detection of the false alarm, a database to identify a past corrective action accepted for implementation, at least one false alarm occurring after the past corrective action was accepted and before detection of the false alarm, and an indication of whether the past corrective action was implemented. The instructions cause the one or more processors to generate a corrective action to reduce an occurrence of the false alarm based on a result of the search and implement the corrective action to update operation of the security equipment to reduce the occurrence of the false alarm.
In some embodiments, the instructions, when executed by the one or more processors, cause the one or more processors to determine, based on the result of the search, a number of false alarms occurring after the past corrective action was accepted and before detection of the false alarm and compare the number of false alarms to a threshold. In some embodiments, the instructions cause the one or more processors to analyze data to determine that the past corrective action was accepted but not implemented and generate the corrective action to reduce the occurrence of the false alarm to be a same type as the past corrective action responsive to a determination that the number of false alarms is greater than the threshold and a determination that the corrective action was not implemented.
Various objects, aspects, features, and advantages of the disclosure will become more apparent and better understood by referring to the detailed description taken in conjunction with the accompanying drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.
Before turning to the Figures, it should be understood that the disclosure is not limited to the details or methodology set forth in the description or illustrated in the figures. It should also be understood that the terminology is for the purpose of description only and should not be regarded as limiting.
Referring generally to the figures, a building security system for false alarm reduction is shown and described, according to various exemplary embodiments. The building security system can be utilized in conjunction with a plurality of building automation or management systems, subsystems, or as a part high level building automation system. The building system can identify patterns of events or data measurements of a security system, and identify whether an alarm in a building is a true alarm or a false alarm based on the patterns. For example, the false alarm detection and diagnostic techniques can be performed similar or the same as the techniques described in U.S. patent application Ser. No. 15/947,725 filed Apr. 6, 2018 (now U.S. Pat. No. 10,832,564), U.S. patent application Ser. No. 15/947,722 filed Apr. 6, 2018 (now U.S. Pat. No. 10,832,563), U.S. patent application Ser. No. 15/947,727 filed Apr. 6, 2018 (now U.S. Pat. No. 10,726,711), and U.S. patent application Ser. No. 17/091,731 filed Nov. 6, 2020, the entirety of each of which is incorporated by reference herein.
If the building system detects a false alarm, the building system may identify one or multiple solutions or corrective actions to resolve or reduce the occurrence of the false alarm in the future. The corrective actions can include updating (e.g., increasing) a length of time required for a user to enter an access code into a security panel after opening a door of a building or space. The corrective actions can include relocating a security panel to be closer to an entry door. The corrective actions can include giving a particular user or users training to properly and promptly enter an access code after entering a building. The corrective actions can be to change the door which employees or tenants enter through. However, the building system may not be able to precisely identify which corrective action to surface to a user as a recommendation. Furthermore, even if the building system does surface the recommendation to the user, the user may or may not actually implement the corrective action or may not properly implement the corrective action.
To solve these and other technical challenges, the building system can present one or multiple false alarm reduction recommendations for one or multiple different corrective actions to prevent false alarms from occurring. The building system can detect which recommendation the user selects. Responsive to detecting a selection by the user of a recommendation, the building system can generate, create, construct, or update a database or data repository to identify the false alarm, a type of the false alarm, the corrective actions recommended to the user, and the corrective action that the user selected for implementation. The building system can monitor new security system data to identify and detect new false alarms after the corrective action is recommended or implemented. The building system can use the database of false alarm data to detect whether a previous corrective action implemented by a user was successful or not in reducing false alarms. For example, the building system can identify the number of false alarms of a particular false alarm type between the implemented corrective action and a present time. The building system can compare the number of false alarms to a threshold or predefined value to determine whether the corrective action was successful in reducing the false alarms or unsuccessful in reducing the false alarms.
Responsive to identifying that the solution recommended by the building system was successful in resolving false alarms in the past, the building system can determine to generate a recommendation to implement the same false alarm reduction action as performed in the past. However, responsive to identifying that the solution recommended by the building system in the past was not successful in resolving false alarms, the building system can generate a recommendation to implement a different corrective action or corrective actions.
Furthermore, if the building system determines that a corrective action was not successful in reducing a false alarm, the building system can determine whether the corrective action was actually implemented or not or whether the corrective action was properly implemented. If the building system generates adds data to the database indicating that the false alarm reduction action was not successful in reducing false alarms, but the corrective action was actually not ever implemented or not implemented properly, the database may store false data. This can reduce the performance of various consuming systems that may run on the database, for example, other false alarm reduction systems, machine learning models, artificial intelligence systems, etc. For example, a machine learning model trained on a database including false data may have a reduced performance.
Accordingly, the building system can perform an analysis before recording an indication that a false alarm reduction corrective action was unsuccessful in reducing a false alarm. The building system can read various registers or memory locations of various devices to detect whether the false alarm reduction corrective action was implemented at all or implemented properly. For example, if the false alarm reduction action was to implement an update to a required length of time between a door being opened and entry of a code into a security panel, the building system can query security devices of the building, e.g., the security panel for the stored length of time. The building system can compare the store length of time against the length of time for the corrective action to determine whether the security system was operating on the length of time identified to reduce false alarms. Furthermore, if the corrective action was user implemented, e.g., performing training, relocating a security panel, etc. the building system can query a user and ask the user to confirm whether the false alarm solution was implemented. In some cases, the building system can query a supervisor of the user that was assigned to implement the corrective action to verify whether the corrective action was implemented or not.
Responsive to the building system identifying that the corrective action was properly implemented but was still unsuccessful in reducing false alarms, the building system can recommend a different type of corrective action to the user and record an indication of the corrective action being unsuccessful in reducing the particular type of false alarm. Responsive to the building system identifying that the corrective action was not properly implemented, the building system can recommend the same corrective action or same type of corrective action to the user and monitor whether the corrective action is implemented properly and successful in reducing the false alarm.
Referring now to
Both the building 100 and the parking lot 110 are at least partially in the field of view of the security camera 102. In some embodiments, multiple security cameras 102 may be used to capture the entire building 100 and parking lot 110 not in (or in to create multiple angles of overlapping or the same field of view) the field of view of a single security camera 102. The parking lot 110 can be used by one or more vehicles 104 where the vehicles 104 can be either stationary or moving (e.g. busses, cars, trucks, delivery vehicles). The building 100 and parking lot 110 can be further used by one or more pedestrians 106 who can traverse the parking lot 110 and/or enter and/or exit the building 100. The building 100 may be further surrounded, or partially surrounded, by a sidewalk 108 to facilitate the foot traffic of one or more pedestrians 106, facilitate deliveries, etc. In other embodiments, the building 100 may be one of many buildings belonging to a single industrial park, shopping mall, or commercial park having a common parking lot and security camera 102. In another embodiment, the building 100 may be a residential building or multiple residential buildings that share a common roadway or parking lot.
The building 100 is shown to include a door 112 and multiple windows 114. An access control system can be implemented within the building 100 to secure these potential entrance ways of the building 100. For example, badge readers can be positioned outside the door 112 to restrict access to the building 100. The pedestrians 106 can each be associated with access badges that they can utilize with the access control system to gain access to the building 100 through the door 112. Furthermore, other interior doors within the building 100 can include access readers. In some embodiments, the doors are secured through biometric information, e.g., facial recognition, fingerprint scanners, etc. The access control system can generate events, e.g., an indication that a particular user or particular badge has interacted with the door. Furthermore, if the door 112 is forced open, the access control system, via door sensor, can detect the door forced open (DFO) event.
The windows 114 can be secured by the access control system via burglar alarm sensors. These sensors can be configured to measure vibrations associated with the window 114. If vibration patterns or levels of vibrations are sensed by the sensors of the window 114, a burglar alarm can be generated by the access control system for the window 114.
Referring now to
The security systems 202a-202d may communicate with, or include, various security sensors and/or actuators, building subsystems 204. For example, fire safety subsystems 206 may include various smoke sensors and alarm devices, carbon monoxide sensors, alarm devices, etc. Security subsystems 208 are shown to include a surveillance system 210, an entry system 212, and an intrusion system 214. The surveillance system 210 may include various video cameras, still image cameras, and image and/or video processing systems for monitoring various rooms, hallways, parking lots, the exterior of a building, the roof of the building, etc. The entry system 212 can include one or more systems configured to allow users to enter and exit the building (e.g., door sensors, turnstiles, gated entries, badge systems, etc.) The intrusion system 214 may include one or more sensors configured to identify whether a window or door has been forced open. The intrusion system 214 can include a keypad module for arming and/or disarming a security system and various motion sensors (e.g., IR, PIR, etc.) configured to detect motion in various zones of the building 100a.
Each of buildings 100a-100d may be located in various cities, states, and/or countries across the world. There may be any number of buildings 100a-100d. The buildings 100a-100d may be owned and operated by one or more entities. For example, a grocery store entity may own and operate buildings 100a-100d in a particular geographic state. The security systems 202a-202d may record data from the building subsystems 204 and communicate collected security system data to the cloud server 216 via a network.
In some embodiments, the network 228 communicatively couples the devices, systems, and servers of the system 200. In some embodiments, the network 228 is at least one of and/or a combination of a Wi-Fi network, a wired Ethernet network, a ZigBee network, a Bluetooth network, and/or any other wireless network. The network 228 may be a local area network and/or a wide area network (e.g., the Internet, a building WAN, etc.) and may use a variety of communications protocols (e.g., BACnet, IP, LON, etc.). The network 228 may include routers, modems, and/or network switches. The network 228 may be a combination of wired and wireless networks.
The cloud server 216 is shown to include a security analysis system 218 that receives the security system data from the security systems 202a-202d of the buildings 100a-100d. The cloud server 216 may include one or more processing circuits (e.g., memory devices, processors, databases) configured to perform the various functionalities described herein. The cloud server 216 may be a private server. In some embodiments, the cloud server 216 is implemented by a cloud system, examples of which include AMAZON WEB SERVICES® (AWS) and MICROSOFT AZURE®.
A processing circuit of the cloud server 216 can include one or more processors and memory devices. The processor can be a general purpose or specific purpose processor, an application specific integrated circuit (ASIC), one or more field programmable gate arrays (FPGAs), a group of processing components, or other suitable processing components. The processor may be configured to execute computer code and/or instructions stored in a memory or received from other computer readable media (e.g., CDROM, network storage, a remote server, etc.).
The memory can include one or more devices (e.g., memory units, memory devices, storage devices, etc.) for storing data and/or computer code for completing and/or facilitating the various processes described in the present disclosure. The memory can include random access memory (RAM), read-only memory (ROM), hard drive storage, temporary storage, non-volatile memory, flash memory, optical memory, or any other suitable memory for storing software objects and/or computer instructions. The memory can include database components, object code components, script components, or any other type of information structure for supporting the various activities and information structures described in the present disclosure. The memory can be communicably connected to the processor via the processing circuit and can include computer code for executing (e.g., by the processor) one or more processes described herein.
In some embodiments, the cloud server 216 can be located on premises within one of the buildings 100a-100d. For example, a user may wish that their security, fire, or HVAC data remain confidential and have a lower risk of being compromised. In such an instance, the cloud server 216 may be located on-premises instead of within an off-premises cloud platform.
The security analysis system 218 may implement an interface system 220, an alarm analysis system 222, and a database storing historical security data 224, security system data collected from the security systems 202a-202d. The interface system 220 may provide various interfaces of user devices 226 for monitoring and/or controlling the security systems 202a-202d of the buildings 100a-100d. The interfaces may include various maps, alarm information, maintenance ordering systems, etc. The historical security data 224 can be aggregated security alarm and/or event data collected via the network 228 from the buildings 100a-100d. The alarm analysis system 222 can be configured to analyze the aggregated data to identify insights, detect alarms, reduce false alarms, etc. The analysis results of the alarm analysis system 222 can be provided to a user via the interface system 220. In some embodiments, the results of the analysis performed by the alarm analysis system 222 are provided as control actions to the security systems 202a-202d via the network 228.
Referring now to
The ACS 300 can be configured to grant or deny access to a controlled or secured area. For example, a person 310 may approach the access reader module 304 and present credentials, such as an access card. The access reader module 304 may read the access card to identify a card ID or user ID associated with the access card. The card ID or user ID may be sent from the access reader module 304 to the access controller 301, which determines whether to unlock the door lock 303 or open the door 302 based on whether the person 310 associated with the card ID or user ID has permission to access the controlled or secured area.
Referring now to
In addition to a traditional processor and memory, the processing circuit 502 may include integrated circuitry for processing and/or control, e.g., one or more processors and/or processor cores (e.g., microprocessor and/or microcontroller) and/or FPGAs (Field Programmable Gate Array) and/or ASICs (Application Specific Integrated Circuitry). The processing circuit 502 can include and/or be connected to and/or be configured for accessing (e.g., writing to and/or reading from) the memory 506, which may include any kind of volatile and/or non-volatile memory, e.g., cache and/or buffer memory and/or RAM (Random Access Memory) and/or ROM (Read-Only Memory) and/or optical memory and/or EPROM (Erasable Programmable Read-Only Memory).
The memory 506 can be configured to store code executable by control circuitry and/or other data, e.g., data pertaining to communication, e.g., configuration and/or address data of nodes, etc. The processing circuit 502 can be configured to implement any of the methods described herein and/or to cause such methods to be performed, e.g., by the processor 504. Corresponding instructions may be stored in the memory 506, which may be readable and/or readably connected to the processing circuit 502. It may be considered that the processing circuit 502 includes or may be connected or connectable to the memory 506, which may be configured to be accessible for reading and/or writing by the controller and/or the processing circuit 502.
The security system 202a is shown to include a communication interface 508. The communication interface 508 can be configured to facilitate communicate with a domain expert device 510 and/or the security system 202a. Furthermore, the communication interface 508 can be configured to communicate with all of the devices and systems described with reference to
Via the communication interface 508, the historical security database 512 can be configured to receive (collect) and store security system data from the security system 202a. The security system data may be events such as an occurrence detected by a sensor of the security system 202a. For example, an intrusion sensor may identify that an individual is trying to force a window open. Another event may be a door being opened or closed. The detection of an occupant walking through the door may also be an event. The events 514 can further include signals. For example, a signal may be a continuously signal of a door being open and door being closed.
The memory 506 is shown to include an event analyzer 516. The event analyzer 516 can be configured to generate false alarm rules 518 that are shown to be stored by the memory 506. The event analyzer 516 can be configured to generate particular sequences of events 514 and generate rules based on the sequences of events 514. Certain sequences of events 514 can be identified as important by the event analyzer 516, these sequences can be used by the event analyzer 516 to generate the false alarm rules 518. The false alarm rules 518 can be rules identifying that particular sequences of events are and/or lead to false alarms. The false alarm rules 518 may include a recommendation 526 which may instruct an end user to perform an action which reduces false alarms (e.g., adjusting a building equipment parameter, training building personal, replacing a piece of building equipment, reducing false alarms related to churn, etc.). For example, an alarm rule 518 may indicate that a particular sequence of events indicates a poorly positioned door sensor. For this sequence of events, the recommendation 526 may be to have a technician reposition the door sensor.
The event analyzer 516 can be configured to perform Markov Chain analysis to determine important sequences of events 514. The event analyzer 516 can be configured to generate a Markov Chain transition matrix which identifies the relationships between events and probabilities of each transition between events. For example, a first order transition matrix may be defined by A, where ai,j is a probability for a particular transition from a state i to a state j.
Furthermore, the event analyzer 516 can be configured to use a first order Markov Chain to determine important transitions between events. A first order Markov Chain may be a Markov Chain where the probability of a second event occurring after a single first event. The first order Markov Chain may identify important transitions between events 514, important sequences.
Furthermore, the event analyzer 516 can be configured to implement a second order Markov Chain to analyze the events 514. A second order transition may be a transition where the probability of a third event occurring after two prior events. The event analyzer 516 can be configured to analyze the events 514 with a second order transition to check for accuracy of the first order Markov Chain, e.g., verify that the identified events are important, and further identify additional sequences of events. The event analyzer 516 can be configured to implement any order of Markov Chain analysis and can be configured to determine an optimal order for the Markov Chain analysis. For example, a user may identify a predefined number of false alarm rules 518 and the event analyzer 516 can perform Markov Chain analysis to determine a particular Markov Chain order that results in the predefined number of false alarm rules 518.
The transitions between events 514 may be time based. The transition matrices can be built by the event analyzer 516 for different time intervals between events. Every event sequence or transition of events determined by the event analyzer 516 can be considered an issue and can be assigned as a false alarm rule 518. An appropriate fix or response can be assigned to the false alarm rule 518 by the domain expert, e.g., the recommendation 526.
The memory 506 can be configured to store events 514 and/or sequences of events in a historical security database 512. The processing circuit 502 can be configured to analyze a sequence of events 514 with Generalized Sequential Pattern (GSP) analysis to generate pattern information for alarm rules 518. More specifically, the event analyzer 516 can be configured to analyze the events 514 with GSP analysis. This is further described with reference to
The event analyzer 516 can be configured to perform GSP mining to determine sequences from the events 514. By using GSP, the event analyzer 516 can be configured to empirically determine inherent causality relationships between events. The alarm rules 518 can be determined from the various sequences of events 514 determined by the event analyzer 516. The false alarm rules 518 may indicate that a particular sequences of events is indicative of a situation for issue that causes false alarms. For example, a rule may be “Communication Issue” and may be associated with a maintenance activity “Wiring replacement needed.” A particular sequence for this false alarm rule 518 may be:
CF_COMM_Trouble→BA_Overhead_Door(s)
This false alarm rule 518 can indicate that a burglar alarm sensor for a door triggers after a communication issue is sensed for the burglar alarm sensor. A recommendation to prevent false alarms occurring for the burglar alarm sensor may be to perform maintenance on the burglar alarm and/or replace the communication wiring for the burglar alarm sensor.
The event analyzer 516 can be configured to perform a parameter search. The parameter search may be on a time dimension parameter search. A particular time interval may be used for the parameter search such that transitions between events occur within the time interval. The parameter search can group events by time such that a sequential pattern analysis of events looks at a particular group of events that occur within a predefined amount of time or a within predefined amount of time from each other. Another dimension for the parameter search may be a spatial parameter that groups events that occur in a predefined area and/or within a predefined distance from each other. The GSP mining can be applied by the event analyzer 516 to identify particular event sequences and use these event sequences against or in generating the alarm rules 518.
The domain expert device 510 may be a device that a domain expert uses to access the false alarm rules 518. The domain expert device 510 may be the same and/or similar to the user devices 314. A domain expert associated with the domain expert device 510 can provide the recommendations 526 for each of the false alarm rules 518. For example, the domain expert, via the domain expert device 510, can review the false alarm rules 518 and provide the recommendation 526 for each false alarm rule 518. The domain expert device 510 can provide recommendation 526 that indicates a particular cause of a false alarm. For example, for a communication issue, the recommendation 526 may indicate that communication wires should be replaced or inspected by a technician.
The recommendation generator 522 can be configured to identify whether an event 514 and/or sequence of events 514 are indicative of a situation causing a false alarm or indicating that a false alarm could occur. The recommendation generator 522 can determine whether an event or sequence of events meet a false alarm rule 518. Based on the recommendation 526, the recommendation generator 522 can provide suggestions or insights to a user device 226. The suggestion may be to perform maintenance, e.g., inspecting or replacing communication wires. Furthermore, the recommendation may be to change a parameter of a sensor device. For example, a door delay parameter might be increased to prevent a false alarm pertaining to a door.
Table 2 below indicates recommendations that can be provided to an end user to reduce situations or events that cause false alarms. The recommendations may be the same as and/or similar to the recommendations 526. In Table 2, each recommendation indicates a title and a recommendation description. In some embodiments, the recommendation names and/or recommendation descriptions are provided by the domain expert of the domain expert device 510 for particular events and/or event sequences, i.e., for a false alarm rule 518. In various embodiments, the alarm analysis system 222 can classify various events and/or event sequences into one of the recommendations shown in Table 2 below, i.e., the domain expert of the domain expert device 510 can define the recommendations of Table 2 and then the alarm analysis system 222 can train a classifier to assign particular event sequences a recommendation name and/or recommendation description from Table 2.
The Bayesian predictor 520 can be configured to predict whether a false alarm rule 518 will trigger in the future. The Bayesian predictor 520 can be configured to implement a Bayesian model and/or a hierarchical Bayesian model. Based on a framework for the Bayesian model and the events 514, the Bayesian predictor 520 can be configured to generate a prediction of what rules will fire in the future (what issues will occur in the future). For example, the Bayesian predictor 520 can be configured to implement a Bayesian model to determine how many door delay alarms will occur one week into the future. The predictions can be provided to the interface system 220.
The interface system 220 can be configured provide a dashboard to the user device 226. The interface system 220 is shown to include a dashboard generator 524. The dashboard generator 524 can be configured to receive the indications of actions to take to reduce or suppress false alarms from the recommendation generator 522 and predictions from the Bayesian predictor. Examples of the interfaces that can be generated by the dashboard generator 524 are the interfaces shown in
The new data scorer 527 can be the same as and/or similar to the event analyzer 516. The new data scorer 527 can be configured to implement GSP mining or Markov transition analysis. The new data scorer 527 can be configured to update the false alarm rules 518 based on new events 514 received form the security system 202a. This second round of analytics may identify new alarm rules 518 or improve or remove past alarm rules 518.
Referring now to
In step 550, the alarm analysis system 222 can receive events 514 from the security system 202a. The events may be doors opening or closing, a window being forced open, movement detected in a particular zone, etc. In step 552, the event analyzer 516 can be configured to analyze the events 514 to identify various alarm rules 518. In some embodiments, analyzing the events 514 may include performing a first order Markov transition analysis, a second order Markov transition analysis, and/or any order Markov transition analysis. Furthermore, the analysis may include performing a GSP analysis of the events 514 in addition to various other pattern mining algorithms e.g., Sequential PAttern Discovery Using Equivalence Classes (SPADE), FreeSpan, PrefixSpan, MAPres, etc. Identifying the false alarm rules 518 is described with further reference to
In step 554, the recommendation generator 522 can determine whether a false alarm rule has triggered (e.g., determining whether a false alarm has occurred or will occur) based on the events 514 and the alarm rules 518. An indication that a false alarm has or will occur may be indicative of a situation in the building 10a that is causing false alarms. Examples of such a situation may be an improperly installed or operated piece of building equipment of the building 10a. In some embodiments, certain events 514 may occur within the building 10a when a false alarm occurs. In some embodiments, the certain events 514 may occur within the building 10a although no alarm has yet occurred. Based on the alarm rules 518, the recommendation generator 522 may determine, that based on particular patterns of the events 514, that a false alarm has occurred or may occur in the future.
In step 556, the Bayesian predictor 520 can determine a prediction for alarm rules 518 occurring in the future. The Bayesian predictor 520 can implement Bayesian modeling to identify whether a false alarm will occur in the future based on the events 514 and the alarm rules 518. More specifically, based on historical data of past alarm rules 518 triggering, the Bayesian predictor 520 can predict how many alarm rules will trigger in the future. In step 558, based on the identified false alarms and the predictions of future alarms as determined in steps 554 and 558, a recommendation can be generated by the interface system 220. The recommendation may be to adjust the installation of sensors, adjust the parameters of the sensors, or order technician service. The maintenance recommendation can help prevent false alarms from occurring in the future. This insight may be based on the recommendation 526 associated with a triggered alarm rule 518.
In step 560, the interface system 220 can provide the recommendation to a user via user device 226. In this regard, various dashboards and interfaces can be generated by the dashboard generator 524 to display the recommendations to the user. The user can review the recommendations via the user device 226 and take appropriate action. In some embodiments, the user may approve a particular setting change which the alarm analysis system 222 can implement. In step 562, in response to receiving a confirmation to update various sensor or system parameters to avoid false alarms, the alarm analysis system 222 can implement the various changes.
Referring now to
Referring more particularly to
In step 606, the event analyzer 516 can perform a generalized sequential patterning mining (GSP) method to identify one or more sequences, i.e., causality relationships between events. The GSP method can identify important sequences of events, i.e., sequences which occur frequently.
Steps 608 and 610 can be optional steps performed by the event analyzer 516 to generate the alarm rules 518. This can be performed in addition to, or in place of, the GSP analysis. In step 608, the event analyzer 516 can determine sequences, e.g., transitions between events and can determine the importance of the transitions e.g., how often the transition occurs with a first order Markov chain analysis. A first order Markov chain analysis may identify the probability of a future event based on a single previous event.
In step 610, the event analyzer 516 can confirm whether the sequences identified as significant in step 608 are still significant and can further identify additional sequences with a second order Markov chain analysis. The second order Markov chain analysis may identify sequences of events that occur frequency. The second order Markov chain analysis may identify the probability of a future event based on two past events. The sequences determined by the first order Markov chain analysis can be compared to the sequences determined by the second order Markov chain analysis to verify that the sequences of the first order analysis are determined to be significant under the second order analysis. If the second order analysis determines that the first order sequences are not important, these sequences can be removed. Furthermore, additional sequences can be identified by the event analyzer 516 via the second order Markov chain analysis.
In step 612, the event analyzer 516 can determine one or more false alarm rules 518 from the sequences determined by the GSP mining of step 606 or the Markov chain analysis of steps 608 and 610. In some embodiments, the event analyzer 516 can determine a top n rules that are significant from both the GSP mining and/or the Markov chain analysis. The top n rules may be the most significant rules for a particular system, a particular building site, and/or for multiple building sites. In some embodiments, the frequency at which the sequences occur is used to select the sequences. For example, the top n most frequently occurring sequences may be selected. The top n sequences can be used to form alarm rules 518. In some embodiments, the alarm rules and/or sequences are categorized and adjusted by the domain expert associated with the domain expert device 510. For example, the domain expert device 510 may provide recommendation 526 for each of the false alarm rules 518.
Referring to
As described elsewhere herein, the event analyzer 516 can utilize Markov properties to analyze a sequence of events 514 received from the security system 202a. By only considering the previous signal, i.e., a first order Markov chain (as shown in
Some embodiments include observation of second order transitions to check for accuracy or new patterns. The transitions may be time based. These observations can be made for different time intervals at definite data granularity, built at a system number level. As an example, patterns that may emanate from first and second order transitions are Equations 8 and 9.
CF_COMM_Trouble→BA_Overhead_Door(s):A false alarm due to a communication issue (Equation 8)
TR_INVALID_CD_ENTRD→BA−DOOR: A true alarm (Equation 9)
For the false alarm of Equation 8, an associated recommendation can be linked for reducing false alarms. In some embodiments, the recommendation includes one or multiple actions. For example, the actions may be “replace battery” or “wiring replacement needed.”
Every transition as determined from a first and/or second order Markov analysis can be viewed as a potential issue and an appropriate fix may be assigned to these issues. As described elsewhere herein, a domain expert associated with the domain expert device 510 can help classify the transition as false alarms (e.g., the transition of Equation 8) or true alarms (e.g., the transition of Equation 9).
The transitions of
Referring to
Referring to
More specifically, the Markov chain model and/or the GSP algorithm can be used to determine a cause (which may be user action, or for example, incorrect installation of equipment) of a sequence of events that leads to an alarm. These can form action insights. For example, suppose the following rule is termed as very significant by the GSP algorithm.
OPEN/CLOSE→BA,BA−IR (Equation 10)
A database can be consulted by looking at all the events that the rule of Equation 10 satisfies and identifying patterns of the signal giving rise to the alarm. As a result, suppose the following patterns of Table 4 are found, the first pattern and the second pattern, where OPEN is an open window or door event, BA is a burglary alarm event, BA-IR is a burglar alarm event based on infrared detection, BA-DOOR is a burglary alarm event based on an open door, and is a closed door event.
With the help of a domain expert, a rule of Table 3 may be classified and all the patterns under this rule (e.g., the First Pattern and the Second Pattern of Table 4) can be labeled as Motion Sensor Sensitivity. These patterns may be the result of motion sensors being activated before or after the door of interest is either closed or opened. This may lead to numerous of false alarms. A recommended fix may be to reduce the sensitivity of the motion sensors or to move the motion sensors to a different place.
Referring now to
Referring more particularly to
In step 904, the alarm analysis system 222 can receive recommendations 526 for the determined false alarm rules 518. The recommendation 526 may be a recommended activity that should be performed, e.g., adjusting a parameter value, performing maintenance, adjusting or reinstalling a sensor, etc. The domain expert can also provide a title for the alarm rule 518. In some embodiments, the alarm analysis system 222 provides the recommendations 526 to the domain expert device 510. The domain expert, via the domain expert device 510, may remove rules, update rules, filter rules, combine rules, etc. The domain expert may classify some rules as indicative of a false alarm and other rules as indicative of a true alarm.
The recommendation 526 may be “send a remote tech to the site” and can be provided by the domain expert device 510. Furthermore, the recommendation 526 can be derived from the event data of the alarm rule 518. An example of a derived title may be “usage of wrong door.”
In step 906, the rules can be applied to new event data received from the security system 202a. The new event data may satisfy one of the alarm rules 518 that is a rule for a false alarm, the recommendation generator 522 may determine that a false alarm has occurred or may occur in the future based on the event pattern. The recommendation 526 (e.g., resolution for those causes) associated with the rule that has triggered can be used to generate insights which can be passed to an end user associated with the user device 226 or to the domain expert associated with the domain expert device 510 (step 908). Some of these recommendations are to remotely program the remote programming the security system 202a. In this regard, the alarm analysis system 222 may automatically adjust one or more operating parameters of the security system 202a. In some embodiments, the insight provided to the user prompts the user to approve an automatic adjustment.
In step 910, the historical security database 512 may be updated with new events. The new data scorer 527 can be configured to perform a second round of analytics to score the alarm rules 518 (step 912). The new data scorer 527 can determine whether the alarm rules 518 are accurate and if any changes or updates need to be made to the alarm rules 518. Furthermore, the new data may occur in response to parameter changes remotely made for the security system 202a. Therefore, new data scorer 527 can be configured to add new alarm rules 518 or remove old alarm rules 518 that are no longer relevant after the remote parameter changes have been made.
The process 900 can be performed continuously and can allow the complete system to be in a steady state with reduced false alarms. By self-healing, remotely and automatically adjusting parameters for the security system 202a, the process 900 can keep the security system 202a working in the right condition.
Process 900 relates to what happens at the system, how much did the system drift from the normal operations and what actions we need to take to make it return to normal operating mode with reduced false alarms.
Referring now to
In step 1002, the Bayesian predictor 520 can be configured to generate a Bayesian model specification for a false alarm rule 518. The Bayesian model specification may model a likelihood function of the false alarm rule based on one or more priors (e.g., informative priors and/or non-informative priors), hyper-priors (e.g., informative hyper-priors and/or non-informative hyper-priors), parameters, and/or hyper-parameters. An example of a Bayesian model specification and probabilistic programming is shown in
In step 1004, the Bayesian predictor 520 can receive historical data for the false alarm rule 518. In some embodiments, the Bayesian predictor 520 receives data indicating when the alarm rule has been triggered and how many times the alarm rule has been triggered in a particular period of time in the past. In step 1006, based on the model specification and the historical data of the alarm rule, the Bayesian predictor 520 can generate a posterior for the alarm rule. The posterior may be a probability distribution for a parameter of the Bayesian model specification based on both prior assumptions for parameter of the Bayesian model specification and the historical data for the parameter.
In step 1008, based on the posterior distribution, predictions for the alarm rule can be made for a future period of time. For example, based on the posterior distribution, a frequency of times that the alarm will fire in the future is determined. For example, for a week into the future, the future prediction may indicate a probability distribution may indicate may many times the alarm may occur in the future week.
In step 1010, based on the future prediction, the recommendation generator 522 can generate a recommendation to perform parameter changes, order maintenance, etc. In some embodiments, recommendation generator 522 may generate an insight based on the recommendation 526 for the predicted alarm if the alarm is predicted to occur a predefined amount of times in the future. In step 1012, the interface system 220 can provide the insight to the user device 226. In some embodiments, the insight may be to adjust parameters or perform maintenance on the security system 202a. In some embodiments, if the recommendation for the rule is to update or adjust a parameter, the alarm analysis system 222 can automatically perform the parameter adjustment.
Referring to
In some embodiments, a Bayesian analysis, e.g., the Bayesian analysis detailed with reference to
Referring now to
The event-series data 1102 can be analyzed by the parameter searcher 1104. The parameter searcher 1104 can be configured to generate the enriched time-series data 1112. The enriched time-series data 1112 can be generated from the event-series data 1102 based on the time searcher 1106, the signature searcher 1108, and the spatial searcher 1110 of the parameter searcher 1104. The parameter searcher 1104, via the time searcher 1106, the signature searcher 1108, and the spatial searcher 1110, can group and analyze the event-series data 1102 to generate related and grouped event data, i.e., the enriched time-series data 1112. In some embodiments, the parameter searcher 1104 can be configured to group data based on data granularity, e.g., site level, system level, based on verticals, etc.
In some embodiments, time searcher 1106 can be configured to generate the enriched time-series data 1112 based on a time parameter. The time parameter may act as a time window that filters the event-series data 1102 to generate the enriched time-series data 1112. The time searcher 1106 can generate the enriched time-series data 1112 by grouping the event-series data 1102 by determining events that occur within the time window (e.g., a fifteen minute time window). In some embodiments, the time window is arrived at by performing multiple iterations that testing various value for the time window (e.g., incrementing the time window for each iteration). An example of grouping the event-series data 1102 based on a time window may be the following. A time window is set to 10 minutes and a first event A that is associated with a time stamp 10:30 A.M. is grouped with a second event B that is associated with a time stamp of 10:35 A.M. However, a third event C associated with a time stamp of 10:57 A.M. is not grouped with the first event A.
The spatial searcher 1110 can be configured to group the events based on associations between spatial location filter. For example, occupancy detection in a Zone A may be grouped with occupancy detection in a Zone B since the spatial location filter may be configured to group events associated with Zone A and events associated with Zone B. This may be because Zone A and Zone B are located next to each other in the building 10. In some embodiments, the spatial searcher 1110 can include a spatial distance. Events that occur within the spatial distance, i.e., a predefined distance from each other or within a predefined area, can be grouped. However, the value for the spatial window can be iteratively updated until a predefined number of event sequences 1118 are determined. For example, the spatial distance could start at a low value and be iteratively increased until a predefined number of event sequences 1118 are determined. Similarly, the time searcher 1106 could start at a small time window and iteratively increase the time window by a predefined amount until a predefined amount of event sequences 1118 are determined.
The signature searcher 1108 can be configured to search the event-series data 1102 with a signature parameter. The signature parameter can identify events of the event-series data 1102 that are associated with specific binary patterns. For example, a particular binary pattern may be the signature 1114. For example, the signature 1114 may be used to group particular events together if they fit the pattern of the signature 1114.
The enriched time-series data 1112 can be fed into the sequence analyzer 1116. The sequence analyzer 1116 can be configured to analyze the enriched time-series data 1112 to generate the event sequences 1118. For example, the sequence analyzer 1116 can be configured to perform a GSP algorithm and/or a Markov Chain Analysis as discussed with further reference to
The sequence analyzer 1116 can be configured to adjust the parameters used by the parameter searcher 1104 to perform the grouping of the event-series data 1102 to generate the enriched time-series data 1112. The sequence analyzer 1116 can generate updated search parameters 1120 and utilize the updated search parameters 1120 to recursively update the enriched time-series data 1112. In this regard, the sequence analyzer 1116 can iteratively determine the event sequences 1118 by generating and/or adjusting the updated search parameters 1120. The sequence analyzer 1116 can adjust the update search parameters 1120 until desired (e.g., optimal) updated search parameters 1120 are identified by the sequence analyzer 1116. For example, the identified search parameters may be search parameters that cause a predefined number of event sequences 1118 to be identified.
The event sequences 1118 can be used to generate the false alarm rules 518. The alarm analysis system 222 can present the event sequences 1118 to the domain expert via the domain expert device 510 so that the domain expert can accept or reject the event sequences 1118 as the false alarm rules and provide the recommendation 526 to each of the false alarm rules 518.
Referring now to
The recommendation 1208 may be a recommendation to replace a battery, reposition a sensor, adjust a door delay time, etc. The recommendation 1208 may be paired with the particular false alarm rule that applies to the historical event 1200. An update identifier 1212, based on the recommendation 1208 and the historical events 1200, can generate a parameter update 1214 for the building subsystems of the building 10a. The parameter update 1214 can be an update to a door delay time for an intrusion system, can be an update to a sensitivity level for a vibration sensor which detects intrusions, and/or any other parameter of the building subsystems. The parameter update 1214 can be pushed to the building equipment for automatic self-healing. In some embodiments, the update identifier 1212 presents the parameter update 1214 to an end user for review and approval. In some embodiments, the update identifier 1212 automatically (e.g., with user pre-approval) pushes the parameter update 1214 to the building subsystems.
The update identifier 1212 can be configured to determine an optimal parameter update 1214 based on the historical events 1210 and the recommendation 1208. The update identifier 1212 can be configured to perform various statistical and/or machine learning techniques to determine the optimal parameter update 1214 value. Examples of such learning mechanisms may be the metropolitan hasting algorithm, a neural network, a deep neural network, a decision tree, or a Bayesian analysis (e.g., for example the Bayesian analysis described in
Referring now to
If the distribution spread is less than a predefined amount, the median value of the distribution can be used as the door delay. In distribution 1300, the spread A is less than the predefined amount. Therefore, if the update identifier 1212 determines a distribution such as the distribution 1300, the parameter update 1214 would be the median of the distribution, e.g., 45 seconds as shown the distribution 1300.
If the distribution spread is greater than the predefined amount, rather than generating the parameter update 1214, the update identifier 1212 may determine that a parameter update is unnecessary and that user error is responsible for false alarms that may be occurring. For example, users may not be attentive to promptly entering their user ID at the security keypad. Furthermore, this may be indicative of the security access system being poorly located, i.e., it may be too far away from the door or positioned in a location where some users are having a difficult time finding the security keypad when entering the building.
If the distribution is skewed as in the distribution 1304, rather than generating the parameter update 1214, the update identifier 1212 may determine that a parameter update is unnecessary and that users are using the wrong door of the building 10a. In this regard, the update identifier 1212 can be configured to generate a recommendation to improve user training. For example, users may not understand which doors they should be entering through.
Referring now to
In step 1402, the update identifier 1212 can be configured to generate a probability distribution for a door delay based on historical event data. Based on the probability distribution, the update identifier 1212 can generate a spread for the probability distribution. The spread value used to analyze the probability distribution may be a variance or standard deviation.
In step 1404, the update identifier 1212 can compare the spread to a predefined threshold. If the spread is not greater than the predefined threshold, the update identifier 1212 can perform the step 1406. If the spread is greater than the predefined amount, then the update identifier 1212 can perform the step 1408. In step 1406, the update identifier 1212 can generate the parameter update 1214 to be the median value for the door delay distribution generated at the step 1402.
If the spread is greater than the predefined threshold, the process 1400 can move to step 1408. In the step 1408, the update identifier 1212 can generate a recommendation to change a door delay system associated with the door delay distribution. The recommendation may be to relocate the key in pad to be closer to the door or in a more visible location. Furthermore, the recommendation may be to improve the training of users who are punching into the key in pad.
Referring now to
Y=F(x) (Equation 11)
where Y is an identified false alarm rule of the false alarm rules 518, x represents historical events or other data (e.g., the site features 1506), and F(⋅) is an n classifier configured to identify the false alarm rule Y.
In
The classifier 1508 can be a trained model configured to take multiple inputs to generate the triggered false alarm rule 1510. In some embodiments, the classifier 1508 is a neural network classifier (e.g., a deep neural network), a Naïve Bayes model, a Logistic Regression, a Decision Tree, a Support Vector Machine (SVM), a Random Forest, and/or any other model or machine learning technique that can be used in classification. The triggered false alarm rule 1510 can be an identification of one of the false alarm rules 518. Based on the identified false alarm rule 518, the alarm analysis system 222 can generate a real-time recommendation 1512 and/or an offline recommendation 1514.
The real-time recommendation may be a recommendation generated based on real-time event data, i.e., the real-time events 1500. In this regard, as data is collected for the building 10a, the classifier 1508 can be operated to identify whether false alarm rules 518 are triggered. This can allow an end user to quickly respond to perform actions that will prevent false alarms before they ever occur. In some embodiments, the classifier 1508 can determine that three sequential events are indicative of a false alarm occurring. In this regard, if the first event and then the second event occur, or the first event, then the second event, and then the third event occur, the classifier can identify the triggered false alarm rule 1510 to generate the real-time recommendation 1512. Furthermore, instead of analyzing the real-time events 1500 (or in addition to analyzing the real-time events 1500) the classifier 1508 can analyze historical event sequences 1502. The historical event sequences 1510 can be a database of events that has occurred in a previous predefined amount of time. Based on these historical event sequences 1502, one or multiple triggered false alarm rules 1510 can be determined by the classifier 1508 for determining the offline recommendation 1514.
Referring now to
As shown in
In some embodiments, the classifier 1508 analyzes the particular sequence of events of the event sequences 1118 to identify which false alarm rule 518a-518d the event sequence 1118 should be classified as. However, in some embodiments, additional information can be used to perform the classification such as site features 1506, real-time events 1500, and/or historical event sequences 1502.
Referring now to
The first event of the false alarm rule sequence 1600 is the AC power failure event for the piece of building equipment. After the AC power failure event, the building equipment begins to operate based on the supplemental battery backup. Then, a first predefined amount of time after the AC power failure event, a second event, the LB event occurs. This event may be the building equipment generating a low battery notification. After a second period of time, the RELB event may occur indicating that a low battery needs to be replaced.
After the AC power failure event, the building equipment may be at an increased risk of creating a false alarm event. The battery may be discharged before a user can replace the battery or before a user is aware that the battery needs to be replaced. However, the systems and methods discussed herein can generate a recommendation that notifies an end user that a battery needs to be replaced within a particular time window. Every type of building device and battery may be unique, therefore, there may not be one single time window. Therefore, the systems and methods discussed herein can identify an optimal window for replacing the battery of the building equipment and generate and push a work order to a technician to replace the battery within the optimal window.
Referring now to
In some embodiments, the median of the distribution may be the optimal time window to use in replacing the battery. However, since every battery has its own charge amount, discharge rate, and the equipment which the battery powers can cause the battery to discharge at varying amounts, the distribution 1700, since generated from historical data specific to the building equipment.
Referring now to
In step 1802, the alarm analysis system 222 can detect a false alarm sequence for battery replacement, e.g., the false alarm rule 1600 of
In step 1804, the alarm analysis system 222 can generate a battery life probability distribution identifying the probability of times between the AC power failure event and the LB event. It may be desirable that the battery be replaced before the LB event following the AC power failure event. In some embodiments, the distribution is a prediction performed with a machine learning technique e.g., Bayesian modeling, Metropolis Hastings Algorithm, etc. In some embodiments, step 1804 is performed in response to the step 1802 being performed. In some embodiments, the step 1804 is performed prior to the step 1802 occurring such that machine learning can be performed prior to the AC power failure event occurring since the machine learning used to generate the distribution 1700 may require a predefined amount of time to occur.
In step 1806, the alarm analysis system 222 can select an optimal time window for replacing the battery. In some embodiments, the time window is determined from the distribution 1700. For example, the median value of the distribution 1700 may be used as the time window for replacing the battery. In some embodiments, the time window, A is modified via an offset. For example, the time window A can be offset by a value B, e.g., A±B. In some embodiments, B is a predefined offset. In other embodiments, B is a standard deviation or variance of the distribution 1700. In some embodiments, the offset may be applied as A−B to provide an overhead amount of time to account for error and reduce the likelihood that the LB event occurs before the time A expires. In step 1808, the alarm analysis system 222 can generate a recommendation to replace the battery within the identified time window as determined in the step 1806.
In some embodiments, the time window is based on parameters of the battery. For example, the alarm analysis system 222 may consider battery life. Based on an installation date and/or time (or battery replacement date and/or time) and a current date and/or time, the alarm analysis system 222 can determine the time window. Furthermore, the alarm analysis system 222 can be configured to utilize characteristics of the equipment to identify the time window. For example, based on a model number, the alarm analysis system 222 can identify characteristics of the equipment that relate to how quickly the battery of the equipment discharges. For example, power requirements of the equipment can be used to identify the time window that the alarm analysis system 222 can identify based on the model number of the equipment. In this regard, the time window determined based on historical data can be adjusted based on the age of the battery and/or characteristics of the equipment.
Furthermore, the time window can be based on historical data of similar equipment and/or similar battery age. For example, the alarm analysis system 222 can select relevant historical equipment battery life data (e.g., data that pertains to batteries of similar capacities as the battery in question, similar equipment characteristics of the equipment in question, etc.) and then identify the time window based on the relevant historical data. The alarm analysis system can be configured to generate a probability distribution for relevant historical data and analyze the probability distribution to generate the time window.
Referring now to
Referring now to
In step 2004, alarm analysis system 222 can generate a recommendation to reposition the building sensor associated with the BA event. The BA event may be an event that occurs when an occupant opens a building in the morning and, thus, should not have triggered. This may be indicative of the building sensor being improperly installed. Therefore, the recommendation may be to send a technician to reposition the sensor to prevent the false alarm from occurring in the future. In step 2006, the generate recommendation of the step 2002 can be provided to an end user for review. In some embodiments, the alarm analysis system 222 can automatically generate a work order to cause a technician to reposition the improperly installed sensor.
Referring now to
In
Referring now to
Referring now to
In step 2304, the alarm analysis system 222 can determine a time window based on historical data which indicates a period of time that, if the expansion module 2202 does not automatically restore itself within, requires a technician to perform maintenance on the expansion module 2202. In some embodiments, the time window can be provided to the CSAM so that the CSAM can adjusted or override the time window. The historical event data can be used by the alarm analysis system 222 to identify the time window. The historical data may indicate how long it takes in various instances for the expansion module 2202 for the expansion module 2202 to automatically come back online. The historical data may meet the pattern of the false alarm rule anti-sequence 2100. In some embodiments, the alarm analysis system 222 determines a probability distribution of times between which the no expansion module failure event occurs and the expansion module 2202 automatically recovers. In this regard, the alarm analysis system 222 can select a median value of the distribution and use the median value (e.g., the median value plus or minus an offset), as the time window within which the expansion module 2202 must automatically recover or otherwise a recommendation should be generated for a technician to replace or repair the expansion module 2202.
In the step 2306, the alarm analysis system 222 can generate a recommendation to repair the expansion module 2202 (or replace the expansion module 2202) if the expansion module 2202 does not automatically recover within the time window determined in the step 2304. In some embodiments, a work order is automatically generated with the recommendation and provided to a service technician who can respond to the recommendation.
Referring now to
Referring now to
In step 2504, the alarm analysis system 222 can generate a recommendation that an employee with an incorrect password is opening the building 10a and that better employee training or scheduling needs to be implemented. In step 2506, the alarm analysis system 222 can provide the recommendation to an end user. In some embodiments, the recommendation is provided to a shift manager or other supervisor who can better inform employees or adjust employee opening schedules so that an employee with a correct password is opening the building 10a. In some embodiments, the employee schedule may be automatically generated by a computing device, therefore, the alarm analysis system can cause the employee schedule to be generated such that the employee with the incorrect password is not scheduled to open the building. Furthermore, the alarm analysis system 222 can generate a correct password for the employee and provide the new correct password to the employee.
Referring now to
A false alarm reducing unit 2608 may be configured to analyze the information associated with the alarm to identify if the alarm is a false alarm. Further, the false alarm reducing unit 2608 may provide a corrective action to reduce the false alarm to a user interface provided on an electronic device 2610 or the alarm panel 2602, or both. In addition, the false alarm reducing unit 2608 may be configured to receive a user input pertaining to the corrective action from the user interface. The user input may include feedback for the corrective action. The user input may be stored in the database 2606. In addition, the corrective action provided to the user may be also stored in the database 2606 as a historical corrective action. Further, the false alarm reducing unit 2608 may analyze the user input to determine requirement of providing one or more subsequent corrective actions.
Referring now to
Referring now to
Communication interface 2802 may be a network interface configured to facilitate electronic data communications between the false alarm reducing unit 2608 and various external systems or devices (e.g., one or more user interfaces). In some embodiments, the communication interface 2802 can be the communication interface of the building security system described above with respect to
In some embodiments, the false alarm reducing unit 2608 may communicate with various building subsystems 204 referred above in
The processing circuit 2804 is shown to include a processor 2806 and a memory 2808. In some embodiments, the processing circuit 2804 can be the processing circuit of the building security system described above with respect to
The memory 2808 may include one or more devices (e.g., memory units, memory devices, storage devices, etc.) for storing data and/or computer code for completing and/or facilitating the various processes described in the present disclosure. The memory 2808 may include random access memory (RAM), read-only memory (ROM), hard drive storage, temporary storage, non-volatile memory, flash memory, optical memory, or any other suitable memory for storing software objects and/or computer instructions. The memory 2808 may include database components, object code components, script components, or any other type of information structure for supporting various activities and information structures described in the present disclosure. The memory 2808 may be communicably connected to the processor 2806 via the processing circuit 2804 and may include computer code for executing (e.g., by processor 2806) one or more processes described herein.
Still referring to
In some embodiments, the false alarm reducing unit 2608 is shown to be in communication with the alarm panel 2602 via the monitoring station 2604. In some other embodiments, the false alarm reducing unit 2608 may be configured to directly communicate with the alarm panel 2602. In some embodiments, the alarm panel 2602 may be a security alarm panel of a building and connected to building equipment, building subsystems etc. For example, the alarm panel 2602 may be associated with one or more sensors (such as door sensors, window sensors, motion sensors, smoke sensors, heat sensors, carbon monoxide sensors etc.) actuators, building equipment, building subsystems etc. The alarm panel 2602 may receive building data from the one or more sensors associated with the building equipment and raise an alarm when the building data falls outside of a valid range or indicates an abnormal condition. For example, the alarm panel 2602 may raise an alarm when the building data shows presence of one or more outliers or when building data deviates from normal operating state. In some embodiments, the building data may comprise one or more events associated with the alarm. For example, the one or more events may be doors opening or closing, a window being forced open, movement detected in a particular zone, etc.
In some embodiments, the monitoring station 2604 may be configured to monitor the alarm panel 2602 to detect occurrence of one or more alarms. For example, if an access control system detects that a door is being forced open, that information can be transmitted to the monitoring station 2604. The monitoring station 2604 may further store the information associated with the alarm such as event data for the one or more events in the database 2606.
In some embodiments, the alarm raised by the alarm panel 2602 may be a false alarm. In some embodiments, the false alarm may be caused due to faulty equipment, misconfigured systems, an improperly installed or operated piece of building equipment, behavior of building users, such as using an emergency exit as a general exit etc. In some embodiments, if a sensor is malfunctioned or requires maintenance, it may produce invalid data for a period of time falsely indicating that there has been a security breach. In another example, a motion sensor may detect motion when it is simply a sale banner hanging in close proximity to the motion sensor. Such false alarm situations can be challenging and can cause a financial burden to building owners.
In some embodiments, the false alarm reducing unit 2608 is shown to include a false alarm determining module 2810. As referred above, the event data for one or more events associated with the alarm is stored in the database 2606. In some embodiments, one or more false alarm rules may be stored in the database 2606 based on the one or more events. The one or more false alarm rules may be rules identifying that a particular pattern of the one or more events lead to false alarms. For example, the one or more false alarm rules may indicate that particular patterns of events (e.g., detected motion, etc.) are indicative of a situation at the building that causes the false alarm. In some embodiments, the one or more false alarm rules stored in the database 2606 may be updated based on new events detected in the building data. The module 2810 can implement false alarm detection techniques similar to, or the same as, the techniques described in
The false alarm determining module 2810 detect, based on data of security equipment of the building, that a security alarm of the building is a false alarm. For example, the false alarm determining module 2810 may be configured to determine whether a false alarm rule has triggered based on the event data and the one or more false alarm rules stored in the database 2606. More particularly, the false alarm determining module 2810 may be configured to analyze the event data and the one or more false alarm rules to detect occurrence of a false alarm. In addition, the false alarm determining module 2810 may be configured to identify a root cause of the false alarm based on the event data and the one or more false alarm rules.
The false alarm reducing unit 2608 is further shown to include a recommendation determining module 2812 that is configured to determine a corrective action to reduce the false alarm. For example, if an identified root cause of a false alarm is due to a faulty equipment, a corrective action may be generated to service or replace the faulty equipment. The recommendation determining module 2812 may further provide the corrective action over the user interface of the alarm panel 2602 or the electronic device 2610, or both, to instruct the user to implement the corrective action for reducing the occurrence of the false alarm. The corrective action may include, for example, informing a user about a current status of building equipment, suggested maintenance of the building equipment, suggested parameter changes for the building equipment that may be necessary to reduce the one or more false alarms, etc. For example, the corrective action may be to adjust or update a door delay, to train employees for accessing building subsystems, etc. In some embodiments, the corrective action may include one or more solutions to reduce the false alarm.
The false alarm reducing unit 2608 can perform a search of the database 2606. For example, the false alarm reducing unit 2608 an perform a search of the database 2606 to identify a past corrective action accepted for implementation by a user and at least one false alarm occurring after the past corrective action was accepted and before detection of a current false alarm. For example, responsive to detecting a false alarm, the false alarm reducing unit 2608 can search the database 2606 for data to use in generating a new corrective action. The false alarm reducing unit 2608 can generate a corrective action for reducing the false alarm based on a result of the search.
For example, the false alarm reducing unit 2608 can store past data for an indication of a type of each corrective action generated, an indication of a type of each false alarm generated, whether a user implemented the corrective action, and/or whether a user declined each generated corrective action accepted. The false alarm reducing unit 2608 can further store an indication of each false alarm that occurs and a timestamp of each false alarm. The false alarm reducing unit 2608 can store an indication of a timestamp when each false alarm was accepted, implemented, or declined.
Responsive to a false alarm occurring, the false alarm reducing unit 2608 can determine, by searching the database 2606, that a corrective action was implemented in the past to reduce false alarms of the type of false alarm that occurred. The false alarm reducing unit 2608 can further search the database 2606 to determine a number of false alarms that have occurred after a past corrective action was implemented and a current time (or a time at which the false alarm occurred). The false alarm reducing unit 2608 can compare the number of false alarms to a threshold or predefined value. The false alarm reducing unit 2608 can use a result of the comparison to determine a new corrective action for addressing the false alarm. For example, if the number of false alarms is less than a threshold, the false alarm reducing unit 2608 can determine that the past corrective action was successful in reducing false alarms. The false alarm reducing unit 2608 can generate a corrective action to be the same type as the past corrective action. However, if the false alarm reducing unit 2608 determines that the number of false alarms is greater than a threshold, the false alarm reducing unit 2608 generate the corrective action to be different than the past corrective action because the false alarms being greater than the threshold indicates that the past corrective action was not successful in reducing false alarms.
The false alarm reducing unit 2608 can further analyze data to determine whether the past corrective action was accepted but not implemented. For example, the search of the database 2606 can identify data that indicates that while the past corrective action was accepted, the past corrective action was never implemented. For example, the false alarm reducing unit 2608 can search the database 2606 to determine whether data was stored in the database 2606 that indicates whether the corrective action was implemented. For example, the data can be a confirmation that the user implemented the past corrective action. Furthermore, the false alarm reducing unit 2608 can communicate with the monitoring station 2604, the alarm panel 2602, or any other equipment 204 to determine whether the corrective action was implemented at all or implemented properly. Responsive to determining that the number of false alarms that have occurred after the past corrective action was accepted is greater than a threshold but the past corrective action was never implemented, the false alarm reducing unit 2608 can generate the corrective action to be the same type as the past corrective action.
The false alarm reducing unit 2608 can confirm whether a corrective action was implemented by comparing data stored in the database 2606 with data stored by the monitoring station 2604, the alarm panel 2602, or equipment 204. For example, the data can be or include a value of an operating parameter of the security system 2600. For example, the value can indicate a length of time that a user is required to enter an access code into the alarm panel 2602 after opening a door. The length of time can be stored as a value in the alarm panel 2602, the monitoring station 2604, or the equipment 204. The value can be a sensitivity level for a door or window sensor 204. A low sensitivity level can trigger an alarm with a low amount of vibration in a window or door while a high sensitivity level can trigger an alarm with a high amount of vibration in the window or door. The past corrective action can implement an update to the operating parameter. This update can be stored in the database 2606 by the false alarm reducing unit 2608. When the false alarm reducing unit 2608 checks to determine whether the past corrective action was implemented properly, the false alarm reducing unit 2608 can retrieve the updated value of the corrective action from the database 2606. Furthermore, the false alarm reducing unit 2608 can retrieve a value of the operating parameter that the system 2600 is actually operating on from the equipment 204, the alarm panel 2602, or the monitoring station 2604 by communicating with the equipment 204, the alarm panel 2602, or the monitoring station 2604 via one or more networks. The false alarm reducing unit 2608 can compare the value retrieved from the database 2606 against the value retrieved from the equipment of the security system 2600 to determine if the values match. If the values match, the false alarm reducing unit 2608 can determine that the past corrective action was properly implemented. If the values do not match, the false alarm reducing unit 2608 can determine that the past corrective action was never implemented or was not implemented.
In some embodiments, the corrective action may be displayed to the user, allowing the user to scroll through the corrective action and follow one or more instructions to implement the corrective action. In some embodiments, the one or more instructions may be in form of text, graphics, audio, video, etc., or any combination thereof.
In some embodiments, for example, when a false alarm is triggered for an intrusion alarm due to a user failing to enter a disarm code within a time limit, the recommendation determining module 2812 may gather data from the alarm panel 2602 recording a time between a sensor detecting a door open and a time at which the disarm code is entered. The recommendation determining module 2812 may determine a pattern of user behavior indicating that the door sensor timer should be reset to allow a longer period for the user to enter the disarm code.
As another example, the false alarm reducing unit 2608 may detect misuse of emergency exits by staff based on the event data and the one or more false alarm rules stored in the database 2606. Further, a corrective action to train staff about use of emergency doors may be generated by the recommendation determining module 2812. One or more notifications containing the corrective action may be sent to the user interface with instruction(s) to implement the corrective action. In some embodiments, the one or more notifications may be in form of text, graphics, audio, video etc., or any combination thereof. In some embodiments, the corrective action recommended to the user may be stored in the database 2606 as a historical corrective action.
The recommendation determining module 2812 can generate data that causes a graphical user interface to be displayed on a device. The graphical user interface can include an indication of a corrective action or actions identified or selected by the recommendation determining module 2812. The data can be transmitted by the recommendation determining module 2812 to a user device, such as the alarm panel 2602 or the electronic device 2610, to cause the user device to display graphical user interface. The recommendation determining module 2812 can receive data from the user device indicating an acceptance of the corrective action, a rejection of the corrective action, or implementation of the corrective action. The recommendation determining module 2812 can update the database 2606 with an indication of whether the corrective action was accepted, rejected, or implemented.
For example, the recommendation determining module 2812 can transmit data to the alarm panel 2602 to cause the alarm panel 2602 to display a graphical user interface indicating the corrective action. A user, via the alarm panel 2602, can provide an input accepting or rejecting the corrective action. If the user accepts the corrective action, the user can provide an input via the alarm panel 2602 confirming that the corrective action was implemented. The alarm panel 2602 can transmit data to the recommendation determining module 2812 indicating whether the user accepted or rejected the corrective action and further whether the user confirmed implementation of the corrective action. The recommendation determining module 2812 can update the database 2606 to store an indication of the corrective action, an indication of whether the user accepted or rejected the corrective action, and an indication of whether the corrective action was implemented or not.
Subsequent to recommending the corrective action, input receiving module 2814 may be configured to receive a user input pertaining to the corrective action. In some embodiments, the user is provided with one or more pre-determined input options on the user interface of the alarm panel 2602 or the electronic device 2610, or both, where the input options pertain to the recommended corrective action. Further, the user is allowed to provide the user input via the one or more input options provided on the user interface. In some embodiments, the one or more input options may allow the user to reject the recommended corrective action. For example, a corrective action may be recommended to the user, suggesting replacement of a building equipment, however, the user may not have the budget to replace the building equipment. In such cases, the user may reject this recommended corrective action, if the user is not satisfied with the recommended corrective action.
In some embodiments, the one or more input options may allow the user to accept the corrective action. The acceptance of the corrective action can be in form of self-implementation of the corrective action, via a technician implementing the corrective action, and/or automatic implementation by the false alarm reducing unit 2608. Additionally, the one or more input options may allow a user to “snooze” or delay the recommended corrective action indicating the false alarm reducing unit 2608 for delayed implementation of the corrective action.
In some embodiments, the one or more input options may allow the user to confirm implementation of the corrective action. In some embodiments, the implementation of the corrective action can be performed by at least one of a user and a technician. In some other embodiments, the implementation of the corrective action is performed automatically by the false alarm reducing unit 2608.
In some embodiments, the one or more input options may vary depending on the corrective action. Further, Table 5 below shows an example of one or more input options that can be provided to the user:
Further, in some embodiments, the user input for the recommended corrective action can be in form of a textual review. The textual review may be analyzed using Natural Language Processing (NLP). For example, one or more key words or concepts may be extracted from the textual review to understand content of the user input. In some other embodiments, the user input may be in form of a rating or score provided to the recommended corrective action.
As referred above, the corrective actions provided to the user may be stored as historical corrective actions. Further, the user input pertaining to the historical corrective actions may be stored in the database 2606. Further, a recommendation modifier 2816 of the false alarm reducing unit 2608, may be configured to analyze the user input to determine requirement of providing one or more subsequent corrective actions.
In some embodiments, when a false alarm of same type, as a previously stored false alarm, is detected (alternatively referred as a reoccurred false alarm), the recommendation modifier 2816 may identify a historical corrective action provided to the user corresponding to the previously stored false alarm and further analyze a user input provided for the historical corrective action by looking into the database 2606.
In one example, the recommendation modifier 2816 may analyze the user input to determine that the user accepted and confirmed implementation of the historical corrective action. The recommendation modifier 2816 may further determine reoccurrence of the false alarm post implementation of the historical corrective action. The recommendation modifier 2816 may determine if a number of false alarms of the same type have reduced post implementation of the historical corrective action. In one embodiment of the example, when the number of false alarms have been reduced post implementation of the historical corrective action, then the historical corrective action is considered as a successful corrective action. Such successful corrective action may be highly effective and recommended to the user again for reducing the reoccurred false alarm. In some embodiments, the recommendation modifier 2816 may identify similar users based on user data stored in the database 2606 to promote use of successful corrective actions.
Further, in some other embodiments of the example, if the number of false alarms are increased or same post implementation of the historical corrective action, then the recommendation modifier 2816 may determine an evidence for implementation of the historical corrective action. For example, the recommendation modifier 2816 may search a database of technician callouts for collecting evidence to determine if the historical corrective action was actually implemented. In one embodiment, if the evidence for implementation of the historical corrective action is found, then the historical corrective action is considered as a failed corrective action. This indicates that the historical corrective action, when implemented by the user, failed to reduce the number of false alarms. In some embodiments, the failed corrective action may no longer be recommended to users, or may not be recommended for a configurable period of time. This may include reducing a probability of recommending the corrective action to users that are identified as having similar characteristics such as business type, premises type, age of building, number of employees, regional location, type of equipment installed etc. The failed corrective action indicates that the historical corrective action is less effective. In such case, the recommendation modifier 2816 may provide one or more subsequent corrective actions to the user for reducing the reoccurred false alarm. In some embodiments, the one or more subsequent corrective actions is one of a new corrective action or a modified version of the historical corrective action.
However, in some embodiments, if there is no evidence found for implementation of the historical corrective action, then the historical corrective action may be recommended to the user again for reducing the reoccurred false alarm. Further, in some embodiments, the recommendation modifier 2816 may determine that the user rejected the historical corrective action. Such historical corrective action may be classified as a failed corrective action. In such case, the recommendation modifier 2816 may provide one or more subsequent corrective actions to the user for reducing the reoccurred false alarm.
In some embodiments, the recommendation modifier 2816 may determine that the user has not previously implemented the historical corrective action, then such historical corrective action may be recommended again to the user for reducing the reoccurred false alarm. In some embodiments, the recommendation modifier 2816 may utilize one or more machine learning techniques to continuously learn from user input pertaining to historical corrective actions. In addition, the recommendation modifier 2816 may utilize one or more machine learning techniques to continuously learn from outcomes such as success or failure of historical corrective actions to predict corrective actions when a false alarm of same type is triggered in future. A machine learning model may be utilized that trains on outcomes of historical corrective actions to make predictions for future corrective actions. In some embodiments, the machine learning model may be stored on a cloud server such as the cloud server 216 (referred above in
In some embodiments, the recommendation modifier 2816 may create an artificial neural network that continuously learns from the successful or failed historical corrective actions to refine future corrective actions. For example, an enterprise with a large number of store locations may have a continuously learning neural network of security systems working together to reduce occurrence of false alarms across the enterprise. Thus, the false alarm reducing unit 2608 improves with scale. In addition, the false alarm reducing unit 2608 is a self-learning and constantly evolving unit, thus overall performance of the false alarm reducing unit 2608 is persistently enhanced as compared to conventional systems. The false alarm reducing unit 2608 generates improved false alarm reduction recommendations, thereby leading to reduction in occurrence of false alarms.
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
In some embodiments, the alarm panel 2602 may send data 3514 such as event data, Dialed Number Identification Service (DNIS) codes, event account codes, fiberoptic account codes, etc. to the database 2606 via a data receiver 3504. Further, the false alarm reducing unit 2608 may retrieve the data 3514 from the database 2606 in the form of events, users, and accounts data. The false alarm reducing unit 2608 may further analyze the data 3514 to detect if the alarm is a false alarm and identify a root cause of the false alarm. For example, the false alarm may be caused due to human behavior. Based on the identified root cause of the false alarm, the false alarm reducing unit 2608 may determine a corrective action that can be recommended to reduce the false alarm. The false alarm reducing unit 2608 may further transmit one or more messages 3508 to the alarm panel 2602. For example, the one or more messages 3508 may indicate the corrective action provided to the user associated with the alarm panel 2602 for reducing the false alarm. In some embodiments, the user may provide an acknowledgement/user input 3510 for the one or more messages 3508 to the false alarm reducing unit 2608.
In some embodiments, the alarm panel 2602 may be communicably connected with one or more user devices, such as the electronic device 2610 referred above in
Referring now to
The method 3600 is further shown to include providing a corrective action to a user to reduce occurrence of the false alarm (step 3604). In some embodiments, the corrective action may be determined by the recommendation determining module 2812 of
The corrective action may include, for example, informing a user about a current status of building equipment, suggested maintenance of the building equipment, suggested parameter changes for the building equipment that may be necessary to reduce the one or more false alarms, etc. For example, the corrective action may be to adjust or update a door delay, to train employees for accessing building subsystems, etc. In some embodiments, the corrective action may include one or more solutions to reduce the false alarm.
One or more notifications containing the corrective action may be sent to the user interface of the alarm panel 2602 or the electronic device 2610, or both, with instruction(s) to implement the corrective action. In some embodiments, the one or more notifications may be in form of text, graphics, audio, video etc., or any combination thereof. In some embodiments, the corrective action may be stored in the database 2606 as a historical corrective action.
The method 3600 is further shown to include receiving a user input pertaining to the corrective action (step 3606). In some embodiments, the user input may be received by the input receiving module 2814 referred above in
In some other embodiments, the acceptance of the recommended corrective action can be in form of technician assistance for implementing the corrective action (step 3614). For example, the user may book a service appointment to schedule a technician for implementation of the corrective action. The false alarm reducing unit 2608 can generate data to schedule a technician visit to the building to implement the corrective action. For example, the false alarm reducing unit 2608 can transmit data to a scheduling system or service that schedules technician visits to cause the schedule system or service to schedule a technician visit to the building to implement the corrective action.
In some other embodiments, the acceptance of the recommended corrective action can be in form of automatic implementation of the corrective action by the false alarm reducing unit 2608 (step 3616). The user may provide an approval for allowing the false alarm reducing unit 2608 to automatically implement the corrective action. For example, the false alarm reducing unit 2608 may update one or more parameters of the building equipment to reduce occurrence of the false alarm. In some other embodiments, the one or more input options may allow the user to reject the recommended corrective action (step 3610). Additionally, the one or more input options may allow a user to snooze the recommended corrective action indicating the false alarm reducing unit 2608 for delayed implementation of the corrective action.
In some embodiments, the one or more input options may allow the user to confirm implementation of the corrective action. In some embodiments, the implementation of the corrective action can be performed by at least one of the user and a technician. In some other embodiments, the implementation of the corrective action is performed automatically by the false alarm reducing unit 2608.
In some embodiments, the user input for the recommended corrective action can be in form of a textual review. The textual review may be analyzed using Natural Language Processing (NLP). For example, one or more key words or concepts may be extracted from the textual review to understand content of the user input. In some other embodiments, the user input can be in form of a rating or score provided to the recommended corrective action. In some embodiments, the user input pertaining to the recommended corrective action may be collected and stored in the database 2606.
Referring now to
In some embodiments, the recommendation modifier 2816 may analyze the user input to determine that the user accepted and confirmed implementation of the historical corrective action (step 3702). Further, the method 3700 is shown to include determining a number of false alarms of the same type post implementation of the historical corrective action (step 3704). In some embodiments, when the number of false alarms have been reduced, post implementation of the historical corrective action, then the historical corrective action is considered as a successful corrective action (step 3706). In such case, the historical corrective action identified as successful may be considered as highly effective. Such historical corrective action may be recommended again for reducing the reoccurred false alarm.
Further, in some other embodiments, when the number of false alarms are increased or same, post implementation of the historical corrective action, then an evidence for implementation of the historical corrective action may be determined (step 3708). For example, the recommendation modifier 2816 may search a database of technician callouts for collecting an evidence to determine if the historical corrective action was actually implemented. In one case, if the evidence that the historical corrective action was implemented is found i.e. result of the step 3708 is yes, then the historical corrective action is considered as a failed corrective action (step 3710). This indicates that the historical corrective action, when implemented by the user, failed to reduce the number of false alarms. In some embodiments, the failed corrective action may no longer be recommended to users, or may not be recommended for a configurable period of time. This indicates that the historical corrective action is less effective. In such case, one or more subsequent corrective actions may be provided to the user for reducing the reoccurred false alarm (step 3712). In some embodiments, the one or more subsequent corrective actions may be one of a new corrective action or a modified version of the historical corrective action. However, in some other embodiments, if there is no evidence found for implementation of the corrective action, i.e., the result of step 3708 is no, then the historical corrective action may be recommended to the user again for reducing the reoccurred false alarm (step 3714).
Referring now to
The method 3800 can include identifying false alarms (step 3802). The method 3800 is shown to include detecting occurrence of false alarms by the false alarm determining module 2810 of
The method 3800 can include identifying causes of false alarms (step 3804). A root cause of the false alarm may be determined by the false alarm determining module 2810 based on the event data and the one or more false alarm rules stored in the database 2606. For example, the false alarm rules can be linked to data indicating or describing a particular underlying cause. The method 3800 can include determining a corrective action (step 3806). For example, the corrective action can be data indicating an action or actions that the user can perform to resolve or reduce false alarms as the same type as the identified false alarm. The false alarm rules can be linked to data describing the corrective actions. The corrective action can be determined by the recommendation determining module 2812. In some embodiments, the corrective action may include one or more solutions to reduce the false alarm.
As referred above, the corrective actions recommended to the user are stored in the database 2606 as historical corrective actions. In addition, the user input pertaining to the historical corrective actions is also stored in the database 2606. In some embodiments, when a false alarm of a same type as a previously stored false alarm is detected (alternatively referred as a reoccurred false alarm), the recommendation modifier 2816 may identify a historical corrective action provided to the user corresponding to the previously stored false alarm and further analyze a user input provided for the historical corrective action by looking into the database 2606. If the historical corrective action was accepted and confirmed by the user, then a number of false alarms of the same type, post implementation of the historical corrective action is determined. In some embodiments, when the number of false alarms have been reduced post implementation of the historical corrective action, then the historical corrective action is considered as a successful and highly effective corrective action. Such historical corrective action may be recommended again for the reducing the reoccurred false alarm.
The method 3800 can include determining whether the corrective action has been implemented in the past (step 3808). The step 3808 can include determining if false alarms of a particular type has occurred after the corrective action was implemented, where the particular type of false alarm is a type for which the corrective action is a solution. If the corrective action is a new corrective action that has not been recommended before or is a previously recommended corrective action that a user declined to implement, the method 3800 can proceed to step 3810. If the corrective action was previously implemented and, after implementation, false alarms occurred, where the false alarms are of a type that the corrective action was implemented to resolve, the method 3800 can proceed to step 3826. If the corrective action was previously implemented and no further false alarms occurred after implementation of the false alarm (or no further false alarms of a type that the corrective action was intended to resolve), the method 3800 can proceed to step 3834.
In step 3812, the method 3800 can include presenting a corrective action in a user interface. The corrective action may be recommended to the user over the user interface of the alarm panel 2602 or the electronic device 2610, or both. In step 3814, the method 3800 can include collecting user feedback. For example, a user input pertaining to the recommended corrective action is received by the input receiving module 2814. In some embodiments, the user may be provided with one or more predetermined input options on the user interface of the alarm panel 2602 or the electronic device 2610, or both, where the input options pertain to the recommended corrective action. The user can provide user input via the one or more input options provided on the user interface. The user can provide input accepting the corrective action. The user can provide input confirming that the accepted corrective action was implemented. The acceptance of the corrective action can be in form of self-implementation of the corrective action, via technician implementing the corrective action, and/or automatic implementation by the false alarm reducing unit 2608. In some embodiments, the one or more input options may allow the user to confirm implementation of the corrective action.
In step 3816, the method 3800 can include determining whether the user dismissed or accepted the corrective action. In some embodiments, the user interface presented in step 3812 can include one or more input options may allow the user to reject the recommended corrective action or accept the corrective action. Furthermore, in step 3816, the method 3800 can determine whether the user provided confirmation that the corrective action was successfully implemented. If the user dismisses the corrective action, the method 3800 can proceed to step 3838. If the user accepts the corrective action, the method 3800 can proceed to step 3818. If the user confirms that the corrective action was implemented, the method 1660 can proceed to step 3838.
In step 3818, the method 3800 can include determining the corrective action should be performed by a technician, a customer, or automatically by the false alarm reducing unit 2608. The false alarm reducing unit 2608 can store a mapping, linking, or relational data that indicates whether each type of corrective action can be performed by a technician, customer, or automatically by the false alarm reducing unit 2608. If the false alarm reducing unit 2608 determines that a technician is required to implement the corrective action, the method 3800 can proceed to step 3820. In step 3820, the false alarm reducing unit 2608 can schedule a technician visit to a site to implement the corrective action. The false reducing alarm unit 2608 can generate an event on a calendar for the technician to visit the site and implement the corrective action. The event can cause the technician to travel to the site and implement the corrective action.
If the false alarm reducing unit 2608 determines that the customer can implement the corrective action, the method 3800 can proceed to step 3822. In some embodiments, a user can provide input via the user interface committing or agreeing to implement the corrective action themselves. In some embodiments, a user can provide input via the user interface requesting that a technician be dispatched or assigned to implement the corrective action. Responsive to an indication that the user selects a technician top perform the corrective action, the method 3800 can proceed to step 3820. In step 3822, the method 3800 can include providing instructions or steps for the user to follow to implement the corrective action.
In step 3818, the method 3800 can proceed to step 3824 responsive to determining that the corrective action can be performed by the false alarm reducing unit 2608. The false alarm reducing unit 2608 can implement a corrective action automatically. If the corrective action is an update to a length of time that a user is required to enter a security code into the alarm panel 2602 after entering through a door, the false alarm reducing unit 2608 can cause the security system of the building to implement the updated length of time. For example, the false alarm reducing unit 2608 can transmit the updated length of time to the alarm panel 2602. Furthermore, if the false alarm is caused by door or window sensor that is overly sensitive and causing a false alarm, the false alarm reducing unit 2608 can cause the sensor to increase a sensitivity level. The false alarm reducing unit 2608 can transmit a command to increase a sensitivity level, a command to increase a sensitivity level by a particular amount, or a command to change a stored sensitivity level to a new sensitivity level.
In step 3828, the method 3800 can include comparing a number of false alarms to at least one threshold. For example, the false alarm reducing unit 2608 determine a number of false alarms of a particular type that the previously implemented corrective action was intended to reduce or eliminate. For example, the false alarm reducing unit 2608 can search the database 2606 (or the record of false alarms in the database 2606) and identify the number of false alarms occurring after implementation of the corrective action that are associated, linked to, or related to a type that the corrective action was intended to reduce. The false alarm reducing unit 2608 can compare the number of false alarms to a threshold. The threshold can indicate the number of false alarms that have occurred before the implementation of the corrective action. In some embodiments, the threshold is the number of false alarms that have occurred within a window of time prior to the corrective action being implemented. The window of time may be equal or substantially equal to the length of time that has passed since the corrective action was implemented. Responsive to determining that the number of false alarms being greater than or equal to the threshold, the method 3800 can proceed to step 3830. Responsive to determining that the number of false alarms is less than the threshold, the method 3800 can proceed to step 3836.
In step 3830, the method 3800 can determine whether or not the corrective action was actually implemented. For example, the false alarm reducing unit 2608 can determine whether data stored or collected by the false alarm reducing unit 2608 indicates that the corrective action was implemented. For example, the data can be evidence indicating whether the corrective action was implemented or not. Furthermore, the false alarm reducing unit 2608 can search the database 2606 to determine whether the false alarm reducing unit 2608 previous stored a confirmation record that the user provided an input indicating that they had completed or performed the corrective action.
The false alarm reducing unit 2608 can perform an internal audit to determine whether or not the corrective action was implemented. For example, the false alarm reducing unit 2608 can store a record in the database 2606 indicating one or more updated operating parameters for the implemented corrective action. The false alarm reducing unit 2608 can query the alarm panel 2602 or sensors of the security system 2600 to return parameter values stored by the systems. The false alarm reducing unit 2608 can compare the returned parameter values against the parameter value for the corrective actions stored in the database 2606. For example, the false alarm reducing unit 2608 can confirm that a sensor sensitivity that a sensor is operating on matches a sensor sensitivity of the corrective action. For example, the false alarm reducing unit 2608 can compare a security time of the alarm panel 2602 against a security time for the corrected action. The security time can be a length of time for a user to enter or input a security or access code into the alarm panel 2602 after a door open event for a building in a locked state.
If the false alarm reducing unit 2608 determines that the corrective action was implemented, the method 3800 can proceed to step 3832. If the false alarm reducing unit 2608 determines that the corrective action was not implemented or was improperly implemented, the method 3800 can proceed to step 1612. The method 3800 can classify the corrective action as a failed corrective action in step 3832. The false alarm reducing unit 2608 can store an indication, a tag, a label, or other data that identifies the corrective action as failing or not reducing false alarms properly in the database 2606.
In some embodiments, when the number of false alarms are increased or same, post implementation of the historical corrective action, then an evidence for implementation of the historical corrective action may be determined. In one case, if the evidence is found, then the historical corrective action is considered as a failed or less effective corrective action and may no longer be recommended to users, or may not be recommended for a configurable period of time. In such case, one or more subsequent corrective actions may be provided to the user for reducing the reoccurred false alarm.
However, in some other embodiments, if there is no evidence found for implementation of the corrective action, then the historical corrective action may be recommended to the user again for reducing the reoccurred false alarm.
In some embodiments, upon determining that the historical corrective action was not previously implemented by the user, the historical corrective action may be recommended again to the user to reduce the reoccurred false alarm.
In some embodiments, upon determining that the historical corrective action was previously implemented by the user and further no false alarms are detected, then such historical corrective action may be considered as successful or highly effective and recommended again to the user.
The construction and arrangement of the systems and methods as shown in the various exemplary embodiments are illustrative only. Although only a few embodiments have been described in detail in this disclosure, many modifications are possible (e.g., variations in sizes, dimensions, structures, shapes and proportions of the various elements, values of parameters, mounting arrangements, use of materials, colors, orientations, etc.). For example, the position of elements can be reversed or otherwise varied and the nature or number of discrete elements or positions can be altered or varied. Accordingly, all such modifications are intended to be included within the scope of the present disclosure. The order or sequence of any process or method steps can be varied or re-sequenced according to alternative embodiments. Other substitutions, modifications, changes, and omissions can be made in the design, operating conditions and arrangement of the exemplary embodiments without departing from the scope of the present disclosure.
The present disclosure contemplates methods, systems and program products on any machine-readable media for accomplishing various operations. The embodiments of the present disclosure can be implemented using existing computer processors, or by a special purpose computer processor for an appropriate system, incorporated for this or another purpose, or by a hardwired system. Embodiments within the scope of the present disclosure include program products comprising machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
Although the figures show a specific order of method steps, the order of the steps may differ from what is depicted. Also two or more steps can be performed concurrently or with partial concurrence. Such variation will depend on the software and hardware systems chosen and on designer choice. All such variations are within the scope of the disclosure. Likewise, software implementations could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various connection steps, processing steps, comparison steps and decision steps.
This application claims the benefit of, and priority to, U.S. Provisional Patent Application No. 63/300,510 filed Jan. 18, 2022, the entirety of which is incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
63300510 | Jan 2022 | US |