The present disclosure pertains generally to security systems and more particularly to improving the efficiency of security system tests.
A security system may include a number of security sensors within a monitored area. The monitored area may be indoors or outdoors, for example. Security sensors may include a variety of different types of sensors, including but not limited to door open sensors, window open sensors, motion sensors, glass break detectors, and the like. In many security systems, a walk test is performed in which each of a plurality of security sensors are periodically triggered to ensure their operation and performance. Performing such a walk test can be time consuming. Moreover, performing a walk test can require that the security system be placed in a test mode that can leave an otherwise protected facility subject to security issues. In many security systems, communication tests are periodically performed to ensure that the security sensors are also able to communicate with a security panel and/or that the security panel is able to communicate with one or more remote devices such as a central monitoring station and/or a cloud server. Such communication tests can be expensive as a result of the bandwidth necessary to perform the communication tests over time, particularly when the communication tests include communication over a cellular network or the like. A need remains for improved methods and systems for improving the efficiency of security system tests.
This disclosure relates generally to method and systems to improve efficiency of security system tests. An example may be found in a method for streamlining a sensor walk-test of a system having a plurality of sensors operatively coupled to a controller. The illustrative method includes storing an expected behavior of sensor events of the system. Sensor event data received by the controller over a period of time is collected, where the sensor event data is representative of sensor events reported by the plurality of sensors during the period of time. The sensor event data is compared to the expected behavior of sensor events. Determining which of the plurality of sensors need a sensor walk-test to verify proper operation of the sensor and which of the plurality of sensors do not need a sensor walk-test is based at least in part on the comparison of the sensor event data collected during the period of time and the expected behavior of sensor events. A listing of which of the plurality of sensors are determined to need a sensor walk-test to verify proper operation of the sensor is displayed on a display of a user device.
Another example may be found in a method for streamlining communication testing of a communication path of a security system. The method includes scheduling execution of a plurality of communication tests in accordance with a test schedule to periodically verify communication of the communication path of the system. Operational communication along the communication path is monitored between scheduled communication tests. A timing for a next scheduled communication test is adjusted when the operational communication prior to the next scheduled communication test meets one or more communication criteria.
Another example may be found in a security system. The security system includes a plurality of sensors and a controller that is operably coupled to the plurality of sensors. The controller is configured to store an expected behavior of sensor events of the security system and to collect sensor event data received by the controller over a period of time, the sensor event data is representative of sensor events reported by the plurality of sensors during the period of time. In some cases, the period of time may be when the security system is in a disarm state. In other cases, the period of time may be when the security system is in an armed state. In yet other cases, the period of time may be when the security system in the armed state and/or in the disarm state and in the armed state.
The controller is configured to compare the sensor event data to the expected behavior of sensor events and to determine which of the plurality of sensors need a sensor walk-test to verify proper operation of the sensor and which of the plurality of sensors do not need a sensor walk-test based at least in part on the comparison of the sensor event data collected during the period of time and the expected behavior of sensor events. The controller is configured to report to a user device which of the plurality of sensors are determined to need a sensor walk-test to verify proper operation of the sensor.
The preceding summary is provided to facilitate an understanding of some of the features of the present disclosure and is not intended to be a full description. A full appreciation of the disclosure can be gained by taking the entire specification, claims, drawings, and abstract as a whole.
The disclosure may be more completely understood in consideration of the following description of various illustrative embodiments of the disclosure in connection with the accompanying drawings, in which:
While the disclosure is amenable to various modifications and alternative forms, specifics thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit aspects of the disclosure to the particular illustrative embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the disclosure.
The following description should be read with reference to the drawings wherein like reference numerals indicate like elements. The drawings, which are not necessarily to scale, are not intended to limit the scope of the disclosure. In some of the figures, elements not believed necessary to an understanding of relationships among illustrated components may have been omitted for clarity.
All numbers are herein assumed to be modified by the term “about”, unless the content clearly dictates otherwise. The recitation of numerical ranges by endpoints includes all numbers subsumed within that range (e.g., 1 to 5 includes 1, 1.5, 2, 2.75, 3, 3.80, 4, and 5).
As used in this specification and the appended claims, the singular forms “a”, “an”, and “the” include the plural referents unless the content clearly dictates otherwise. As used in this specification and the appended claims, the term “or” is generally employed in its sense including “and/or” unless the content clearly dictates otherwise.
It is noted that references in the specification to “an embodiment”, “some embodiments”, “other embodiments”, etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is contemplated that the feature, structure, or characteristic may be applied to other embodiments whether or not explicitly described unless clearly stated to the contrary.
The controller 14 may be located in a facility in which the sensors 12 are located. In some cases, the controller 14 may be remote from the facility in which the sensors 12 are located. The controller 14 may be manifested within a computer server, for example. In some instances, the security system 10 may be considered as including a user device 18. The user device 18 may, for example, be a portable device such as a laptop computer, tablet, phablet or smartphone that the user may use to communicate with the controller 14, and thus display information provided by the controller 14 on a display 19 of the user device 18 as well as to allow the controller 14 to solicit information from the user, for example. The user device 18 may include a separate data entry mechanism (not shown). In some cases, the display 19 may be a touch screen display, which allows both display of information on the touch screen display as well as entering information via the touch screen display.
In some cases, the controller 14 may be configured to store an expected behavior of sensor events of the security system 10 and to collect sensor event data received by the controller 14 over a period of time. The sensor event data is representative of sensor events reported by the plurality of sensors 12 during the period of time. In some cases, the period of time may be when the security system is in a disarm state. In other cases, the period of time may be when the security system is in an armed state. In yet other cases, the period of time may be when the security system in the armed state and/or in the disarm state and in the armed state.
In some cases, the expected behavior of sensor events of a particular sensor may be, for example, at least a threshold minimum number of reported sensor events during the period of time. In some cases, the expected behavior of sensor events of a particular sensor may be, for example, at least a threshold minimum number of reported sensor events but less than a threshold maximum number of reported sensor events during the period of time. In some cases, the expected behavior of sensor events of a particular sensor may be, for example, a cluster of sensor events during a first sub-period of time (e.g. 7-9AM) followed by another cluster of sensor events during a second sub-period of time (e.g. 4-5:30PM) during the period of time. In some cases, the expected behavior of sensor events may be a combination of sensor events reported by two or more sensors. For example, the expected behavior of sensor events may include a sensor event reported by a first sensor, followed by a sensor event reported by a second sensor within 10 seconds of the sensor event reported by the first sensor. In some instances, the expected behavior of sensor events of the security system 10 may be learned over a training period of time using machine learning.
The controller 14 may be configured to compare the sensor event data to the expected behavior of sensor events and to determine which of the plurality of sensors 12 need a sensor walk-test to verify proper operation of the sensor 12 and which of the plurality of sensors 12 do not need a sensor walk-test based at least in part on the comparison of the sensor event data collected during the period of time and the expected behavior of sensor events. For example, if a particular sensor has not reported any sensor events during the period of time, it may be determined that a walk-test is need to verify the proper operation of the sensor. Likewise, if a second sensor is expected to generate a sensor event after a first sensor generates a sensor event, but the second sensor does not generate a sensor event after the first sensor generates a sensor event during the period of time, it may be determined that a walk-test is need to verify the proper operation of the second sensor. However, if the second sensor does generate a sensor event after the first sensor generates a sensor event each time during the period of time (even when the security system is in a disarm state), it may be determined that a walk-test is not needed to verify the proper operation of the second sensor. These are just examples. In some cases, the controller 14 may be configured to report to the user device 18 which of the plurality of sensors 12 are determined to need a sensor walk-test to verify proper operation of the sensor 12.
In some instances, the controller 14 may be configured to determine a confidence level in the determination of which of the plurality of sensors 12 need a sensor walk-test and/or which of the plurality of sensors 12 do not need a sensor walk-test based at least in part on a deviation of the sensor event data collected during the period of time and the expected behavior of sensor events. In some cases, the controller 14 may also be configured to report the confidence level to the user device 18 so that the user can see the confidence level.
In some cases, the expected behavior of sensors events of the system may be learned over a training period of time using machine learning. In some instances, the expected behavior of sensor events for a particular one of the plurality of sensors may include receiving by the controller at least a threshold number of sensor events reported by the particular one of the plurality of sensors during the period of time. The expected behavior of sensor events for a particular one of the plurality of sensors may, for example, include receiving by the controller a temporal pattern of sensor events reported by the particular one of the plurality of sensors during the period of time. In some instances, the expected behavior of sensor events for a particular one of the plurality of sensors may include receiving by the controller one or more sensor events reported by the particular one of the plurality of sensors that are correlated with one or more sensor events reported by one or more other of the plurality of sensors during the period of time.
Sensor event data received by the controller is collected over a period of time. The sensor event data is representative of sensor events reported by the plurality of sensors during the period of time, as indicated at block 24. The sensor event data is compared to the expected behavior of sensor events, as indicated at block 26. A determination is made as to which of the plurality of sensors need a sensor walk-test to verify proper operation of the sensor and which of the plurality of sensors do not need a sensor walk-test based at least in part on the comparison of the sensor event data collected during the period of time and the expected behavior of sensor events, as indicated at block 28.
A listing of which of the plurality of sensors are determined to need a sensor walk-test to verify proper operation of the sensor is displayed on a display (such as the display 19) of the user device 18, as indicated at block 30. In some cases, the method 20 may also include displaying on the display of the user device which of the plurality of sensors are determined to not need a sensor walk-test to verify proper operation of the sensor, as indicated at block 34. The method 20 may also include displaying on the display of the user device a geo-location on a floor plan of each of the plurality of sensors determined to need a sensor walk-test, as indicated at block 34.
In some cases, the expected behavior of sensors events of the system may be learned over a training period of time using machine learning. In some instances, the expected behavior of sensor events for a particular one of the plurality of sensors may include receiving by the controller at least a threshold number of sensor events reported by the particular one of the plurality of sensors during the period of time. The expected behavior of sensor events for a particular one of the plurality of sensors may, for example, include receiving by the controller a temporal pattern of sensor events reported by the particular one of the plurality of sensors during the period of time. In some instances, the expected behavior of sensor events for a particular one of the plurality of sensors may include receiving by the controller one or more sensor events reported by the particular one of the plurality of sensors that are correlated with one or more sensor events reported by one or more other of the plurality of sensors during the period of time.
Sensor event data received by the controller is collected over a period of time. The sensor event data is representative of sensor events reported by the plurality of sensors during the period of time, as indicated at block 40. The sensor event data is compared to the expected behavior of sensor events, as indicated at block 42. A determination is made as to which of the plurality of sensors need a sensor walk-test to verify proper operation of the sensor and which of the plurality of sensors do not need a sensor walk-test based at least in part on the comparison of the sensor event data collected during the period of time and the expected behavior of sensor events, as indicated at block 44. A listing of which of the plurality of sensors are determined to need a sensor walk-test to verify proper operation of the sensor is displayed on a display (such as the display 19) of the user device 18, as indicated at block 46.
The illustrative method 36 may include determining a confidence level in the determination of which of the plurality of sensors need a sensor walk-test and/or which of the plurality of sensors do not need a sensor walk-test based at least in part on a deviation of the sensor event data collected during the period of time and the expected behavior of sensor events, as indicated at block 48. Continuing with
Operational communication along the communication path is monitored between scheduled communication tests, as indicated at block 60. Operational communication includes communication that occurs along the communication path(s) during normal system operation of the security system (e.g. while the security system is up and running in the facility, whether in an armed and/or disarmed state). A timing for a next scheduled communication test is adjusted when the operational communication prior to the next scheduled communication test meets one or more communication criteria, as indicated at block 62.
In some cases, the plurality of communication tests may include a plurality of scheduled ping-pong tests between the controller and the cloud server, wherein the scheduled ping-pong tests are scheduled to occur at scheduled frequency, and wherein adjusting the timing for the next scheduled communication test may include dynamically adjusting the scheduled frequency or test times depending on the number and/or frequency of communications that have occurred across that communication path during normal system operation of the security system. In some cases, adjusting the timing for a next scheduled communication test may include skipping the next scheduled communication test when the operational communication prior to the next scheduled communication meets the one or more communication criteria. As an example, the one or more communication criteria may include at least a threshold level of operational communication along the communication path over a predetermined period of time.
The control panel 68 may include a cellular module 70 that allows the control panel 68 to communicate bidirectionally with a cloud-based server 72 and with any of a number of central monitoring stations (CMS) 74, individually labeled as 74a and 74b. In some cases, the control panel 68 may also be configured to communicate over a network with a security panel console 76. As an example, the control panel 68 and the security panel console 76 may communicate over a FieldBus network. The security panel console 76 may be considered as being an example of the user device 18.
Those skilled in the art will recognize that the present disclosure may be manifested in a variety of forms other than the specific embodiments described and contemplated herein. Accordingly, departure in form and detail may be made without departing from the scope and spirit of the present disclosure as described in the appended claims.