Not Applicable.
With the increased desire for water conservation while maintaining healthy yard and crops, it has become important to use the advances in technology and communication systems to provide efficient use of water resources. In many areas water use such as for irrigating plants, is regulated within communities with restrictions and rules that dictate how, when, and who can water at any given time.
What is needed are methods, systems, and computer program implemented products that can receive the municipal restrictions and incorporate the restrictions in to irrigating routines for the use of water in areas that are predictable and efficient that effectively conserve water while maintaining aesthetically pleasing or healthy landscapes.
Non-limiting and non-exhaustive implementations of the disclosure are described with reference to the following figures, wherein like reference numerals refer to like parts throughout the various views unless otherwise specified. Advantages of the disclosure will become better understood with regard to the following description and accompanying drawings where:
The disclosure extends to methods, systems, and computer program products for optimizing water usage by controlling the duration of irrigation sessions in growing plants for yard and crops. In the following description of the disclosure, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration specific implementations in which the disclosure may be practiced. It is to be understood that other implementations may be utilized and structural changes may be made without departing from the scope of the disclosure.
Additionally, each zone may be irrigated with differing durations as needed by the conditions and crops within the zone. The durations may be generated within an irrigation protocol so as to compensate for differences within the irrigation plumbing if needed. For example, in an implementation the exact flow volume of the plumbing system within each zone may not be known, however the methods and systems disclosed herein will adjust the durations of irrigations sessions in accordance with query responses received from the user associated with the zones in question.
In an implementation, each zone may have different watering needs. Each zone may be associated with a certain control valve 115 that allows water into the plumbing that services each area, which corresponds to each zone. As can be seen in the figure, a zone may be a lawn area, a garden area, a tree area, a flower bed area, a shrub area, another plant type area, or any combination of the above. It will be appreciated that zones may be designated using various factors. In an implementation, zones may be designated by the amount of shade an area gets. In an implementation, zones may be defined according to soil type, amount of slope present, plant or crop type and the like. In some implementations, one or more zones may comprise drip systems, or one or more sprinkler systems, thereby providing alternative methods of delivering water to a zone.
It will be appreciated, as illustrated in
Additionally, the system may receive forecast data from a forecast database 246 that may be used in generating irrigation protocols. For example, forecast data may be used to determine how much water to use when cooler temperatures are expected because cooler temperatures reduce evapotranspiration.
The system 200 may further comprise a rule/protocol generator 228 using data from a plurality of databases for generating an irrigation protocol, wherein the generation of an irrigation protocol is initiated in part in response to at least the inputs made by the user. It should be noted that the network 222 mentioned above could be a cloud computing network, and/or the internet, and/or part of a closed/private network without departing from the scope of the disclosure.
Additionally, as illustrated in
An additional feature of the system 200 may be to provide notices or notifications to users of changes that impact their irrigation protocol. For example, an implementation may provide notice to a home owner/user that its professional lawn service has made changes through a worker terminal 234.
In an implementation, the system may provide a notice informing the user of the automatic municipal restrictions that have been received by the system. An implementation may provide a user with the ability to ratify or reject the automated changes made by others.
In an implementation, an irrigation system 200 may comprise a plurality of control valves 215, wherein each control valve corresponds to a zone of irrigation. As will be discussed in detail below, one of the advantages of the disclosed optimization system is that the flow consistency of the plumbing and control valve may be compensated for by adjusting the durations of irrigation sessions in accordance to user feedback obtained through a plurality of queries as discussed in greater detail below.
In an implementation, user communication may be facilitated through a mobile application on a mobile device configured for communicating with the irrigation protocol server 225. One or more notifications may be provided as push notifications to provide real time responsiveness from the users to the system 200.
The system 200 may further comprise an interval timer for controlling the timing of when the notifications are sent to users or customers, such that users/customers are contacted at useful intervals. For example, the system 200 may initiate contact with a user after predetermined interval of time has passed for the modifications to the irrigation protocol to take effect in the landscape, for example in plants, shrubs, grass, trees and other landscape.
In an implementation, the notifications may ask the user to provide information or indicia regarding such things as: soil type of a zone, crop type of a zone, irrigation start time, time intervals during which irrigation is occurring, the condition of each zone, or other types of information or objective indicia.
Illustrated in
Referring now to
In an implementation, the pairing process 333 or 433 may involve establishing a relationship between the controller 310, 410 and the account 315, 415. During the pairing process, the device(s) and the account involved establish a relationship by creating a shared secret code or a link key. If the code or link key is stored by both the device and the account they are said to be paired or bonded. A device that wants to communicate only with a bonded device can cryptographically authenticate the identity of the other device or account, and so be sure that it is the same device or account it previously paired with. Once a link key has been generated, an authenticated Asynchronous Connection-Less (ACL) link between the devices may be encrypted so that the data that they exchange over the airwaves is protected against eavesdropping.
Link keys may be deleted at any time by either the controller device or the account. If done by either the controller or the account, then such action will remove the bonding between the controller and the account. Thus, it is possible for one of the controller or the account to have a link key stored, but not be aware that it is no longer bonded to the controller or account associated with the given link key depending upon whether the link key was deleted from the controller or the account.
The paired controller and account may require either encryption or authentication, and as such require pairing before they allow a remote device to use the given service. In some implementations, the system may elect not to require encryption or authentication so that pairing does not interfere with the user experience associated with the service.
It will be appreciated that the disclosure may utilize any pairing process or mechanism that are known or that may become known without departing from the scope of the disclosure. Pairing mechanisms may include legacy pairing, secure simple pairing (SSP), or other pairing mechanisms.
The mechanism known as legacy pairing may include entering a PIN code to each device and account to be paired. Pairing may only be successful if both the device and the account (or multiple devices and the account) enter the same PIN code. It will be appreciated that any 16-byte UTF-8 string may be used as a PIN code. It will likewise be appreciated that any number of alpha-numeric characters may be used as a PIN code, e.g., 6-digit, 7-digit, 8-digit, 9-digit, 10-digit, etc., without departing from the scope of the disclosure. However, it will be appreciated that not all devices may be capable of entering all possible PIN codes. For example, limited input devices are not capable of entering PIN codes because they generally have few inputs for a user. These devices usually have a fixed PIN, for example “0000” or “1234” that are hard-coded into the device. Numeric input devices, such as a mobile phones or controllers 310, 410 may allow a user to enter a numeric value up to 16 digits in length into the device or account. Alpha-numeric input devices, such as computers, controllers 310, 410 and smartphones are examples of these devices. They allow a user to enter full UTF-8 text as a PIN code.
In an implementation of the disclosure, the pairing mechanism may be Secure Simple Pairing (SSP). Secure Simple Pairing (SSP) may use a form of public key cryptography. It will understood that SSP does not necessarily require any user interaction. However, a device, such as controller 310, 410, may prompt the user to confirm the pairing process. Such a method may be used by devices with limited input/output capabilities, and may be more secure than the fixed PIN mechanism described above, which is typically used for legacy pairing by this set of limited devices.
SSP may use a numeric comparison as part of the pairing process. If both the device and the account have a display and at least one can accept a binary Yes/No user input, then numeric comparison may be used. This method displays a 6-digit numeric code on each device and account to be paired. The user should compare the numbers to ensure they are identical. If the comparison succeeds, then the user may confirm pairing on the device(s) and/or the account that can accept an input. This method provides some security protection, assuming the user confirms on both paired devices (or a paired device and account) and actually performs the comparison properly.
SSP may also use a passkey entry method. This method may be used between a device with a display and a device with numeric keypad entry (such as a keyboard), or two devices with numeric keypad entry. In the first case, when the controller 310, 410 is connected to the network (whether through Wi-Fi or otherwise) the controller may provide a unique identifier over a network to identify itself to the protocol server 225. The protocol server 225 may randomly generate a code using a serial generator and provide the code back to the controller 310, 410 over the network. The display of the controller 310, 410 may be used to show the code, which may be a 6-digit numeric code, to the user who then enters the code on the computing device or smartphone with a keypad or other input mechanism. In the second case, the user of each device enters the same 6-digit number. Both of these cases provide some security protection. It is to be understood that any number of alpha-numeric characters may be used as a code that may be randomly generated, e.g., 6-digit, 7-digit, 8-digit, 9-digit, 10-digit, etc., without departing from the scope of the disclosure.
It will be appreciated that any pairing mechanism may be used by the disclosure without departing from the scope of the disclosure. The above implementations are exemplary of the pairing mechanisms that may be utilized by the disclosure.
At 550, the network connectivity may be skipped and at 551 a user may be asked to manually set up a watering protocol by responding to questions from the controller. At 552, a watering protocol of instructions will be generated and stored for the controllers use and at 569 the controller is ready for use and irrigation may begin automatically based on the protocol of instructions provided to the controller.
Alternatively, at 560 a user may be presented with available Wi-Fi connection options and may choose the desired connection, or at 570 a user may enter custom network settings directly. At 563, the controller or unit may be connected to the network or cloud.
Once connected to the network or cloud, at 565 the controller may be paired with an online account previously (or concurrently) set up through a web interface or other interface as seen in
At 567, a watering protocol may be generated by an irrigation protocol generator (illustrated best in
At 569, the controller is ready for use and irrigation may begin automatically based on the protocol of instructions provided to and received by the controller from the network or cloud.
At 607, the user may be prompted to set up a connection to a network/cloud through a Wi-Fi internet connection. At 609, the user may be prompted to input or select whether or not to connect to the network/cloud or run the irrigation system manually from the controller and control panel.
If the user decides not to connect to the network/cloud, at 615, the user will be prompted to enter data in manually, such as soil texture data, plant type data, sprinkler type data, slope type data, shade data, and duration of watering per zone. At 617, the user may be prompted to manually select or enter an irrigation interval or days to water. If the user chooses to input or enter an interval, at 619, the user will be prompted to enter the interval. Alternatively, if the user inputs or selects to irrigate according to days, at 623, the user will be prompted to enter the days for irrigation. It should be noted that in an implementation the user may be able to select both irrigation days and irrigation intervals without departing from the scope of the disclosure. Whether the user inputs or selects a watering interval or watering days or some combination thereof, at 617, the user will be prompted to input or select a duration and/or day for each of the zones controlled by the controller at 621.
At 609, if the user selected or entered that Wi-Fi is available to connect to a network then the user may be prompted to select from available networks at 610, or enter network name and security information in order to add a custom network at 612. At 614, the user may be prompted for a password. At 616, if the password fails the user will be redirected to 610 or 612 to retry the network security information or 614 to re-enter the password information. At 616, if connecting to the Wi-Fi network or internet is successful, at 625 a pairing request may be sent from the controller to a server on the network/cloud. The controller may authenticate itself with the server by providing a unique identifier to the server. The server may then receive the request from the controller. At 627, the server may then send and communicate instructions to a pairing code generator where a pairing code is generated. The pairing code may then be sent to the controller in order to pair a cloud based web account to the controller. Additionally, at 627, pairing codes may be established for a plurality of computing devices that may comprise additional controllers, control modules, mobile devices, computers, and the like. At 629, the system may set up each zone individually as shown in more detail in
Referring now to
It will be appreciated that implementations of the disclosure may comprise or utilize a special purpose or general-purpose computer, including computer hardware, such as, for example, one or more processors and system memory as discussed in greater detail below. Implementations within the scope of the disclosure also include physical and other computer-readable media for carrying or storing computer-executable instructions and/or data structures. Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer system. Computer-readable media that store computer-executable instructions are computer storage media (devices). Computer-readable media that carry computer-executable instructions are transmission media. Thus, by way of example, and not limitation, implementations of the disclosure can comprise at least two distinctly different kinds of computer-readable media: computer storage media (devices) and transmission media. Computer storage media (devices) includes RAM, ROM, EEPROM, CD-ROM, solid state drives (“SSDs”) (e.g., based on RAM), Flash memory, phase-change memory (“PCM”), other types of memory, other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
A “network” is defined as one or more data links that enable the transport of electronic data between computer systems and/or modules and/or other electronic devices. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer, the computer properly views the connection as a transmission medium. Transmission media can include a network and/or data links, which can be used to carry desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer. Combinations of the above should also be included within the scope of computer-readable media.
Further, upon reaching various computer system components, program code means in the form of computer-executable instructions or data structures can be transferred automatically from transmission media to computer storage media (devices) (or vice-versa). For example, computer-executable instructions or data structures received over a network or data link can be buffered in RAM within a network interface module (e.g., a “NIC”), and then eventually transferred to computer system RAM and/or to less volatile computer storage media (devices) at a computer system. RAM can also include solid state drives (SSDs or PCIx based real time memory tiered storage, such as FusionlO). Thus, it should be understood that computer storage media (devices) can be included in computer system components that also (or even primarily) utilize transmission media.
Computer-executable instructions comprise, for example, instructions and data, which, when executed at a processor, cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, or even source code.
Those skilled in the art will appreciate that the disclosure may be practiced in network computing environments with many types of computer system configurations, including, personal computers, desktop computers, laptop computers, message processors, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, tablets, pagers, routers, switches, various storage devices, commodity hardware, commodity computers, and the like. The disclosure may also be practiced in distributed system environments where local and remote computer systems, which are linked (either by hardwired data links, wireless data links, or by a combination of hardwired and wireless data links) through a network, both perform tasks. In a distributed system environment, program modules may be located in both local and remote memory storage devices.
Implementations of the disclosure can also be used in cloud computing environments. In this description and the following claims, “cloud computing” is defined as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned via virtualization and released with minimal management effort or service provider interaction, and then scaled accordingly. A cloud model can be composed of various characteristics (e.g., on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service, or any suitable characteristic now known to those of ordinary skill in the field, or later discovered), service models (e.g., Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS)), and deployment models (e.g., private cloud, community cloud, public cloud, hybrid cloud, or any suitable service type model now known to those of ordinary skill in the field, or later discovered). Databases and servers described with respect to the disclosure can be included in a cloud model.
Further, where appropriate, functions described herein can be performed in one or more of: hardware, software, firmware, digital components, or analog components. For example, one or more application specific integrated circuits (ASICs) can be programmed to carry out one or more of the systems and procedures described herein. Certain terms are used throughout the following description and claims to refer to particular system components. As one skilled in the art will appreciate, components may be referred to by different names. This document does not intend to distinguish between components that differ in name, but not function.
Referring now to
Computing device 900 includes one or more processor(s) 902, one or more memory device(s) 904, one or more interface(s) 906, one or more mass storage device(s) 908, one or more Input/Output (I/O) device(s) 910, and a display device 930 all of which are coupled to a bus 912. Processor(s) 902 include one or more processors or controllers that execute instructions stored in memory device(s) 904 and/or mass storage device(s) 908. Processor(s) 902 may also include various types of computer-readable media, such as cache memory.
Memory device(s) 904 include various computer-readable media, such as volatile memory (e.g., random access memory (RAM) 914) and/or nonvolatile memory (e.g., read-only memory (ROM) 916). Memory device(s) 904 may also include rewritable ROM, such as Flash memory.
Mass storage device(s) 908 include various computer readable media, such as magnetic tapes, magnetic disks, optical disks, solid-state memory (e.g., Flash memory), and so forth. As shown in
I/O device(s) 910 include various devices that allow data and/or other information to be input to or retrieved from computing device 900. Example I/O device(s) 910 include cursor control devices, keyboards, keypads, microphones, monitors or other display devices, speakers, printers, network interface cards, modems, and the like.
Display device 930 includes any type of device capable of displaying information to one or more users of computing device 900. Examples of display device 930 include a monitor, display terminal, video projection device, and the like.
Interface(s) 906 include various interfaces that allow computing device 900 to interact with other systems, devices, or computing environments. Example interface(s) 906 may include any number of different network interfaces 920, such as interfaces to local area networks (LANs), wide area networks (WANs), wireless networks, and the Internet. Other interface(s) include user interface 918 and peripheral device interface 922. The interface(s) 906 may also include one or more user interface elements 918. The interface(s) 906 may also include one or more peripheral interfaces such as interfaces for printers, pointing devices (mice, track pad, or any suitable user interface now known to those of ordinary skill in the field, or later discovered), keyboards, and the like.
Bus 912 allows processor(s) 902, memory device(s) 904, interface(s) 906, mass storage device(s) 908, and I/O device(s) 910 to communicate with one another, as well as other devices or components coupled to bus 912. Bus 912 represents one or more of several types of bus structures, such as a system bus, PCI bus, IEEE 1394 bus, USB bus, and so forth.
Illustrated in
At 1020, the system and method may comprise calendaring data that may be received from one or more calendar databases 1015 for generating time stamps for coordinating irrigation parameters and irrigation instructions for the controller. In an implementation, the calendaring data may be sourced from any internal or external clock circuit or server that may comprise the calendar database 1015.
At 1030, the system and method may comprise generating an irrigation protocol within the irrigation server based, at least partially, on the irrigation parameters received and the calendaring data. For example, if the municipality forbids irrigation on even numbered days, an irrigation protocol that waters around those days will be generated. After the protocol has been generated in the irrigation server, at 1040 the protocol may be transmitted to the controller over the computer network such that instructions generated within the irrigation server are executed in compliance the irrigation parameters.
In an implementation, the irrigation parameters may be entered by a user either through the controller interface or through a corresponding account web interface.
In an implementation, the irrigation protocol comprises instructions for irrigating on odd or even days of a month. In an implementation, the irrigation protocol comprises instructions for irrigating only during unrestricted hours of a day, or hours that are permitted by the irrigation parameters. In an implementation, the irrigation protocol comprises instructions for irrigating only on unrestricted days of a month, or days of the month that are permitted by the irrigation restrictions.
In an implementation, the system and method may further initiate a notification to a user's communication device regarding irrigation parameters.
Referring now to
At 1120, a notice may be generated and sent to a user for ratification. The notice may explain the sources of the parameters and may be presented with a preliminary watering protocol. At 1117, the user may ratify the parameters or change to the irrigation protocol. Once the user has ratified the change due to the parameters, the method may continue with generating a protocol at 1140. In an implementation, if the proposed protocol is not ratified by the owner, additional notifications may be presented to the user regarding the source of the parameters and expected penalties for not abiding by the parameters may be sent to the user. The method of generating an irrigation protocol within the irrigation server may be based, at least partially, on the irrigation parameters received and the calendaring data. For example, if the municipal or other irrigation parameters forbids irrigation on even numbered days, an irrigation protocol that waters around those days will be generated.
At 1150, after the protocol has been generated in the irrigation server, the protocol may be transmitted to the controller over the computer network such that instructions generated within the irrigation server are executed in compliance the irrigation parameters. In some areas, municipalities or others that control watering or irrigation rights may allow unrestricted watering or irrigation for new lawns or landscape, which may have just been planted. Therefore, a user may not wish to ratify the immediate adoption of the municipal or other parameters under such circumstances. There may be other reasons that a user may not ratify or adopt the suggested parameters.
In an implementation, the notifications may be a visual or audible output from the controller or from a mobile device.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the described features or acts described above. Rather, the described features and acts are disclosed as example forms of implementing the claims.
Referring now to
At 1214, forecast data may be received from a forecast database as sent by the forecast database at 1215. In an implementation the forecast data may be used in generating an evapotranspiration value for predicting the amount of water loss between irrigation iterations. It will be appreciated that water loss and saturation may be considered in relation to plant root zones.
At 1211, the method may store the irrigation parameters in memory within the system.
At 1220, a notice may be generated and sent to a user for ratification of any changes that may correspond to the received forecast. The notice may explain the sources of the parameters and may be presented with a preliminary watering protocol. At 1217, the user may ratify the parameters or change to the irrigation protocol. Once the user has ratified the change due to the parameters, the method may continue with generating a protocol at 1240. In an implementation, if the proposed protocol is not ratified by the owner, additional notifications may be presented to the user regarding the source of the parameters and expected penalties for not abiding by the parameters may be sent to the user. The method of generating an irrigation protocol within the irrigation server may be based, at least partially, on the irrigation parameters received and the calendaring data. For example, if the municipal or other irrigation parameters forbid irrigation on even numbered days, an irrigation protocol that waters around those days will be generated.
At 1230, calendaring data may be received for generating time stamps for coordinating irrigation parameters and irrigation instructions for the controller. In an implementation, the calendaring data may be sourced from any internal or external clock circuit or server.
At 1232, evapotranspiration may be calculated using the irrigation parameters/restrictions, calendaring information, and the forecast data. At 1233, the evapotranspiration calculation may be used to determine whether a corresponding root zone will be depleted beyond a predetermined allowable threshold. For example, if the system calculates that based on the forecast data the corresponding root zone will not be depleted to match a threshold, irrigation can be decreased. Likewise irrigation can be increased if the root zone is likely to exceed the allowable depletion given the relevant irrigation parameters and forecast.
At 1240, an irrigation protocol may be generated that reflects the calendaring data, forecast data, and the irrigation parameters.
At 1250, after the protocol has been generated in the irrigation server, the protocol may be transmitted to the controller over the computer network such that instructions generated within the irrigation server are executed in compliance the irrigation parameters. In some areas, municipalities or others that control watering or irrigation rights may allow unrestricted watering or irrigation for new lawns or landscape, which may have just been planted. Therefore, a user may not wish to ratify the immediate adoption of the municipal or other parameters under such circumstances. There may be other reasons that a user may not ratify or adopt the suggested parameters.
In an implementation, the notifications may be a visual or audible output from the controller or from a mobile device.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the described features or acts described above. Rather, the described features and acts are disclosed as example forms of implementing the claims.
The foregoing description has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. Further, it should be noted that any or all of the aforementioned alternate implementations may be used in any combination desired to form additional hybrid implementations of the disclosure.
Further, although specific implementations of the disclosure have been described and illustrated, the disclosure is not to be limited to the specific forms or arrangements of parts so described and illustrated. The scope of the disclosure is to be defined by the claims appended hereto, any future claims submitted here and in different applications, and their equivalents.
This application claims the benefit of U.S. Provisional Patent Application No. 61/841,828, filed on Jul. 1, 2013, and U.S. Provisional Patent Application No. 61/924,154, filed on Jan. 6, 2014, which are hereby incorporated by reference herein in their entireties, including but not limited to those portions that specifically appear hereinafter, the incorporation by reference being made with the following exception: In the event that any portion of the above-referenced applications is inconsistent with this application, this application supersedes said above-referenced applications. This application is a continuation-in-part of co-pending U.S. patent application Ser. No. 14/315,264, filed Jun. 25, 2014, entitled “COMPENSATING FOR MUNICIPAL RESTRICTIONS WITHIN IRRIGATION PROTOCOLS,” which is hereby incorporated by reference herein in its entirety, including but not limited to those portions that specifically appear hereinafter, the incorporation by reference being made with the following exception: In the event that any portion of the above-referenced application is inconsistent with this application, this application supersedes said portion of said above-referenced application.
Number | Date | Country | |
---|---|---|---|
61924154 | Jan 2014 | US | |
61841828 | Jul 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14315264 | Jun 2014 | US |
Child | 14321722 | US |